Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Pai-5 aliases:

Name Vendor Dr.Web classification name
Cryp_Pai-5 Trend Micro Trojan.Fakealert.750
Cryp_Pai-5 Trend Micro Trojan.Packed.511
Cryp_Pai-5 Trend Micro Trojan.Packed.424
Cryp_Pai-5 Trend Micro Trojan.Proxy.3364
Cryp_Pai-5 Trend Micro Trojan.Proxy.3284
Cryp_Pai-5 Trend Micro Trojan.Proxy.3202
Cryp_Pai-5 Trend Micro Trojan.Proxy.3142
Cryp_Pai-5 Trend Micro Trojan.Proxy.3111
Cryp_Pai-5 Trend Micro Trojan.Proxy.3211
Cryp_Pai-5 Trend Micro Trojan.Proxy.2003
Cryp_Pai-5 Trend Micro Trojan.Proxy.2634
Cryp_Pai-5 Trend Micro Trojan.Proxy.2493
Cryp_Pai-5 Trend Micro Trojan.Proxy.3212
Cryp_Pai-5 Trend Micro Trojan.Fakealert.698
Cryp_Pai-5 Trend Micro Trojan.Proxy.3214
Cryp_Pai-5 Trend Micro Trojan.Proxy.3326
Cryp_Pai-5 Trend Micro Trojan.Proxy.3215
Cryp_Pai-5 Trend Micro Trojan.Fakealert.701
Cryp_Pai-5 Trend Micro Trojan.Proxy.3011
Cryp_Pai-5 Trend Micro Trojan.Proxy.3235
Cryp_Pai-5 Trend Micro Trojan.Proxy.3221
Cryp_Pai-5 Trend Micro Trojan.Proxy.2833
Cryp_Pai-5 Trend Micro Trojan.Proxy.3325
Cryp_Pai-5 Trend Micro Trojan.Fakealert.814
Cryp_Pai-5 Trend Micro Trojan.Proxy.1934
Cryp_Pai-5 Trend Micro Trojan.Proxy.3209
Cryp_Pai-5 Trend Micro Trojan.Proxy.3263
Cryp_Pai-5 Trend Micro Trojan.Proxy.3281
Cryp_Pai-5 Trend Micro Trojan.Proxy.3213
Cryp_Pai-5 Trend Micro Trojan.Proxy.3262
Cryp_Pai-5 Trend Micro Trojan.Proxy.2723
Cryp_Pai-5 Trend Micro Trojan.Proxy.3301
Cryp_Pai-5 Trend Micro Trojan.Proxy.3303
Cryp_Pai-5 Trend Micro Trojan.Proxy.3310
Cryp_Pai-5 Trend Micro Trojan.PWS.Notos
Cryp_Pai-5 Trend Micro Trojan.Proxy.2486
Cryp_Pai-5 Trend Micro Trojan.Proxy.2684
Cryp_Pai-5 Trend Micro Trojan.Proxy.2071
Cryp_Pai-5 Trend Micro Trojan.Proxy.2376
Cryp_Pai-5 Trend Micro Trojan.Proxy.3335
Cryp_Pai-5 Trend Micro Trojan.Proxy.2777
Cryp_Pai-5 Trend Micro Trojan.Fakealert.973
Cryp_Pai-5 Trend Micro Trojan.Proxy.3735
Cryp_Pai-5 Trend Micro Trojan.Fakealert.679
Cryp_Pai-5 Trend Micro Trojan.MulDrop.11296
Cryp_Pai-5 Trend Micro Trojan.Proxy.2024
Cryp_Pai-5 Trend Micro Trojan.Proxy.2490
Cryp_Pai-5 Trend Micro BackDoor.Lizap
Cryp_Pai-5 Trend Micro Trojan.PWS.Tanspy.668
Cryp_Pai-5 Trend Micro Trojan.Packed.197

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.