Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BackDoor-DKI.gen aliases:

Name Vendor Dr.Web classification name
BackDoor-DKI.gen McAfee Trojan.DownLoader.12354
BackDoor-DKI.gen McAfee Trojan.Inject.549
BackDoor-DKI.gen McAfee BackDoor.Poison.40
BackDoor-DKI.gen McAfee Trojan.DownLoader.50991
BackDoor-DKI.gen McAfee Trojan.DownLoader.60630
BackDoor-DKI.gen McAfee BackDoor.EggDrop.15
BackDoor-DKI.gen McAfee BackDoor.Voqa
BackDoor-DKI.gen McAfee BackDoor.PSClient
BackDoor-DKI.gen McAfee BackDoor.Diho
BackDoor-DKI.gen McAfee Trojan.MulDrop.12353
BackDoor-DKI.gen McAfee Trojan.KeyLogger.603
BackDoor-DKI.gen McAfee Win32.HLLW.Autoruner.955
BackDoor-DKI.gen McAfee Trojan.Ycslap
BackDoor-DKI.gen McAfee BackDoor.EggDrop.1621
BackDoor-DKI.gen McAfee Trojan.Proxy.2077
BackDoor-DKI.gen McAfee Trojan.MulDrop.30
BackDoor-DKI.gen McAfee Trojan.Proxy.3038
BackDoor-DKI.gen McAfee Win32.HLLW.Autoruner.1891
BackDoor-DKI.gen McAfee Trojan.Inject.3029
BackDoor-DKI.gen McAfee Trojan.Inject.3264
BackDoor-DKI.gen McAfee BackDoor.Poison.61
BackDoor-DKI.gen McAfee BackDoor.Poison.206
BackDoor-DKI.gen McAfee BackDoor.DarkMoon.143
BackDoor-DKI.gen McAfee Trojan.Proxy.817
BackDoor-DKI.gen McAfee Trojan.Peflog.1103
BackDoor-DKI.gen McAfee BackDoor.Siggen.348
BackDoor-DKI.gen McAfee Trojan.MulDrop.31028
BackDoor-DKI.gen McAfee Trojan.Peflog.1059
BackDoor-DKI.gen McAfee Trojan.Peflog.1101
BackDoor-DKI.gen McAfee Trojan.Peflog.1099
BackDoor-DKI.gen McAfee Trojan.KeyLogger.2331
BackDoor-DKI.gen McAfee Trojan.Siggen.57896
BackDoor-DKI.gen McAfee Trojan.Proxy.377
BackDoor-DKI.gen McAfee Trojan.DownLoader.46203
BackDoor-DKI.gen McAfee Trojan.Siggen.63915
BackDoor-DKI.gen McAfee Trojan.DownLoad1.42112
BackDoor-DKI.gen McAfee Trojan.Inject.6663

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.