Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TR/Crypt.ULPM.Gen aliases:

Name Vendor Dr.Web classification name
TR/Crypt.ULPM.Gen Avira Trojan.TencentAd
TR/Crypt.ULPM.Gen Avira Trojan.DownLoad.49172
TR/Crypt.ULPM.Gen Avira BackDoor.Huai.5956
TR/Crypt.ULPM.Gen Avira Trojan.Siggen.402
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.58122
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.6732
TR/Crypt.ULPM.Gen Avira Trojan.PWS.Tencent.106
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.10765
TR/Crypt.ULPM.Gen Avira BackDoor.Haxdoor.206
TR/Crypt.ULPM.Gen Avira Trojan.MulDrop.32005
TR/Crypt.ULPM.Gen Avira Trojan.Fakealert.569
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.37989
TR/Crypt.ULPM.Gen Avira Trojan.PWS.Wsgame.13254
TR/Crypt.ULPM.Gen Avira Trojan.MulDrop.2526
TR/Crypt.ULPM.Gen Avira BackDoor.Netpig
TR/Crypt.ULPM.Gen Avira BackDoor.HackDef.199
TR/Crypt.ULPM.Gen Avira BackDoor.Generic.1445
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.59733
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.5565
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.8140
TR/Crypt.ULPM.Gen Avira Trojan.Proxy.662
TR/Crypt.ULPM.Gen Avira Trojan.Proxy.614
TR/Crypt.ULPM.Gen Avira Trojan.Tofger.15000
TR/Crypt.ULPM.Gen Avira Trojan.Proxy.585
TR/Crypt.ULPM.Gen Avira Trojan.Proxy.657
TR/Crypt.ULPM.Gen Avira Trojan.Proxy.577
TR/Crypt.ULPM.Gen Avira Trojan.PWS.Zhengtu
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.36059
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.38479
TR/Crypt.ULPM.Gen Avira Tool.Wsockhook
TR/Crypt.ULPM.Gen Avira BackDoor.IRC.Rusbot
TR/Crypt.ULPM.Gen Avira BackDoor.IRC.Sdbot.1350
TR/Crypt.ULPM.Gen Avira BackDoor.IRC.Sdbot.983
TR/Crypt.ULPM.Gen Avira Trojan.PWS.Banker.661
TR/Crypt.ULPM.Gen Avira BackDoor.IRC.Sdbot.1409
TR/Crypt.ULPM.Gen Avira Trojan.MulDrop.1090
TR/Crypt.ULPM.Gen Avira Trojan.Proxy.1865
TR/Crypt.ULPM.Gen Avira Trojan.Proxy.1782
TR/Crypt.ULPM.Gen Avira BackDoor.Shellbot
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.51418
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.4998
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.15746
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.14460
TR/Crypt.ULPM.Gen Avira Trojan.Packed.10
TR/Crypt.ULPM.Gen Avira Trojan.Packed.12
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.14143
TR/Crypt.ULPM.Gen Avira BackDoor.IRC.Sdbot.2872
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.10866
TR/Crypt.ULPM.Gen Avira Trojan.DownLoader.32552
TR/Crypt.ULPM.Gen Avira Win32.HLLW.MyBot

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.