Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Yodap aliases:

Name Vendor Dr.Web classification name
Cryp_Yodap Trend Micro Trojan.DownLoader.13526
Cryp_Yodap Trend Micro Trojan.DownLoader.47433
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12439
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6928
Cryp_Yodap Trend Micro BackDoor.ProRat.23
Cryp_Yodap Trend Micro Trojan.DownLoader.19855
Cryp_Yodap Trend Micro Trojan.MulDrop.1131
Cryp_Yodap Trend Micro Trojan.DownLoader.15334
Cryp_Yodap Trend Micro Trojan.DownLoader.15338
Cryp_Yodap Trend Micro Trojan.DownLoader.47746
Cryp_Yodap Trend Micro Trojan.PWS.Banker.11734
Cryp_Yodap Trend Micro BackDoor.Pigeon.239
Cryp_Yodap Trend Micro Trojan.Inject.5913
Cryp_Yodap Trend Micro Trojan.KeyLogger.1122
Cryp_Yodap Trend Micro Win32.HLLM.MyDoom.56
Cryp_Yodap Trend Micro Trojan.PWS.Banker.10369
Cryp_Yodap Trend Micro Trojan.MulDrop.7126
Cryp_Yodap Trend Micro Trojan.PWS.Banker.42153
Cryp_Yodap Trend Micro Trojan.DownLoad.34654
Cryp_Yodap Trend Micro Trojan.PWS.Banker.origin
Cryp_Yodap Trend Micro Trojan.PWS.Banker.5663
Cryp_Yodap Trend Micro Trojan.PWS.Siggen.3297
Cryp_Yodap Trend Micro Trojan.Searcher.62
Cryp_Yodap Trend Micro BackDoor.Iam
Cryp_Yodap Trend Micro Win32.HLLW.Autoruner.14788
Cryp_Yodap Trend Micro Win32.HLLW.Autoruner.15010
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9698
Cryp_Yodap Trend Micro BackDoor.Pigeon.215
Cryp_Yodap Trend Micro Trojan.PWS.Banker.41489
Cryp_Yodap Trend Micro Worm.Siggen.859
Cryp_Yodap Trend Micro Worm.Siggen.891
Cryp_Yodap Trend Micro Worm.Siggen.790
Cryp_Yodap Trend Micro Trojan.PWS.Banker.15432
Cryp_Yodap Trend Micro Trojan.Click.49908
Cryp_Yodap Trend Micro Trojan.Click.49517
Cryp_Yodap Trend Micro Trojan.DownLoader.13457
Cryp_Yodap Trend Micro Trojan.DownLoad.3675
Cryp_Yodap Trend Micro Trojan.DownLoader.9107
Cryp_Yodap Trend Micro Trojan.PWS.Banker.40495
Cryp_Yodap Trend Micro Trojan.PWS.Banker.42176
Cryp_Yodap Trend Micro Trojan.PWS.Banker.40643
Cryp_Yodap Trend Micro Trojan.DownLoader.1423
Cryp_Yodap Trend Micro Trojan.PWS.Banker.10746
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8839
Cryp_Yodap Trend Micro Trojan.PWS.Banker.10706
Cryp_Yodap Trend Micro Trojan.Siggen.58584
Cryp_Yodap Trend Micro Trojan.PWS.Gamania.19221
Cryp_Yodap Trend Micro Trojan.MulDrop.7050
Cryp_Yodap Trend Micro Trojan.AVKill.582
Cryp_Yodap Trend Micro Trojan.DownLoader.15051

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.