Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Upack aliases:

Name Vendor Dr.Web classification name
Cryp_Upack Trend Micro Trojan.PWS.Banker.2747
Cryp_Upack Trend Micro Trojan.PWS.Banker.2754
Cryp_Upack Trend Micro Trojan.PWS.Banker.3043
Cryp_Upack Trend Micro Trojan.PWS.Banker.2802
Cryp_Upack Trend Micro Trojan.DownLoader.62423
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4969
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3260
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5015
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5176
Cryp_Upack Trend Micro BackDoor.Pigeon.12832
Cryp_Upack Trend Micro Trojan.MulDrop.6014
Cryp_Upack Trend Micro Trojan.DownLoader.7320
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4615
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4352
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4564
Cryp_Upack Trend Micro Trojan.PWS.Gamania.7556
Cryp_Upack Trend Micro Trojan.PWS.Gamania.7592
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5244
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1790
Cryp_Upack Trend Micro Trojan.DownLoader.4685
Cryp_Upack Trend Micro Trojan.PWS.Banker.12017
Cryp_Upack Trend Micro Trojan.PWS.Banker.11969
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.3813
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1057
Cryp_Upack Trend Micro BackDoor.IRC.Sdbot.134
Cryp_Upack Trend Micro Trojan.PWS.Gamania.9665
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4875
Cryp_Upack Trend Micro Trojan.PWS.Banker.6859
Cryp_Upack Trend Micro Trojan.PWS.Banker.4352
Cryp_Upack Trend Micro Trojan.PWS.Banker.6183
Cryp_Upack Trend Micro Trojan.PWS.Banker.11887
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1186
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.3877
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.3818
Cryp_Upack Trend Micro Trojan.PWS.Banker.13876
Cryp_Upack Trend Micro Trojan.PWS.Ran
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1291
Cryp_Upack Trend Micro Trojan.MulDrop.3251
Cryp_Upack Trend Micro Trojan.PWS.Banker.5310
Cryp_Upack Trend Micro Trojan.DownLoader.57330
Cryp_Upack Trend Micro Trojan.PWS.Qqpass.1294
Cryp_Upack Trend Micro BackDoor.Moons
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5337
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5432
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5285
Cryp_Upack Trend Micro Trojan.PWS.Gamania.6661
Cryp_Upack Trend Micro Trojan.DownLoader.46511
Cryp_Upack Trend Micro Trojan.DownLoad.356
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.3243
Cryp_Upack Trend Micro Trojan.DownLoader.9666

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.