Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Yodap aliases:

Name Vendor Dr.Web classification name
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8292
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8878
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8295
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8369
Cryp_Yodap Trend Micro Trojan.DownLoader.24802
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8127
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8827
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8165
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8902
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8829
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8132
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8275
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8363
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8371
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8393
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8234
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8795
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8154
Cryp_Yodap Trend Micro Trojan.PWS.Banker.8290
Cryp_Yodap Trend Micro Trojan.DownLoader.23994
Cryp_Yodap Trend Micro Trojan.DownLoader.42547
Cryp_Yodap Trend Micro Trojan.DownLoader.19607
Cryp_Yodap Trend Micro Trojan.DownLoader.42373
Cryp_Yodap Trend Micro Trojan.DownLoader.42533
Cryp_Yodap Trend Micro Trojan.DownLoader.24804
Cryp_Yodap Trend Micro Trojan.DownLoader.24140
Cryp_Yodap Trend Micro Trojan.DownLoader.19915
Cryp_Yodap Trend Micro Trojan.DownLoader.22850
Cryp_Yodap Trend Micro Trojan.DownLoader.42593
Cryp_Yodap Trend Micro Trojan.DownLoader.17993
Cryp_Yodap Trend Micro Trojan.DownLoader.42585
Cryp_Yodap Trend Micro Trojan.DownLoader.19998
Cryp_Yodap Trend Micro Trojan.PWS.LDPinch.400
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13364
Cryp_Yodap Trend Micro Trojan.DownLoader.9377
Cryp_Yodap Trend Micro Trojan.DownLoader.20082
Cryp_Yodap Trend Micro Trojan.DownLoader.17528
Cryp_Yodap Trend Micro Trojan.DownLoader.51308
Cryp_Yodap Trend Micro Trojan.DownLoader.8660
Cryp_Yodap Trend Micro Trojan.DownLoader.23993
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6985
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6974
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6971
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6979
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6984
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6949
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6940
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6966
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6941
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6973

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.