Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Yodap aliases:

Name Vendor Dr.Web classification name
Cryp_Yodap Trend Micro BackDoor.IRC.Former
Cryp_Yodap Trend Micro Trojan.DownLoader.64459
Cryp_Yodap Trend Micro Trojan.DownLoader.48995
Cryp_Yodap Trend Micro Trojan.DownLoader.29619
Cryp_Yodap Trend Micro Trojan.SCKeyLog.20
Cryp_Yodap Trend Micro Trojan.KeyLogger.878
Cryp_Yodap Trend Micro Trojan.PWS.Lineage.4970
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9282
Cryp_Yodap Trend Micro Trojan.DownLoader.22627
Cryp_Yodap Trend Micro Trojan.DownLoader.22639
Cryp_Yodap Trend Micro Trojan.DownLoader.28746
Cryp_Yodap Trend Micro BackDoor.Generic.797
Cryp_Yodap Trend Micro Trojan.DownLoader.54340
Cryp_Yodap Trend Micro Trojan.MulDrop.12716
Cryp_Yodap Trend Micro Trojan.DownLoader.17801
Cryp_Yodap Trend Micro Trojan.DownLoader.17254
Cryp_Yodap Trend Micro Trojan.DownLoader.17838
Cryp_Yodap Trend Micro Trojan.DownLoader.15373
Cryp_Yodap Trend Micro Trojan.DownLoader.17681
Cryp_Yodap Trend Micro Trojan.DownLoader.18083
Cryp_Yodap Trend Micro Trojan.DownLoader.17249
Cryp_Yodap Trend Micro Trojan.DownLoad.1000
Cryp_Yodap Trend Micro Trojan.DownLoader.17338
Cryp_Yodap Trend Micro Trojan.KeyLogger.779
Cryp_Yodap Trend Micro Trojan.PWS.Banker.5836
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6174
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6190
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6191
Cryp_Yodap Trend Micro Trojan.PWS.Banker.5892
Cryp_Yodap Trend Micro Trojan.PWS.Banker.5830
Cryp_Yodap Trend Micro BackDoor.Rat.24
Cryp_Yodap Trend Micro BackDoor.Biti
Cryp_Yodap Trend Micro Trojan.DownLoader.23128
Cryp_Yodap Trend Micro Trojan.DownLoader.22116
Cryp_Yodap Trend Micro Trojan.DownLoader.30335
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9397
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9463
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9264
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9225
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9253
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8959
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8927
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9184
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9458
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8905
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9182
Cryp_Yodap Trend Micro BackDoor.Insurrect.10
Cryp_Yodap Trend Micro Trojan.DownLoader.49172
Cryp_Yodap Trend Micro Trojan.DownLoader.11490
Cryp_Yodap Trend Micro Trojan.DownLoader.57011

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.