Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Pai-6 aliases:

Name Vendor Dr.Web classification name
Mal_Pai-6 Trend Micro BackDoor.Pigeon.11726
Mal_Pai-6 Trend Micro BackDoor.Pigeon.9211
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5242
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6395
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8801
Mal_Pai-6 Trend Micro Win32.HLLP.Whboy
Mal_Pai-6 Trend Micro BackDoor.Pigeon.10399
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6160
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8750
Mal_Pai-6 Trend Micro BackDoor.Pigeon.12933
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5426
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2292
Mal_Pai-6 Trend Micro Trojan.DownLoad.40138
Mal_Pai-6 Trend Micro BackDoor.Bifrost.801
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5869
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4955
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8776
Mal_Pai-6 Trend Micro BackDoor.Pigeon.24221
Mal_Pai-6 Trend Micro BackDoor.Pigeon.1021
Mal_Pai-6 Trend Micro BackDoor.Pigeon.12451
Mal_Pai-6 Trend Micro Trojan.MulDrop.14718
Mal_Pai-6 Trend Micro Trojan.MulDrop.14716
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6030
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4027
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8755
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8081
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2846
Mal_Pai-6 Trend Micro BackDoor.Pigeon.11098
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8440
Mal_Pai-6 Trend Micro BackDoor.Pigeon.1795
Mal_Pai-6 Trend Micro BackDoor.Pigeon.12116
Mal_Pai-6 Trend Micro BackDoor.Update.125
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3149
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3655
Mal_Pai-6 Trend Micro Trojan.MulDrop.7126
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3254
Mal_Pai-6 Trend Micro BackDoor.Pigeon.738
Mal_Pai-6 Trend Micro BackDoor.Pigeon.583
Mal_Pai-6 Trend Micro BackDoor.Pigeon.11412
Mal_Pai-6 Trend Micro BackDoor.Pigeon.1580
Mal_Pai-6 Trend Micro Trojan.PWS.Wsgame.18300
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3612
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4994
Mal_Pai-6 Trend Micro BackDoor.Pigeon.7179
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8283
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4433
Mal_Pai-6 Trend Micro Trojan.PWS.Gamania.15703
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8461
Mal_Pai-6 Trend Micro BackDoor.Pigeon.17363
Mal_Pai-6 Trend Micro Trojan.AVKill.299

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.