Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Yodap aliases:

Name Vendor Dr.Web classification name
Cryp_Yodap Trend Micro BackDoor.Servu.5004
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8029
Cryp_Yodap Trend Micro Trojan.DownLoader.18300
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8044
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8045
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8034
Cryp_Yodap Trend Micro Trojan.PWS.Banker.7901
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8035
Cryp_Yodap Trend Micro Trojan.PWS.Banker.based
Cryp_Yodap Trend Micro Trojan.Bizten.18990
Cryp_Yodap Trend Micro Trojan.DownLoader.23065
Cryp_Yodap Trend Micro Trojan.DownLoader.19174
Cryp_Yodap Trend Micro Trojan.DownLoader.24298
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12767
Cryp_Yodap Trend Micro Trojan.DownLoader.54637
Cryp_Yodap Trend Micro Trojan.DownLoader.54323
Cryp_Yodap Trend Micro Trojan.DownLoader.52915
Cryp_Yodap Trend Micro Trojan.PWS.Banker.10300
Cryp_Yodap Trend Micro Trojan.DownLoader.34792
Cryp_Yodap Trend Micro Trojan.MulDrop.2113
Cryp_Yodap Trend Micro Trojan.MulDrop.433
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12036
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12004
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12255
Cryp_Yodap Trend Micro Trojan.PWS.Banker.11991
Cryp_Yodap Trend Micro Trojan.PWS.Banker.11995
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12179
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12186
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12212
Cryp_Yodap Trend Micro Trojan.PWS.Banker.11992
Cryp_Yodap Trend Micro Trojan.KillFiles.36864
Cryp_Yodap Trend Micro Trojan.DownLoader.55816
Cryp_Yodap Trend Micro Trojan.DownLoader.7686
Cryp_Yodap Trend Micro Trojan.DownLoader.3243
Cryp_Yodap Trend Micro Trojan.KeyLogger.2064
Cryp_Yodap Trend Micro Trojan.KeyLogger.2077
Cryp_Yodap Trend Micro Trojan.PWS.Banker.18004
Cryp_Yodap Trend Micro Trojan.PWS.Banker.16854
Cryp_Yodap Trend Micro Trojan.DownLoader.54324
Cryp_Yodap Trend Micro Win32.HLLW.MyBot.71
Cryp_Yodap Trend Micro Win32.HLLW.SpyBot
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13836
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14103
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14245
Cryp_Yodap Trend Micro Trojan.PWS.Banker.18027
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14161
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14091
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14024
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14136
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14028

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.