Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Pai-3 aliases:

Name Vendor Dr.Web classification name
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.8747
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.6447
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.1560
Cryp_Pai-3 Trend Micro Trojan.BadDate
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.2680
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.6462
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.2607
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.2657
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.2683
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.2679
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.2606
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.2961
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.3438
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.2951
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.5561
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.9561
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.5560
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.3176
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.3152
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.3053
Cryp_Pai-3 Trend Micro BackDoor.IRC.Sdbot.2923
Cryp_Pai-3 Trend Micro Trojan.DownLoader.36990
Cryp_Pai-3 Trend Micro Trojan.DownLoader.30199
Cryp_Pai-3 Trend Micro Trojan.DownLoader.30012
Cryp_Pai-3 Trend Micro Trojan.DownLoader.30180
Cryp_Pai-3 Trend Micro Trojan.DownLoader.30223
Cryp_Pai-3 Trend Micro Trojan.DownLoader.29824
Cryp_Pai-3 Trend Micro Trojan.DownLoader.30152
Cryp_Pai-3 Trend Micro Trojan.DownLoader.30138
Cryp_Pai-3 Trend Micro Trojan.DownLoader.29812
Cryp_Pai-3 Trend Micro Trojan.MulDrop.9670
Cryp_Pai-3 Trend Micro Trojan.MulDrop.9669
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.254
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.12932
Cryp_Pai-3 Trend Micro Trojan.DownLoader.52532
Cryp_Pai-3 Trend Micro Trojan.PWS.Qqpass.1402
Cryp_Pai-3 Trend Micro Trojan.DownLoader.35885
Cryp_Pai-3 Trend Micro Trojan.PWS.Qqpass.1351
Cryp_Pai-3 Trend Micro Trojan.MulDrop.4144
Cryp_Pai-3 Trend Micro Trojan.DownLoader.15554
Cryp_Pai-3 Trend Micro BackDoor.IRC.Sdbot.2922
Cryp_Pai-3 Trend Micro Trojan.DownLoader.21763
Cryp_Pai-3 Trend Micro Trojan.PWS.Wsgame.3040
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.6173
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.13315
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.13371
Cryp_Pai-3 Trend Micro BackDoor.Pigeon.9233
Cryp_Pai-3 Trend Micro Trojan.PWS.Gamania.8906
Cryp_Pai-3 Trend Micro Trojan.DownLoader.13908
Cryp_Pai-3 Trend Micro Trojan.DownLoader.14263

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.