Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Upack aliases:

Name Vendor Dr.Web classification name
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3873
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3661
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3929
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3999
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3937
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3881
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3933
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4056
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3912
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4248
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3914
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4247
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4396
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4001
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4016
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4329
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3662
Cryp_Upack Trend Micro Trojan.PWS.Soul
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4263
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4259
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3885
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3696
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3943
Cryp_Upack Trend Micro Trojan.PWS.Gamania.3984
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4000
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4205
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4450
Cryp_Upack Trend Micro Trojan.DownLoader.44804
Cryp_Upack Trend Micro Trojan.DownLoader.44309
Cryp_Upack Trend Micro BackDoor.Pigeon.9963
Cryp_Upack Trend Micro BackDoor.Pigeon.1737
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1605
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1805
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1612
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1688
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1522
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1818
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1606
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1781
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1782
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1295
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1608
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1731
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1610
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1802
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1625
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1756
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1523
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1711
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1784

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.