Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Pai-6 aliases:

Name Vendor Dr.Web classification name
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22852
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22946
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22845
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22882
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22854
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22840
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22914
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5401
Mal_Pai-6 Trend Micro BackDoor.Pigeon.1567
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8947
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22710
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22728
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22742
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22689
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22691
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22705
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22718
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22789
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22812
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8079
Mal_Pai-6 Trend Micro Trojan.MulDrop.32511
Mal_Pai-6 Trend Micro BackDoor.Pigeon.313
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5317
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6396
Mal_Pai-6 Trend Micro Trojan.MulDrop.11308
Mal_Pai-6 Trend Micro BackDoor.Pigeon.11206
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2965
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3846
Mal_Pai-6 Trend Micro BackDoor.Huai.3356
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6935
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5592
Mal_Pai-6 Trend Micro Trojan.MulDrop.15002
Mal_Pai-6 Trend Micro Trojan.MulDrop.14719
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4855
Mal_Pai-6 Trend Micro Trojan.MulDrop.7125
Mal_Pai-6 Trend Micro Trojan.PWS.Cabal
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22721
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22706
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22701
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22690
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22715
Mal_Pai-6 Trend Micro Trojan.PWS.Gamania.24225
Mal_Pai-6 Trend Micro BackDoor.Pigeon.24316
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22746
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22737
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2962
Mal_Pai-6 Trend Micro BackDoor.PcClient.551
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2389
Mal_Pai-6 Trend Micro BackDoor.Pigeon.12765
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4405

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.