Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Pai-6 aliases:

Name Vendor Dr.Web classification name
Mal_Pai-6 Trend Micro Trojan.Inject.15339
Mal_Pai-6 Trend Micro BackDoor.Pigeon.58901
Mal_Pai-6 Trend Micro BackDoor.Siggen.1006
Mal_Pai-6 Trend Micro Trojan.MulDrop.19879
Mal_Pai-6 Trend Micro Trojan.Packed.655
Mal_Pai-6 Trend Micro Trojan.Ideo.197
Mal_Pai-6 Trend Micro BackDoor.Pigeon.31705
Mal_Pai-6 Trend Micro BackDoor.Pigeon.25518
Mal_Pai-6 Trend Micro BackDoor.Pigeon.33531
Mal_Pai-6 Trend Micro Trojan.Siggen.15755
Mal_Pai-6 Trend Micro BackDoor.Pigeon.25556
Mal_Pai-6 Trend Micro BackDoor.Pigeon.41954
Mal_Pai-6 Trend Micro Trojan.DownLoader1.40282
Mal_Pai-6 Trend Micro Trojan.DownLoader1.36992
Mal_Pai-6 Trend Micro BackDoor.Beizhu.2816
Mal_Pai-6 Trend Micro BackDoor.Pigeon.25450
Mal_Pai-6 Trend Micro Trojan.DownLoader1.36654
Mal_Pai-6 Trend Micro BackDoor.Pigeon.30135
Mal_Pai-6 Trend Micro BackDoor.Pigeon.25532
Mal_Pai-6 Trend Micro BackDoor.Pigeon.25447
Mal_Pai-6 Trend Micro BackDoor.Pigeon.25446
Mal_Pai-6 Trend Micro Trojan.Ideo.208
Mal_Pai-6 Trend Micro Trojan.PWS.Qqpass.3134
Mal_Pai-6 Trend Micro Trojan.Inject.13663
Mal_Pai-6 Trend Micro BackDoor.Pigeon.25412
Mal_Pai-6 Trend Micro Trojan.MulDrop1.52734
Mal_Pai-6 Trend Micro BackDoor.Pigeon.25632
Mal_Pai-6 Trend Micro BackDoor.Pigeon.29639
Mal_Pai-6 Trend Micro BackDoor.Pigeon.32812
Mal_Pai-6 Trend Micro Trojan.MulDrop1.52842
Mal_Pai-6 Trend Micro BackDoor.Pigeon.25627
Mal_Pai-6 Trend Micro Trojan.DownLoader1.36295
Mal_Pai-6 Trend Micro Trojan.AVKill.2830
Mal_Pai-6 Trend Micro Trojan.DownLoader1.40344
Mal_Pai-6 Trend Micro Trojan.MulDrop1.53352
Mal_Pai-6 Trend Micro Trojan.Inject.13362
Mal_Pai-6 Trend Micro BackDoor.Pigeon.25738
Mal_Pai-6 Trend Micro BackDoor.Pigeon.31338
Mal_Pai-6 Trend Micro Trojan.MulDrop.37159
Mal_Pai-6 Trend Micro BackDoor.Pigeon.25646
Mal_Pai-6 Trend Micro Trojan.Inject.13662
Mal_Pai-6 Trend Micro BackDoor.Pigeon.25586
Mal_Pai-6 Trend Micro Trojan.Inject.13660
Mal_Pai-6 Trend Micro BackDoor.Pigeon.25633
Mal_Pai-6 Trend Micro BackDoor.Pigeon.9220
Mal_Pai-6 Trend Micro BackDoor.Pigeon.25680
Mal_Pai-6 Trend Micro Trojan.Inject.15091
Mal_Pai-6 Trend Micro BackDoor.Pigeon.25664
Mal_Pai-6 Trend Micro Trojan.Siggen2.8014
Mal_Pai-6 Trend Micro Trojan.AVKill.2831

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.