Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Pai-6 aliases:

Name Vendor Dr.Web classification name
Mal_Pai-6 Trend Micro BackDoor.Pigeon.15844
Mal_Pai-6 Trend Micro BackDoor.Pigeon.15664
Mal_Pai-6 Trend Micro BackDoor.Pigeon.14729
Mal_Pai-6 Trend Micro BackDoor.Pigeon.15185
Mal_Pai-6 Trend Micro BackDoor.Pigeon.13012
Mal_Pai-6 Trend Micro Trojan.DownLoad.4230
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22344
Mal_Pai-6 Trend Micro BackDoor.Pigeon.15405
Mal_Pai-6 Trend Micro Trojan.Packed.166
Mal_Pai-6 Trend Micro Trojan.PWS.Qqpass.400
Mal_Pai-6 Trend Micro BackDoor.Huai.4744
Mal_Pai-6 Trend Micro Trojan.MulDrop.27533
Mal_Pai-6 Trend Micro BackDoor.Pigeon.7057
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2362
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4834
Mal_Pai-6 Trend Micro Trojan.MulDrop.28015
Mal_Pai-6 Trend Micro BackDoor.Pigeon.879
Mal_Pai-6 Trend Micro Trojan.Packed.1195
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3772
Mal_Pai-6 Trend Micro Tool.Transmit.3
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8529
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3599
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5301
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8522
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4835
Mal_Pai-6 Trend Micro BackDoor.Pigeon.9318
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3561
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8704
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6806
Mal_Pai-6 Trend Micro BackDoor.Pigeon.7050
Mal_Pai-6 Trend Micro BackDoor.Pigeon.283
Mal_Pai-6 Trend Micro Trojan.Ideo.194
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3723
Mal_Pai-6 Trend Micro BackDoor.Huai.2679
Mal_Pai-6 Trend Micro Win32.HLLW.Autoruner
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23365
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23366
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23368
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23369
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23363
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23367
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23358
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23345
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23336
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23341
Mal_Pai-6 Trend Micro BackDoor.Pigeon.origin
Mal_Pai-6 Trend Micro BackDoor.Attack.21
Mal_Pai-6 Trend Micro BackDoor.Pigeon.21851
Mal_Pai-6 Trend Micro BackDoor.Siggen.363
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3929

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.