Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Pai-6 aliases:

Name Vendor Dr.Web classification name
Mal_Pai-6 Trend Micro Trojan.Packed.1384
Mal_Pai-6 Trend Micro BackDoor.Pigeon.9251
Mal_Pai-6 Trend Micro BackDoor.Pigeon.11218
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8973
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23344
Mal_Pai-6 Trend Micro Trojan.Inject.2997
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8758
Mal_Pai-6 Trend Micro BackDoor.Pigeon.11939
Mal_Pai-6 Trend Micro Trojan.Ideo.203
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4377
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8860
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23608
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23612
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2705
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8023
Mal_Pai-6 Trend Micro Trojan.Ideo.202
Mal_Pai-6 Trend Micro BackDoor.Pigeon.940
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23485
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23487
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23458
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23490
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23486
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23474
Mal_Pai-6 Trend Micro BackDoor.Pigeon.9562
Mal_Pai-6 Trend Micro Trojan.PWS.Ola.60
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8960
Mal_Pai-6 Trend Micro BackDoor.Pigeon.10398
Mal_Pai-6 Trend Micro Win32.Parite.2
Mal_Pai-6 Trend Micro Trojan.PWS.Banker.12840
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5102
Mal_Pai-6 Trend Micro BackDoor.Pigeon.20553
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2410
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6620
Mal_Pai-6 Trend Micro Trojan.MulDrop.16660
Mal_Pai-6 Trend Micro Trojan.MulDrop.16680
Mal_Pai-6 Trend Micro Trojan.MulDrop.16596
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2755
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3001
Mal_Pai-6 Trend Micro BackDoor.Rejoice.85
Mal_Pai-6 Trend Micro Trojan.MulDrop.16601
Mal_Pai-6 Trend Micro Trojan.MulDrop.16620
Mal_Pai-6 Trend Micro Trojan.MulDrop.16603
Mal_Pai-6 Trend Micro Trojan.MulDrop.16640
Mal_Pai-6 Trend Micro Trojan.MulDrop.6546
Mal_Pai-6 Trend Micro BackDoor.Graybird
Mal_Pai-6 Trend Micro Trojan.MulDrop.18442
Mal_Pai-6 Trend Micro Trojan.MulDrop.18533
Mal_Pai-6 Trend Micro Trojan.MulDrop.18434
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8674
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23351

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.