Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Pai-6 aliases:

Name Vendor Dr.Web classification name
Mal_Pai-6 Trend Micro Trojan.MulDrop.16156
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6239
Mal_Pai-6 Trend Micro Trojan.MulDrop.14730
Mal_Pai-6 Trend Micro Trojan.MulDrop.14616
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8738
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8334
Mal_Pai-6 Trend Micro BackDoor.BlackHole.2101
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4653
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2365
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3694
Mal_Pai-6 Trend Micro BackDoor.Pigeon.7495
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3562
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22947
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8291
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8514
Mal_Pai-6 Trend Micro BackDoor.Pigeon.7246
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8379
Mal_Pai-6 Trend Micro BackDoor.Pigeon.7281
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3698
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5636
Mal_Pai-6 Trend Micro BackDoor.Pigeon.9985
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2887
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5320
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3566
Mal_Pai-6 Trend Micro Program.ServUServer.5289
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2251
Mal_Pai-6 Trend Micro BackDoor.Pigeon.9829
Mal_Pai-6 Trend Micro BackDoor.Pigeon.12989
Mal_Pai-6 Trend Micro BackDoor.Pigeon.11393
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4365
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3551
Mal_Pai-6 Trend Micro BackDoor.Pigeon.1690
Mal_Pai-6 Trend Micro BackDoor.Graybird.2096
Mal_Pai-6 Trend Micro BackDoor.Pigeon.7110
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6894
Mal_Pai-6 Trend Micro BackDoor.Pigeon.550
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6770
Mal_Pai-6 Trend Micro Trojan.MulDrop.11905
Mal_Pai-6 Trend Micro BackDoor.Nethief.195
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6108
Mal_Pai-6 Trend Micro BackDoor.Pigeon.7392
Mal_Pai-6 Trend Micro BackDoor.Pigeon.7160
Mal_Pai-6 Trend Micro BackDoor.Pigeon.1693
Mal_Pai-6 Trend Micro BackDoor.Pigeon.1589
Mal_Pai-6 Trend Micro BackDoor.Pigeon.19150
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4440
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5255
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4838
Mal_Pai-6 Trend Micro Trojan.MulDrop.7133
Mal_Pai-6 Trend Micro BackDoor.Huai.4393

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.