Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Yodap aliases:

Name Vendor Dr.Web classification name
Cryp_Yodap Trend Micro Trojan.PWS.Banker.7298
Cryp_Yodap Trend Micro Trojan.DownLoad1.43447
Cryp_Yodap Trend Micro BackDoor.Bifrost.906
Cryp_Yodap Trend Micro Trojan.KillXP
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14308
Cryp_Yodap Trend Micro Trojan.PWS.Banker.11947
Cryp_Yodap Trend Micro Trojan.DownLoader.15733
Cryp_Yodap Trend Micro Trojan.PWS.Banker.4830
Cryp_Yodap Trend Micro Trojan.MulDrop.1863
Cryp_Yodap Trend Micro Trojan.PWS.Banker.5597
Cryp_Yodap Trend Micro Dialer.Energy
Cryp_Yodap Trend Micro Trojan.DownLoader.17036
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13218
Cryp_Yodap Trend Micro Trojan.PWS.Banker.10366
Cryp_Yodap Trend Micro Trojan.DownLoad1.39538
Cryp_Yodap Trend Micro Trojan.DownLoad1.36485
Cryp_Yodap Trend Micro Trojan.MulDrop.30296
Cryp_Yodap Trend Micro Trojan.PWS.Banker.42572
Cryp_Yodap Trend Micro Trojan.DownLoader.15263
Cryp_Yodap Trend Micro BackDoor.ProRat.37
Cryp_Yodap Trend Micro BackDoor.Optix.157
Cryp_Yodap Trend Micro Trojan.PWS.Banker.10186
Cryp_Yodap Trend Micro BackDoor.Pigeon.1737
Cryp_Yodap Trend Micro Trojan.DownLoad.43112
Cryp_Yodap Trend Micro BackDoor.IRC.HellBot
Cryp_Yodap Trend Micro Trojan.PWS.Banker.10685
Cryp_Yodap Trend Micro Trojan.DownLoader.31063
Cryp_Yodap Trend Micro BackDoor.Theef.210
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14029
Cryp_Yodap Trend Micro Trojan.PWS.Banker.10753
Cryp_Yodap Trend Micro Trojan.PWS.Banker.17143
Cryp_Yodap Trend Micro BackDoor.IRC.Sdbot.4955
Cryp_Yodap Trend Micro Trojan.DownLoader.40546
Cryp_Yodap Trend Micro Trojan.MulDrop.29812
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6641
Cryp_Yodap Trend Micro Trojan.PWS.Banker.7729
Cryp_Yodap Trend Micro Trojan.DownLoader1.1795
Cryp_Yodap Trend Micro Trojan.Click.49589
Cryp_Yodap Trend Micro Trojan.Click.49541
Cryp_Yodap Trend Micro Trojan.Click.49966
Cryp_Yodap Trend Micro Trojan.PWS.Banker.5842
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12666
Cryp_Yodap Trend Micro Trojan.MulDrop.14166
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9977
Cryp_Yodap Trend Micro Trojan.DownLoader.31918
Cryp_Yodap Trend Micro Trojan.PWS.Banker.7164
Cryp_Yodap Trend Micro Trojan.PWS.Banker.16368
Cryp_Yodap Trend Micro Trojan.PWS.Banker.7588
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12107
Cryp_Yodap Trend Micro BackDoor.IRC.Sdbot.3111

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.