Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Ursap!rts aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Ursap!rts Microsoft Trojan.PWS.Mifeng.31
Backdoor:Win32/Ursap!rts Microsoft BackDoor.Siggen.25086
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.47643
Backdoor:Win32/Ursap!rts Microsoft Trojan.Click.39816
Backdoor:Win32/Ursap!rts Microsoft BackDoor.IRC.Sdbot.7514
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.36548
Backdoor:Win32/Ursap!rts Microsoft Win32.HLLW.MyBot.515
Backdoor:Win32/Ursap!rts Microsoft Trojan.DownLoad1.20650
Backdoor:Win32/Ursap!rts Microsoft BackDoor.IRC.Sdbot.5403
Backdoor:Win32/Ursap!rts Microsoft BackDoor.IRC.Sdbot.5778
Backdoor:Win32/Ursap!rts Microsoft Trojan.Packed.687
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.46946
Backdoor:Win32/Ursap!rts Microsoft Win32.HLLW.MyBot.14
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.39992
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.36498
Backdoor:Win32/Ursap!rts Microsoft BackDoor.IRC.Sdbot.5480
Backdoor:Win32/Ursap!rts Microsoft Trojan.Spambot.5912
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.36738
Backdoor:Win32/Ursap!rts Microsoft Win32.HLLW.MyBot.109
Backdoor:Win32/Ursap!rts Microsoft BackDoor.IRC.Sdbot.5481
Backdoor:Win32/Ursap!rts Microsoft Trojan.Proxy.6443
Backdoor:Win32/Ursap!rts Microsoft Trojan.Click.32819
Backdoor:Win32/Ursap!rts Microsoft BackDoor.IRC.Sdbot.5465
Backdoor:Win32/Ursap!rts Microsoft BackDoor.IRC.Sdbot.5484
Backdoor:Win32/Ursap!rts Microsoft Trojan.PWS.Panda.490
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.37100
Backdoor:Win32/Ursap!rts Microsoft Trojan.Proxy.6825
Backdoor:Win32/Ursap!rts Microsoft Trojan.Siggen.19718
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.36808
Backdoor:Win32/Ursap!rts Microsoft Win32.HLLW.MyBot.83
Backdoor:Win32/Ursap!rts Microsoft Win32.HLLW.MyBot.118
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.45353
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.37187
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.55157
Backdoor:Win32/Ursap!rts Microsoft Win32.HLLW.MyBot.81
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.54081
Backdoor:Win32/Ursap!rts Microsoft Win32.HLLW.MyBot.516
Backdoor:Win32/Ursap!rts Microsoft BackDoor.IRC.Sdbot.5458
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.56288
Backdoor:Win32/Ursap!rts Microsoft Trojan.Proxy.6441
Backdoor:Win32/Ursap!rts Microsoft BackDoor.IRC.Sdbot.5472
Backdoor:Win32/Ursap!rts Microsoft Win32.HLLW.MyBot.85
Backdoor:Win32/Ursap!rts Microsoft Win32.HLLW.SpyBot.16
Backdoor:Win32/Ursap!rts Microsoft BackDoor.IRC.Sdbot.6483
Backdoor:Win32/Ursap!rts Microsoft Trojan.Siggen.29400
Backdoor:Win32/Ursap!rts Microsoft Trojan.Proxy.6389
Backdoor:Win32/Ursap!rts Microsoft BackDoor.IRC.Sdbot.5821
Backdoor:Win32/Ursap!rts Microsoft Trojan.MulDrop.40182
Backdoor:Win32/Ursap!rts Microsoft BackDoor.IRC.Sdbot.5473
Backdoor:Win32/Ursap!rts Microsoft Trojan.Proxy.6787

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.