Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Yodap aliases:

Name Vendor Dr.Web classification name
Cryp_Yodap Trend Micro Trojan.PWS.Banker.11052
Cryp_Yodap Trend Micro BackDoor.IrcContact.30
Cryp_Yodap Trend Micro Trojan.Proxy.origin
Cryp_Yodap Trend Micro Trojan.DownLoader.5342
Cryp_Yodap Trend Micro Trojan.DownLoader.62487
Cryp_Yodap Trend Micro Trojan.MulDrop.20009
Cryp_Yodap Trend Micro Tool.Siggen.1626
Cryp_Yodap Trend Micro BackDoor.Poison.40
Cryp_Yodap Trend Micro Trojan.DownLoader.19868
Cryp_Yodap Trend Micro Trojan.Rent.14
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9352
Cryp_Yodap Trend Micro Win32.HLLW.Autoruner.15915
Cryp_Yodap Trend Micro Trojan.PWS.Spy.4404
Cryp_Yodap Trend Micro Trojan.PWS.Banker.42498
Cryp_Yodap Trend Micro Trojan.Click.48010
Cryp_Yodap Trend Micro Trojan.PWS.Banker.40628
Cryp_Yodap Trend Micro Trojan.PWS.Banker.40900
Cryp_Yodap Trend Micro Trojan.PWS.Banker.42237
Cryp_Yodap Trend Micro Trojan.DownLoader.16934
Cryp_Yodap Trend Micro Trojan.Bizten.18964
Cryp_Yodap Trend Micro Trojan.DownLoader.28941
Cryp_Yodap Trend Micro BackDoor.Pigeon.9167
Cryp_Yodap Trend Micro BackDoor.IRC.Bot.683
Cryp_Yodap Trend Micro Trojan.MulDrop1.27987
Cryp_Yodap Trend Micro Trojan.Click1.26959
Cryp_Yodap Trend Micro Trojan.PWS.Banker.36890
Cryp_Yodap Trend Micro Trojan.Click1.25047
Cryp_Yodap Trend Micro Trojan.DownLoad.55372
Cryp_Yodap Trend Micro Trojan.PWS.Siggen.1275
Cryp_Yodap Trend Micro Trojan.Siggen.30708
Cryp_Yodap Trend Micro Trojan.DownLoad.51718
Cryp_Yodap Trend Micro Trojan.Siggen.31671
Cryp_Yodap Trend Micro Trojan.DownLoad2.13218
Cryp_Yodap Trend Micro Win32.HLLW.Autoruner.7966
Cryp_Yodap Trend Micro Trojan.DownLoader1.32662
Cryp_Yodap Trend Micro Trojan.DownLoad1.21112
Cryp_Yodap Trend Micro Trojan.DownLoad.40716
Cryp_Yodap Trend Micro Trojan.DownLoad2.12481
Cryp_Yodap Trend Micro Trojan.Click.39121
Cryp_Yodap Trend Micro Trojan.AVKill.3195
Cryp_Yodap Trend Micro Trojan.Packed.471
Cryp_Yodap Trend Micro Trojan.MulDrop.44234
Cryp_Yodap Trend Micro BackDoor.IRC.Sdbot.6772
Cryp_Yodap Trend Micro Trojan.Proxy.6935
Cryp_Yodap Trend Micro FDOS.IM.23
Cryp_Yodap Trend Micro Trojan.DownLoad.9686
Cryp_Yodap Trend Micro Trojan.PWS.Spy.369
Cryp_Yodap Trend Micro Worm.Siggen.158
Cryp_Yodap Trend Micro Trojan.Click1.24750
Cryp_Yodap Trend Micro Trojan.PWS.Spy.407

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.