Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_Yodap aliases:

Name Vendor Dr.Web classification name
Cryp_Yodap Trend Micro Trojan.PWS.Banker.7145
Cryp_Yodap Trend Micro Trojan.PWS.Banker.7928
Cryp_Yodap Trend Micro BackDoor.Inge
Cryp_Yodap Trend Micro Trojan.DownLoader.28238
Cryp_Yodap Trend Micro Trojan.DownLoader.52326
Cryp_Yodap Trend Micro Trojan.DownLoader.51627
Cryp_Yodap Trend Micro Trojan.DownLoader.46495
Cryp_Yodap Trend Micro Trojan.DownLoader.33360
Cryp_Yodap Trend Micro Trojan.DownLoader.33932
Cryp_Yodap Trend Micro Trojan.DownLoader.33244
Cryp_Yodap Trend Micro Trojan.DownLoader.33150
Cryp_Yodap Trend Micro Trojan.DownLoader.33245
Cryp_Yodap Trend Micro Trojan.DownLoader.32694
Cryp_Yodap Trend Micro Trojan.DownLoader.226
Cryp_Yodap Trend Micro Trojan.DownLoader.22121
Cryp_Yodap Trend Micro Trojan.DownLoader.53074
Cryp_Yodap Trend Micro Trojan.PWS.Banker.5446
Cryp_Yodap Trend Micro Dialer.Egroup
Cryp_Yodap Trend Micro BackDoor.ProRat.16
Cryp_Yodap Trend Micro BackDoor.Pigeon.12660
Cryp_Yodap Trend Micro Trojan.PWS.Banker.5022
Cryp_Yodap Trend Micro Trojan.PWS.Banker.5055
Cryp_Yodap Trend Micro Trojan.PWS.Banker.4993
Cryp_Yodap Trend Micro Trojan.PWS.Banker.4988
Cryp_Yodap Trend Micro Trojan.PWS.Banker.5028
Cryp_Yodap Trend Micro Trojan.PWS.Banker.5025
Cryp_Yodap Trend Micro Flooder.Godina
Cryp_Yodap Trend Micro BackDoor.IRC.Sdbot.1603
Cryp_Yodap Trend Micro Trojan.DownLoader.17682
Cryp_Yodap Trend Micro Trojan.DownLoader.46510
Cryp_Yodap Trend Micro Trojan.DownLoader.10130
Cryp_Yodap Trend Micro Trojan.MulDrop.12406
Cryp_Yodap Trend Micro Trojan.PWS.Senpas
Cryp_Yodap Trend Micro BackDoor.Dosia
Cryp_Yodap Trend Micro Trojan.SpyWar
Cryp_Yodap Trend Micro Trojan.DownLoad.2066
Cryp_Yodap Trend Micro Trojan.DownLoader.24063
Cryp_Yodap Trend Micro Trojan.MulDrop.4545
Cryp_Yodap Trend Micro BackDoor.Pigeon.344
Cryp_Yodap Trend Micro Trojan.PWS.Qqpass.108
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13502
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13516
Cryp_Yodap Trend Micro Trojan.MulDrop.2220
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13512
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13469
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13498
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13478
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13508
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13525
Cryp_Yodap Trend Micro Trojan.PWS.Banker.13511

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.