Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanDownloader:Win32/Yafive.A aliases:

Name Vendor Dr.Web classification name
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.37316
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.39479
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.39474
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.38330
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.38385
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.38404
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.37452
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.49991
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.36515
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.36543
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.37382
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.37497
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.36457
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.38032
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.38331
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.38403
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.38117
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.37527
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.38405
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.37519
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.3722
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9603
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9258
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9315
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9225
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9308
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9349
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9808
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9729
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9371
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9537
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9819
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9394
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9490
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9669
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9552
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9512
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9215
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.9304
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoad.986
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.43045
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.46229
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.46228
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.44883
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.43016
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.44884
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.45495
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.39203
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.51295
TrojanDownloader:Win32/Yafive.A Microsoft Trojan.DownLoader.51298

1 2 3 4 5 6 7

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.