Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Pai-6 aliases:

Name Vendor Dr.Web classification name
Mal_Pai-6 Trend Micro BackDoor.Beizhu.2487
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3598
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2900
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6420
Mal_Pai-6 Trend Micro BackDoor.Pigeon.9939
Mal_Pai-6 Trend Micro BackDoor.Pigeon.11520
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5543
Mal_Pai-6 Trend Micro BackDoor.PcClient
Mal_Pai-6 Trend Micro Trojan.MulDrop1.3936
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4849
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22385
Mal_Pai-6 Trend Micro BackDoor.Huai.1162
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23362
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23370
Mal_Pai-6 Trend Micro BackDoor.Pigeon.12383
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2431
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8793
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2243
Mal_Pai-6 Trend Micro BackDoor.Pigeon.9545
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2555
Mal_Pai-6 Trend Micro Trojan.PWS.Vipgsm
Mal_Pai-6 Trend Micro BackDoor.Pigeon.2656
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5243
Mal_Pai-6 Trend Micro Trojan.MulDrop.31437
Mal_Pai-6 Trend Micro BackDoor.Pigeon.1835
Mal_Pai-6 Trend Micro Trojan.ProAgent.55
Mal_Pai-6 Trend Micro Trojan.MulDrop.12876
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5652
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8611
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6372
Mal_Pai-6 Trend Micro BackDoor.Pigeon.602
Mal_Pai-6 Trend Micro BackDoor.Pigeon.10596
Mal_Pai-6 Trend Micro BackDoor.Pigeon.1019
Mal_Pai-6 Trend Micro BackDoor.Pigeon.7168
Mal_Pai-6 Trend Micro BackDoor.Siggen.21
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22999
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22968
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23088
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23038
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23041
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23025
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23077
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23049
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22989
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22980
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23002
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22969
Mal_Pai-6 Trend Micro BackDoor.Pigeon.22981
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23032
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23010

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.