FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Upack aliases:

Name Vendor Dr.Web classification name
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8917
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8812
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8461
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8921
Cryp_Upack Trend Micro Trojan.MulDrop.8594
Cryp_Upack Trend Micro Trojan.MulDrop.8558
Cryp_Upack Trend Micro Trojan.MulDrop.8231
Cryp_Upack Trend Micro Trojan.MulDrop.8588
Cryp_Upack Trend Micro Trojan.MulDrop.8377
Cryp_Upack Trend Micro Win32.HLLM.Graz.182
Cryp_Upack Trend Micro Trojan.MulDrop.8378
Cryp_Upack Trend Micro Trojan.PWS.Gamania.9263
Cryp_Upack Trend Micro Trojan.PWS.Gamania.9399
Cryp_Upack Trend Micro Trojan.PWS.Legmir.1869
Cryp_Upack Trend Micro Trojan.DownLoader.52553
Cryp_Upack Trend Micro Trojan.DownLoader.32786
Cryp_Upack Trend Micro Trojan.DownLoader.24004
Cryp_Upack Trend Micro Trojan.MulDrop.6206
Cryp_Upack Trend Micro Trojan.Inject.3374
Cryp_Upack Trend Micro Trojan.MulDrop.4909
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8421
Cryp_Upack Trend Micro Trojan.PWS.Gamania.9266
Cryp_Upack Trend Micro Trojan.PWS.Banker.19598
Cryp_Upack Trend Micro Trojan.PWS.Gamania.9486
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8360
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8979
Cryp_Upack Trend Micro Trojan.PWS.Gamania.9401
Cryp_Upack Trend Micro Trojan.PWS.Gamania.9116
Cryp_Upack Trend Micro Win32.HLLM.Sir
Cryp_Upack Trend Micro Trojan.MulDrop.9826
Cryp_Upack Trend Micro Trojan.MulDrop.8875
Cryp_Upack Trend Micro Trojan.MulDrop.13160
Cryp_Upack Trend Micro Trojan.PWS.Syska
Cryp_Upack Trend Micro Trojan.PWS.Maran
Cryp_Upack Trend Micro Trojan.Fakealert.1209
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.3151
Cryp_Upack Trend Micro Trojan.Fakealert.1208
Cryp_Upack Trend Micro Trojan.DownLoader.20170
Cryp_Upack Trend Micro Trojan.DownLoader.21775
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.2911
Cryp_Upack Trend Micro Trojan.DownLoader.20327
Cryp_Upack Trend Micro Trojan.MulDrop.10523
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1231
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1726
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1299
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1308
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.2604
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1777
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.2495
Cryp_Upack Trend Micro BackDoor.Huai

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies