Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Upack aliases:

Name Vendor Dr.Web classification name
Cryp_Upack Trend Micro Trojan.DownLoader.46497
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.4525
Cryp_Upack Trend Micro Trojan.PWS.Ran
Cryp_Upack Trend Micro Trojan.PWS.Banker.12565
Cryp_Upack Trend Micro Trojan.PWS.Qqpass.182
Cryp_Upack Trend Micro Trojan.DownLoader.13460
Cryp_Upack Trend Micro Trojan.DownLoader.57330
Cryp_Upack Trend Micro Trojan.PWS.Qqpass.536
Cryp_Upack Trend Micro Trojan.PWS.Banker.5310
Cryp_Upack Trend Micro Trojan.PWS.Qqpass.478
Cryp_Upack Trend Micro Trojan.DownLoader.53038
Cryp_Upack Trend Micro BackDoor.Moons
Cryp_Upack Trend Micro Trojan.PWS.Banker.5295
Cryp_Upack Trend Micro Trojan.DownLoader.13496
Cryp_Upack Trend Micro Trojan.PWS.Qqpass.560
Cryp_Upack Trend Micro Trojan.PWS.Banker.5306
Cryp_Upack Trend Micro Trojan.PWS.Banker.5301
Cryp_Upack Trend Micro Trojan.PWS.Qqpass.1294
Cryp_Upack Trend Micro Trojan.DownLoad.372
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5337
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5284
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5433
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5310
Cryp_Upack Trend Micro BackDoor.BotSiggen.8
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4539
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4810
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5202
Cryp_Upack Trend Micro Trojan.PWS.Gamania.4809
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5226
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5245
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5417
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5286
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5078
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5285
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5237
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5432
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5437
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5291
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.3247
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5058
Cryp_Upack Trend Micro Trojan.PWS.Gamania.6661
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5430
Cryp_Upack Trend Micro Trojan.DownLoader.46511
Cryp_Upack Trend Micro Trojan.DownLoad.356
Cryp_Upack Trend Micro Trojan.DownLoad.87
Cryp_Upack Trend Micro Trojan.PWS.Gamania.5355
Cryp_Upack Trend Micro Trojan.DownLoader.45917
Cryp_Upack Trend Micro Trojan.DownLoader.49281
Cryp_Upack Trend Micro Trojan.DownLoader.62658
Cryp_Upack Trend Micro Trojan.PWS.Wsgame.2933

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies