Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Yodap aliases:

Name Vendor Dr.Web classification name
Cryp_Yodap Trend Micro Trojan.DownLoader.25057
Cryp_Yodap Trend Micro Trojan.PWS.Banker.11059
Cryp_Yodap Trend Micro Trojan.PWS.Banker.11138
Cryp_Yodap Trend Micro Trojan.PWS.Banker.11074
Cryp_Yodap Trend Micro BackDoor.Generic.1386
Cryp_Yodap Trend Micro Trojan.Bizten.18963
Cryp_Yodap Trend Micro Win32.HLLM.Beagle.3317
Cryp_Yodap Trend Micro Trojan.DownLoader.1168
Cryp_Yodap Trend Micro Trojan.DownLoader.16619
Cryp_Yodap Trend Micro Trojan.PWS.Banker.16596
Cryp_Yodap Trend Micro Trojan.DownLoader.12475
Cryp_Yodap Trend Micro Trojan.PWS.Banker.15086
Cryp_Yodap Trend Micro Trojan.DownLoad.42841
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12389
Cryp_Yodap Trend Micro Trojan.MulDrop.7416
Cryp_Yodap Trend Micro Trojan.DownLoader1.774
Cryp_Yodap Trend Micro BackDoor.Bifrost.74
Cryp_Yodap Trend Micro Trojan.MulDrop.32192
Cryp_Yodap Trend Micro Trojan.PWS.Banker.10188
Cryp_Yodap Trend Micro Trojan.KeyLogger.88
Cryp_Yodap Trend Micro Trojan.DownLoader.49296
Cryp_Yodap Trend Micro Trojan.DownLoader.46503
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9914
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14678
Cryp_Yodap Trend Micro Trojan.Siggen.63181
Cryp_Yodap Trend Micro Trojan.PWS.Banker.4906
Cryp_Yodap Trend Micro Trojan.PWS.Banker.16361
Cryp_Yodap Trend Micro BackDoor.HackDef.279
Cryp_Yodap Trend Micro Trojan.DownLoader.28430
Cryp_Yodap Trend Micro Trojan.DownLoader.28346
Cryp_Yodap Trend Micro Trojan.PWS.Banker.1532
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8109
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12029
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12253
Cryp_Yodap Trend Micro Trojan.DownLoad1.42303
Cryp_Yodap Trend Micro Trojan.DownLoader.4046
Cryp_Yodap Trend Micro Trojan.MulDrop.3300
Cryp_Yodap Trend Micro BackDoor.ProRat.363
Cryp_Yodap Trend Micro Trojan.DownLoader.14675
Cryp_Yodap Trend Micro BackDoor.Tsui
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12397
Cryp_Yodap Trend Micro Win32.HLLW.MyBot.5260
Cryp_Yodap Trend Micro Trojan.PWS.Banker.5569
Cryp_Yodap Trend Micro Trojan.PWS.Banker.10396
Cryp_Yodap Trend Micro Win32.IRC.Bot
Cryp_Yodap Trend Micro Trojan.DownLoader.28367
Cryp_Yodap Trend Micro Trojan.PWS.Banker.5758
Cryp_Yodap Trend Micro Trojan.DownLoader.26099
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12184
Cryp_Yodap Trend Micro Trojan.DownLoader.12957

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.