Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Obfuscator.E aliases:

Name Vendor Dr.Web classification name
Win32/Obfuscator.E Microsoft Trojan.Ranky
Win32/Obfuscator.E Microsoft Trojan.Aimlink
Win32/Obfuscator.E Microsoft Trojan.Inject.345
Win32/Obfuscator.E Microsoft Trojan.Hooker.180
Win32/Obfuscator.E Microsoft BackDoor.Salidol
Win32/Obfuscator.E Microsoft Trojan.Sfind.185
Win32/Obfuscator.E Microsoft Trojan.PWS.Barrior
Win32/Obfuscator.E Microsoft Trojan.Troll
Win32/Obfuscator.E Microsoft Trojan.DownLoader.790
Win32/Obfuscator.E Microsoft BackDoor.Psybot
Win32/Obfuscator.E Microsoft BackDoor.Pigeon.82
Win32/Obfuscator.E Microsoft Tool.HideApp
Win32/Obfuscator.E Microsoft Trojan.DownLoader.14608
Win32/Obfuscator.E Microsoft Trojan.DownLoader.14609
Win32/Obfuscator.E Microsoft Trojan.Webmoner.60933
Win32/Obfuscator.E Microsoft Trojan.Bomgen
Win32/Obfuscator.E Microsoft Trojan.MulDrop.433
Win32/Obfuscator.E Microsoft Trojan.MulDrop.1687
Win32/Obfuscator.E Microsoft Trojan.DownLoader.1434
Win32/Obfuscator.E Microsoft Program.ProxyBouncer
Win32/Obfuscator.E Microsoft Trojan.PWS.Maran.318
Win32/Obfuscator.E Microsoft BackDoor.Huneg
Win32/Obfuscator.E Microsoft BackDoor.Radmin.33
Win32/Obfuscator.E Microsoft Trojan.Wintrim
Win32/Obfuscator.E Microsoft Trojan.PWS.Gamania.9042
Win32/Obfuscator.E Microsoft BackDoor.Servu.5000
Win32/Obfuscator.E Microsoft Win32.HLLW.Harwig
Win32/Obfuscator.E Microsoft Trojan.Proxy.158
Win32/Obfuscator.E Microsoft Exploit.WebDav
Win32/Obfuscator.E Microsoft Trojan.DownLoader.3419
Win32/Obfuscator.E Microsoft Trojan.Hooker.260
Win32/Obfuscator.E Microsoft Win32.HLLW.SpyBot.61
Win32/Obfuscator.E Microsoft BackDoor.Pigeon.8081
Win32/Obfuscator.E Microsoft Win32.HLLW.MFun
Win32/Obfuscator.E Microsoft Trojan.DownLoader.12792
Win32/Obfuscator.E Microsoft Trojan.DownLoader.6426
Win32/Obfuscator.E Microsoft Trojan.DownLoader.36494
Win32/Obfuscator.E Microsoft BackDoor.Dabass
Win32/Obfuscator.E Microsoft Trojan.DownLoader.53963
Win32/Obfuscator.E Microsoft Trojan.MulDrop.3931
Win32/Obfuscator.E Microsoft Trojan.MulDrop.6956
Win32/Obfuscator.E Microsoft BackDoor.Progmal
Win32/Obfuscator.E Microsoft BackDoor.Pigeon.13451
Win32/Obfuscator.E Microsoft Trojan.LowZones
Win32/Obfuscator.E Microsoft Trojan.KeyLogger.226
Win32/Obfuscator.E Microsoft Trojan.Packed.198
Win32/Obfuscator.E Microsoft Trojan.DownLoader.46454
Win32/Obfuscator.E Microsoft Trojan.Spambot.2488
Win32/Obfuscator.E Microsoft Trojan.DownLoader.53149
Win32/Obfuscator.E Microsoft Program.ServUServer.60

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.