Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Yodap aliases:

Name Vendor Dr.Web classification name
Cryp_Yodap Trend Micro Trojan.PWS.Banker.16362
Cryp_Yodap Trend Micro Trojan.PWS.Banker.10077
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9431
Cryp_Yodap Trend Micro Trojan.PWS.Banker.15749
Cryp_Yodap Trend Micro Trojan.PWS.Banker.10486
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13785
Cryp_Yodap Trend Micro Trojan.PWS.Banker.9368
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12871
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12893
Cryp_Yodap Trend Micro Trojan.PWS.Banker.10702
Cryp_Yodap Trend Micro Trojan.DownLoader.10830
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13001
Cryp_Yodap Trend Micro Trojan.PWS.Banker.16676
Cryp_Yodap Trend Micro Trojan.PWS.Banker.15934
Cryp_Yodap Trend Micro Trojan.PWS.Banker.11357
Cryp_Yodap Trend Micro Trojan.PWS.Banker.4468
Cryp_Yodap Trend Micro Trojan.PWS.Banker.6186
Cryp_Yodap Trend Micro Trojan.PWS.Banker.11874
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12662
Cryp_Yodap Trend Micro Trojan.PWS.Banker.16889
Cryp_Yodap Trend Micro Trojan.PWS.Banker.14853
Cryp_Yodap Trend Micro Trojan.PWS.Banker.15276
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13000
Cryp_Yodap Trend Micro Trojan.DownLoader.30418
Cryp_Yodap Trend Micro Trojan.DownLoader.30993
Cryp_Yodap Trend Micro Trojan.DownLoader.30954
Cryp_Yodap Trend Micro Trojan.DownLoader.36156
Cryp_Yodap Trend Micro Trojan.DownLoader.18416
Cryp_Yodap Trend Micro Trojan.DownLoader.56999
Cryp_Yodap Trend Micro BackDoor.IRC.Sdbot.591
Cryp_Yodap Trend Micro Trojan.DownLoader.47030
Cryp_Yodap Trend Micro Trojan.DownLoader.20306
Cryp_Yodap Trend Micro Trojan.DownLoader.36945
Cryp_Yodap Trend Micro Trojan.DownLoader.37063
Cryp_Yodap Trend Micro Trojan.DownLoader.36982
Cryp_Yodap Trend Micro Trojan.DownLoader.37161
Cryp_Yodap Trend Micro Trojan.DownLoader.37145
Cryp_Yodap Trend Micro Trojan.DownLoader.36953
Cryp_Yodap Trend Micro Trojan.DownLoader.37101
Cryp_Yodap Trend Micro Trojan.DownLoader.36943
Cryp_Yodap Trend Micro Trojan.DownLoader.37188
Cryp_Yodap Trend Micro Trojan.DownLoader.37084
Cryp_Yodap Trend Micro Trojan.Urlspy
Cryp_Yodap Trend Micro Trojan.PWS.Banker.4488
Cryp_Yodap Trend Micro BackDoor.Generic.1401
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12341
Cryp_Yodap Trend Micro Trojan.PWS.Banker.17867
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12323
Cryp_Yodap Trend Micro Trojan.DownLoader.58125
Cryp_Yodap Trend Micro Trojan.PWS.Banker.12333

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.