Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Yodap aliases:

Name Vendor Dr.Web classification name
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14117
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13905
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14196
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13877
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13913
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14014
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13897
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14211
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13916
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14241
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14291
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14246
Cryp_Yodap Trend Micro Trojan.PWS.Qqpass.63
Cryp_Yodap Trend Micro Trojan.DownLoader.49374
Cryp_Yodap Trend Micro Trojan.DownLoader.28586
Cryp_Yodap Trend Micro Trojan.DownLoader.28226
Cryp_Yodap Trend Micro Trojan.DownLoader.45906
Cryp_Yodap Trend Micro Trojan.DownLoader.48974
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12462
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12467
Cryp_Yodap Trend Micro Trojan.DownLoader.46039
Cryp_Yodap Trend Micro Trojan.DownLoad.341
Cryp_Yodap Trend Micro Trojan.DownLoader.46994
Cryp_Yodap Trend Micro Trojan.DownLoader.19290
Cryp_Yodap Trend Micro Trojan.DownLoader.48998
Cryp_Yodap Trend Micro Trojan.DownLoader.33720
Cryp_Yodap Trend Micro Trojan.DownLoader.49215
Cryp_Yodap Trend Micro Trojan.DownLoader.45958
Cryp_Yodap Trend Micro Trojan.DownLoader.46805
Cryp_Yodap Trend Micro Trojan.DownLoader.46487
Cryp_Yodap Trend Micro Trojan.DownLoader.63380
Cryp_Yodap Trend Micro Trojan.DownLoader.30972
Cryp_Yodap Trend Micro Trojan.DownLoader.30510
Cryp_Yodap Trend Micro Trojan.DownLoader.25344
Cryp_Yodap Trend Micro Trojan.DownLoader.30428
Cryp_Yodap Trend Micro BackDoor.BO2k.101
Cryp_Yodap Trend Micro Trojan.DownLoader.46242
Cryp_Yodap Trend Micro Trojan.DownLoader.59899
Cryp_Yodap Trend Micro Trojan.DownLoader.28864
Cryp_Yodap Trend Micro Trojan.DownLoader.47551
Cryp_Yodap Trend Micro Trojan.DownLoader.28551
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9393
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6631
Cryp_Yodap Trend Micro Trojan.PWS.Banker.7110
Cryp_Yodap Trend Micro Trojan.PWS.Banker.11435
Cryp_Yodap Trend Micro Trojan.PWS.Banker.15982
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12633
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9361
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6265
Cryp_Yodap Trend Micro Trojan.PWS.Banker.11207

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.