Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Pai-3 aliases:

Name Vendor Dr.Web classification name
Mal_Pai-3 Trend Micro Trojan.MulDrop.30363
Mal_Pai-3 Trend Micro BackDoor.Pigeon.11879
Mal_Pai-3 Trend Micro BackDoor.Pigeon.21635
Mal_Pai-3 Trend Micro Trojan.PWS.Qqpass.1640
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8879
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8888
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8859
Mal_Pai-3 Trend Micro BackDoor.Beizhu.436
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8919
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8877
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8882
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8838
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8866
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8852
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8932
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8923
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8902
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8858
Mal_Pai-3 Trend Micro Trojan.PWS.Gamania.6557
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8883
Mal_Pai-3 Trend Micro BackDoor.BlackHole.2124
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8840
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8890
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8908
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8853
Mal_Pai-3 Trend Micro Trojan.PWS.Gamania.6602
Mal_Pai-3 Trend Micro Win32.HLLW.Autoruner.617
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8917
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8906
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8886
Mal_Pai-3 Trend Micro Trojan.DownLoader.38025
Mal_Pai-3 Trend Micro Win32.HLLW.Autoruner.703
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8863
Mal_Pai-3 Trend Micro Trojan.PWS.Gamania.6518
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8848
Mal_Pai-3 Trend Micro BackDoor.Pigeon.9040
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8887
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8910
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8831
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8857
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8894
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8885
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8900
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8845
Mal_Pai-3 Trend Micro BackDoor.Pigeon.9027
Mal_Pai-3 Trend Micro BackDoor.Pigeon.8933
Mal_Pai-3 Trend Micro Trojan.DownLoader.37985
Mal_Pai-3 Trend Micro Trojan.PWS.Gamania.6432
Mal_Pai-3 Trend Micro Trojan.PWS.Gamania.6058
Mal_Pai-3 Trend Micro Trojan.PWS.Gamania.6049

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.