Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

VirTool:Win32/Obfuscator.EK aliases:

Name Vendor Dr.Web classification name
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.Generic.1301
VirTool:Win32/Obfuscator.EK Microsoft Trojan.PWS.Imp
VirTool:Win32/Obfuscator.EK Microsoft Trojan.Inject.549
VirTool:Win32/Obfuscator.EK Microsoft Trojan.Proxy.122
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.SubSeven.23
VirTool:Win32/Obfuscator.EK Microsoft Trojan.DownLoader.26708
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.HackDef.100
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.Pigeon.1234
VirTool:Win32/Obfuscator.EK Microsoft Trojan.DownLoader.56662
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.HackDef.333
VirTool:Win32/Obfuscator.EK Microsoft Program.ProxyBouncer
VirTool:Win32/Obfuscator.EK Microsoft Trojan.PWS.Banker.7997
VirTool:Win32/Obfuscator.EK Microsoft Trojan.Click.537
VirTool:Win32/Obfuscator.EK Microsoft Program.ServUServer.60
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.IRC.Ruder
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.HackDef.359
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.Huneg
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.Oscar
VirTool:Win32/Obfuscator.EK Microsoft Trojan.DownLoader.33924
VirTool:Win32/Obfuscator.EK Microsoft Trojan.Fakealert.317
VirTool:Win32/Obfuscator.EK Microsoft Trojan.Packed.158
VirTool:Win32/Obfuscator.EK Microsoft Trojan.DownLoader.30199
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.Pigeon.194
VirTool:Win32/Obfuscator.EK Microsoft Trojan.MulDrop.1586
VirTool:Win32/Obfuscator.EK Microsoft Trojan.PWS.Marcos
VirTool:Win32/Obfuscator.EK Microsoft Trojan.DownLoader.33014
VirTool:Win32/Obfuscator.EK Microsoft Trojan.PWS.LDPinch.2475
VirTool:Win32/Obfuscator.EK Microsoft Trojan.PWS.Qqpass.1915
VirTool:Win32/Obfuscator.EK Microsoft Trojan.DownLoader.37508
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.Bifrost.41
VirTool:Win32/Obfuscator.EK Microsoft Trojan.Temper
VirTool:Win32/Obfuscator.EK Microsoft Win32.HLLW.SpyBot.61
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.HackDef.272
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.Rejoice
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.HackDef.170
VirTool:Win32/Obfuscator.EK Microsoft Trojan.PWS.Maran.318
VirTool:Win32/Obfuscator.EK Microsoft Win32.HLLW.SpyBot.44
VirTool:Win32/Obfuscator.EK Microsoft Trojan.DownLoader.7388
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.IRC.Sdbot.581
VirTool:Win32/Obfuscator.EK Microsoft Trojan.Ranky
VirTool:Win32/Obfuscator.EK Microsoft Tool.Netcat
VirTool:Win32/Obfuscator.EK Microsoft Win32.HLLW.Nimda.57349
VirTool:Win32/Obfuscator.EK Microsoft Win32.Detox
VirTool:Win32/Obfuscator.EK Microsoft Trojan.MulDrop.3663
VirTool:Win32/Obfuscator.EK Microsoft Trojan.Proxy.727
VirTool:Win32/Obfuscator.EK Microsoft Win32.HLLW.Harwig
VirTool:Win32/Obfuscator.EK Microsoft Trojan.Click.1078
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.IRC.Sdbot
VirTool:Win32/Obfuscator.EK Microsoft Win32.HLLW.MyBot
VirTool:Win32/Obfuscator.EK Microsoft BackDoor.IRC.Sdbot.471

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.