Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Upack aliases:

Name Vendor Dr.Web classification name
Cryp_Upack Trend Micro Trojan.DownLoader.53039
Cryp_Upack Trend Micro Trojan.DownLoader.32202
Cryp_Upack Trend Micro Trojan.DownLoader.32978
Cryp_Upack Trend Micro Trojan.DownLoader.32789
Cryp_Upack Trend Micro Trojan.DownLoader.30870
Cryp_Upack Trend Micro Win32.IRC.Bot.based
Cryp_Upack Trend Micro Win32.HLLW.Autoruner.1674
Cryp_Upack Trend Micro Win32.HLLW.Autoruner.1372
Cryp_Upack Trend Micro Win32.HLLW.Autoruner.2172
Cryp_Upack Trend Micro Trojan.DownLoader.29926
Cryp_Upack Trend Micro Trojan.PWS.Banker.13608
Cryp_Upack Trend Micro Trojan.MulDrop.9703
Cryp_Upack Trend Micro Trojan.PWS.Banker.13710
Cryp_Upack Trend Micro Trojan.MulDrop.9700
Cryp_Upack Trend Micro Trojan.PWS.Banker.13603
Cryp_Upack Trend Micro Trojan.PWS.Banker.13731
Cryp_Upack Trend Micro Trojan.PWS.Banker.13598
Cryp_Upack Trend Micro Trojan.MulDrop.9702
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5826
Cryp_Upack Trend Micro Trojan.PWS.Banker.13604
Cryp_Upack Trend Micro Trojan.Proxy.2389
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8879
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8485
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3601
Cryp_Upack Trend Micro Trojan.Click.3613
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8870
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8419
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8498
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8410
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8390
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3286
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8880
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8845
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8495
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8876
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3360
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8848
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3280
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3374
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3920
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3199
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3092
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8827
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3475
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8844
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8476
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8804
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3923
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3890
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4253

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.