FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Upack aliases:

Name Vendor Dr.Web classification name
Cryp_Upack Trend Micro Trojan.PWS.Banker.4814
Cryp_Upack Trend Micro Trojan.PWS.Banker.3974
Cryp_Upack Trend Micro Trojan.PWS.Banker.5731
Cryp_Upack Trend Micro Trojan.DownLoader.11695
Cryp_Upack Trend Micro Trojan.PWS.Banker.3906
Cryp_Upack Trend Micro BackDoor.Beizhu.250
Cryp_Upack Trend Micro Trojan.PWS.Banker.5826
Cryp_Upack Trend Micro Trojan.DownLoader.11638
Cryp_Upack Trend Micro Trojan.DownLoader.11705
Cryp_Upack Trend Micro Trojan.PWS.Banker.5216
Cryp_Upack Trend Micro Trojan.DownLoader.11750
Cryp_Upack Trend Micro Trojan.DownLoader.12111
Cryp_Upack Trend Micro Trojan.DownLoader.11281
Cryp_Upack Trend Micro Trojan.DownLoader.11851
Cryp_Upack Trend Micro Trojan.DownLoader.11838
Cryp_Upack Trend Micro Trojan.Dom
Cryp_Upack Trend Micro BackDoor.Gaze
Cryp_Upack Trend Micro Trojan.PWS.Banker.17292
Cryp_Upack Trend Micro Trojan.DownLoader.12419
Cryp_Upack Trend Micro BackDoor.Assassin.20
Cryp_Upack Trend Micro Trojan.PWS.Banker.8490
Cryp_Upack Trend Micro Trojan.DownLoader.12514
Cryp_Upack Trend Micro Trojan.DownLoader.12929
Cryp_Upack Trend Micro BackDoor.IRC.Wisdom
Cryp_Upack Trend Micro Trojan.PWS.Banker.5663
Cryp_Upack Trend Micro Trojan.DownLoader.12792
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4197
Cryp_Upack Trend Micro Trojan.PWS.Gamania.6920
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4400
Cryp_Upack Trend Micro Trojan.DownLoader.12639
Cryp_Upack Trend Micro Trojan.PWS.Gamania.6672
Cryp_Upack Trend Micro Trojan.DownLoader.14877
Cryp_Upack Trend Micro Trojan.PWS.Gamania.9776
Cryp_Upack Trend Micro Trojan.MulDrop.10812
Cryp_Upack Trend Micro Trojan.MulDrop.10984
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1046
Cryp_Upack Trend Micro BackDoor.Pigeon.8516
Cryp_Upack Trend Micro Trojan.DownLoader.51807
Cryp_Upack Trend Micro BackDoor.ProRat.22
Cryp_Upack Trend Micro Trojan.Click.17846
Cryp_Upack Trend Micro Trojan.Hooker.21057
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4614
Cryp_Upack Trend Micro BackDoor.ProRat.209
Cryp_Upack Trend Micro Trojan.Click.17838
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4559
Cryp_Upack Trend Micro Trojan.PWS.Banker.21124
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4899
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4565
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4351
Cryp_Upack Trend Micro Trojan.PWS.Banker.20939

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies