Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Klone aliases:

Name Vendor Dr.Web classification name
Klone AVG BackDoor.Pigeon.3568
Klone AVG BackDoor.Pigeon.5569
Klone AVG Trojan.Galapoper
Klone AVG Trojan.MulDrop.3802
Klone AVG Adware.Dmad
Klone AVG Trojan.Paer
Klone AVG Tool.Dtool
Klone AVG BackDoor.Pigeon.223
Klone AVG BackDoor.Pigeon.485
Klone AVG BackDoor.Pigeon.538
Klone AVG BackDoor.Pigeon.537
Klone AVG BackDoor.Pigeon.660
Klone AVG BackDoor.Pigeon.665
Klone AVG BackDoor.Pigeon.735
Klone AVG BackDoor.Pigeon.759
Klone AVG BackDoor.Pigeon.776
Klone AVG BackDoor.Pigeon.799
Klone AVG BackDoor.Pigeon.831
Klone AVG BackDoor.Pigeon.194
Klone AVG BackDoor.Pigeon.1216
Klone AVG BackDoor.Pigeon.1599
Klone AVG Trojan.Havedo
Klone AVG BackDoor.Pigeon.1623
Klone AVG BackDoor.Graybird
Klone AVG BackDoor.Pigeon.1812
Klone AVG BackDoor.Huai
Klone AVG BackDoor.Pigeon.1934
Klone AVG BackDoor.Pigeon.2158
Klone AVG BackDoor.Pigeon.2157
Klone AVG BackDoor.Pigeon.2147
Klone AVG BackDoor.Pigeon.2173
Klone AVG BackDoor.Pigeon.2142
Klone AVG BackDoor.Pigeon.2177
Klone AVG BackDoor.Pigeon.2211
Klone AVG BackDoor.Pigeon.2248
Klone AVG BackDoor.Pigeon.2267
Klone AVG BackDoor.Pigeon.284
Klone AVG BackDoor.Pigeon.65
Klone AVG BackDoor.Pigeon.2306
Klone AVG BackDoor.Pigeon.2344
Klone AVG BackDoor.Pigeon.2305
Klone AVG BackDoor.Pigeon.2302
Klone AVG BackDoor.Pigeon.2349
Klone AVG BackDoor.Pigeon.2376
Klone AVG BackDoor.Pigeon.2370
Klone AVG BackDoor.Pigeon.2367
Klone AVG BackDoor.Pigeon.2383
Klone AVG BackDoor.Pigeon.2409
Klone AVG BackDoor.Pigeon.2516
Klone AVG BackDoor.Pigeon.2441

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.