Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Yodap aliases:

Name Vendor Dr.Web classification name
Cryp_Yodap Trend Micro Trojan.DownLoader.33722
Cryp_Yodap Trend Micro Trojan.DownLoader.15741
Cryp_Yodap Trend Micro BackDoor.IRC.Ant
Cryp_Yodap Trend Micro Trojan.PWS.Banker.18999
Cryp_Yodap Trend Micro BackDoor.IRC.Sdbot.426
Cryp_Yodap Trend Micro Trojan.PWS.Banker.18697
Cryp_Yodap Trend Micro Trojan.PWS.Banker.11387
Cryp_Yodap Trend Micro Trojan.PWS.Banker.15274
Cryp_Yodap Trend Micro Trojan.PWS.Banker.10247
Cryp_Yodap Trend Micro Trojan.DownLoader.16594
Cryp_Yodap Trend Micro Trojan.DownLoader.47436
Cryp_Yodap Trend Micro Trojan.PWS.Wsgame.17641
Cryp_Yodap Trend Micro Trojan.DownLoader.20907
Cryp_Yodap Trend Micro Trojan.DownLoad1.42906
Cryp_Yodap Trend Micro Tool.Transmit.3
Cryp_Yodap Trend Micro Trojan.Qqlog
Cryp_Yodap Trend Micro Trojan.PWS.Banker.10411
Cryp_Yodap Trend Micro Trojan.Siggen.4838
Cryp_Yodap Trend Micro Trojan.Click.27593
Cryp_Yodap Trend Micro Trojan.DownLoader.11955
Cryp_Yodap Trend Micro BackDoor.Pigeon.216
Cryp_Yodap Trend Micro Win32.HLLW.MyBot.35
Cryp_Yodap Trend Micro Trojan.PWS.Banker.15279
Cryp_Yodap Trend Micro Trojan.PWS.Banker.5793
Cryp_Yodap Trend Micro BackDoor.IRC.Flood.8
Cryp_Yodap Trend Micro Trojan.Warring
Cryp_Yodap Trend Micro Trojan.DownLoader.42991
Cryp_Yodap Trend Micro Trojan.DownLoad1.38790
Cryp_Yodap Trend Micro Trojan.DownLoad1.35880
Cryp_Yodap Trend Micro Trojan.DownLoad1.41125
Cryp_Yodap Trend Micro Trojan.DownLoad1.37814
Cryp_Yodap Trend Micro Trojan.KeyLogger.875
Cryp_Yodap Trend Micro Trojan.DownLoader.origin
Cryp_Yodap Trend Micro Trojan.DownLoad.14418
Cryp_Yodap Trend Micro Trojan.DownLoader.23192
Cryp_Yodap Trend Micro BackDoor.Pigeon.6559
Cryp_Yodap Trend Micro BackDoor.IRC.Sdbot.427
Cryp_Yodap Trend Micro Trojan.BeagleProxy
Cryp_Yodap Trend Micro Trojan.PWS.Banker.16359
Cryp_Yodap Trend Micro Trojan.DownLoader1.1071
Cryp_Yodap Trend Micro Trojan.DownLoader1.501
Cryp_Yodap Trend Micro Trojan.PWS.Aolbill
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12237
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9378
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9769
Cryp_Yodap Trend Micro Trojan.KeyLogger.3684
Cryp_Yodap Trend Micro Trojan.PWS.Banker.5356
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12885
Cryp_Yodap Trend Micro Trojan.MulDrop.1161
Cryp_Yodap Trend Micro Trojan.Shark.807

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.