Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Upack aliases:

Name Vendor Dr.Web classification name
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1712
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.3114
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1819
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.1623
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.2727
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.2684
Cryp_Upack Trend Micro Trojan.PWS.Banker.7982
Cryp_Upack Trend Micro Trojan.PWS.Banker.9221
Cryp_Upack Trend Micro Trojan.PWS.Banker.9999
Cryp_Upack Trend Micro Trojan.PWS.Banker.9890
Cryp_Upack Trend Micro Trojan.PWS.Banker.4325
Cryp_Upack Trend Micro Trojan.PWS.Banker.9952
Cryp_Upack Trend Micro Trojan.PWS.Banker.9229
Cryp_Upack Trend Micro Trojan.PWS.Banker.11222
Cryp_Upack Trend Micro Trojan.PWS.Banker.14145
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.2672
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.5600
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4717
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4090
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4523
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.6186
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4855
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.5408
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4252
Cryp_Upack Trend Micro Trojan.DownLoader.2789
Cryp_Upack Trend Micro Adware.Iedog
Cryp_Upack Trend Micro Win32.HLLW.Autoruner.578
Cryp_Upack Trend Micro Win32.HLLW.Autoruner.557
Cryp_Upack Trend Micro Win32.HLLW.Autoruner.577
Cryp_Upack Trend Micro Trojan.DownLoader.52555
Cryp_Upack Trend Micro Trojan.DownLoader.33427
Cryp_Upack Trend Micro Trojan.MulDrop.10512
Cryp_Upack Trend Micro Trojan.DownLoader.46800
Cryp_Upack Trend Micro Trojan.DownLoader.59018
Cryp_Upack Trend Micro Trojan.DownLoader.57619
Cryp_Upack Trend Micro Trojan.DownLoader.31819
Cryp_Upack Trend Micro Trojan.DownLoader.30821
Cryp_Upack Trend Micro Trojan.DownLoader.30546
Cryp_Upack Trend Micro Trojan.DownLoader.31440
Cryp_Upack Trend Micro Trojan.DownLoader.29647
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.2965
Cryp_Upack Trend Micro Trojan.DownLoader.31153
Cryp_Upack Trend Micro Trojan.PWS.Lineage.2747
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.2811
Cryp_Upack Trend Micro Trojan.DownLoader.53135
Cryp_Upack Trend Micro Trojan.PWS.Gamania.7867
Cryp_Upack Trend Micro Trojan.PWS.Gamania.8978
Cryp_Upack Trend Micro Trojan.PWS.Gamania.7908
Cryp_Upack Trend Micro Trojan.PWS.Gamania.7909
Cryp_Upack Trend Micro Trojan.DownLoader.10160

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies