Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Ursap!rts aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Ursap!rts Microsoft Trojan.PWS.Panda.17
Backdoor:Win32/Ursap!rts Microsoft Trojan.PWS.Siggen.80
Backdoor:Win32/Ursap!rts Microsoft Win32.Detox.133
Backdoor:Win32/Ursap!rts Microsoft BackDoor.IRC.Rizalof
Backdoor:Win32/Ursap!rts Microsoft Trojan.Proxy.762
Backdoor:Win32/Ursap!rts Microsoft Trojan.Packed.201
Backdoor:Win32/Ursap!rts Microsoft Trojan.DownLoad.29451
Backdoor:Win32/Ursap!rts Microsoft Trojan.PWS.Panda.111
Backdoor:Win32/Ursap!rts Microsoft Tool.PassView
Backdoor:Win32/Ursap!rts Microsoft Trojan.PWS.Panda.106
Backdoor:Win32/Ursap!rts Microsoft Trojan.PWS.Panda.7
Backdoor:Win32/Ursap!rts Microsoft Trojan.PWS.Siggen.89
Backdoor:Win32/Ursap!rts Microsoft Trojan.DownLoad.29313
Backdoor:Win32/Ursap!rts Microsoft BackDoor.SubSeven.215
Backdoor:Win32/Ursap!rts Microsoft Win32.HLLW.Sinfin
Backdoor:Win32/Ursap!rts Microsoft Trojan.Inject.5089
Backdoor:Win32/Ursap!rts Microsoft Trojan.PWS.LDPinch.1407
Backdoor:Win32/Ursap!rts Microsoft Trojan.PWS.Panda.5
Backdoor:Win32/Ursap!rts Microsoft Trojan.PWS.Fire.2
Backdoor:Win32/Ursap!rts Microsoft Trojan.PWS.Panda.100
Backdoor:Win32/Ursap!rts Microsoft BackDoor.IRC.Lsbot
Backdoor:Win32/Ursap!rts Microsoft Trojan.Spambot.4262
Backdoor:Win32/Ursap!rts Microsoft Trojan.Click.4913
Backdoor:Win32/Ursap!rts Microsoft BackDoor.Generic.328
Backdoor:Win32/Ursap!rts Microsoft Program.ServUServer
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.8328
Backdoor:Win32/Ursap!rts Microsoft BackDoor.BlackHole.3141
Backdoor:Win32/Ursap!rts Microsoft Win32.IRC.Bot.216
Backdoor:Win32/Ursap!rts Microsoft Program.Ardamax.170
Backdoor:Win32/Ursap!rts Microsoft Trojan.Packed.443
Backdoor:Win32/Ursap!rts Microsoft Trojan.PWS.Slaped
Backdoor:Win32/Ursap!rts Microsoft Trojan.PWS.LDPinch.4132
Backdoor:Win32/Ursap!rts Microsoft Trojan.Spambot.3201
Backdoor:Win32/Ursap!rts Microsoft Trojan.DownLoader.63225
Backdoor:Win32/Ursap!rts Microsoft Trojan.Spambot.3196
Backdoor:Win32/Ursap!rts Microsoft BackDoor.Graybird
Backdoor:Win32/Ursap!rts Microsoft Trojan.Inject.716
Backdoor:Win32/Ursap!rts Microsoft Trojan.Click.25482
Backdoor:Win32/Ursap!rts Microsoft Trojan.PWS.Panda.171
Backdoor:Win32/Ursap!rts Microsoft Trojan.Packed.650
Backdoor:Win32/Ursap!rts Microsoft Tool.Netcat.61
Backdoor:Win32/Ursap!rts Microsoft Trojan.NtRootKit.188
Backdoor:Win32/Ursap!rts Microsoft BackDoor.IRC.Sdbot.1464
Backdoor:Win32/Ursap!rts Microsoft BackDoor.Bifrost.8
Backdoor:Win32/Ursap!rts Microsoft Trojan.NtRootKit.60
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.17445
Backdoor:Win32/Ursap!rts Microsoft Trojan.Proxy.1288
Backdoor:Win32/Ursap!rts Microsoft Win32.HLLP.Whboy.113
Backdoor:Win32/Ursap!rts Microsoft Trojan.Corruptor
Backdoor:Win32/Ursap!rts Microsoft DDoS.Kardraw

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.