Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_Pai-6 aliases:

Name Vendor Dr.Web classification name
Mal_Pai-6 Trend Micro BackDoor.Huai.2110
Mal_Pai-6 Trend Micro BackDoor.Pigeon.7929
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6995
Mal_Pai-6 Trend Micro BackDoor.Pigeon.9381
Mal_Pai-6 Trend Micro BackDoor.Pigeon.1564
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5386
Mal_Pai-6 Trend Micro BackDoor.Pigeon.837
Mal_Pai-6 Trend Micro BackDoor.Pigeon.10052
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6354
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8009
Mal_Pai-6 Trend Micro BackDoor.Pigeon.8771
Mal_Pai-6 Trend Micro BackDoor.Pigeon.4800
Mal_Pai-6 Trend Micro BackDoor.Pigeon.6505
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23467
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23480
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23441
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23469
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23470
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23494
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23439
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23444
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23436
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23454
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23481
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23492
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23496
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23471
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23468
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23456
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23495
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23442
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23463
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23450
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23482
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23489
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23464
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23478
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23491
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23479
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23476
Mal_Pai-6 Trend Micro BackDoor.Pigeon.23457
Mal_Pai-6 Trend Micro BackDoor.Cia.24
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5570
Mal_Pai-6 Trend Micro Trojan.Packed.1371
Mal_Pai-6 Trend Micro BackDoor.Pigeon.24901
Mal_Pai-6 Trend Micro BackDoor.Pigeon.5939
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3270
Mal_Pai-6 Trend Micro BackDoor.Pigeon.258
Mal_Pai-6 Trend Micro BackDoor.IRC.Sdbot.1881
Mal_Pai-6 Trend Micro BackDoor.Pigeon.3526

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.