Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Orsam!rts aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Orsam!rts Microsoft Trojan.Siggen.1544
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoader.59219
Trojan:Win32/Orsam!rts Microsoft Trojan.MulDrop.33005
Trojan:Win32/Orsam!rts Microsoft Trojan.Hidden.16385
Trojan:Win32/Orsam!rts Microsoft Trojan.KillFiles.11323
Trojan:Win32/Orsam!rts Microsoft Win32.HLLM.Julio.59
Trojan:Win32/Orsam!rts Microsoft Trojan.Fakealert.4044
Trojan:Win32/Orsam!rts Microsoft Trojan.NtRootKit.3115
Trojan:Win32/Orsam!rts Microsoft Trojan.PWS.Siggen.232
Trojan:Win32/Orsam!rts Microsoft Trojan.StartPage.20566
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoader.22771
Trojan:Win32/Orsam!rts Microsoft Trojan.PWS.Spydog
Trojan:Win32/Orsam!rts Microsoft BackDoor.Generic.1664
Trojan:Win32/Orsam!rts Microsoft BackDoor.Xem
Trojan:Win32/Orsam!rts Microsoft Trojan.NtRootKit.2665
Trojan:Win32/Orsam!rts Microsoft Trojan.KeyLogger.1659
Trojan:Win32/Orsam!rts Microsoft BackDoor.IRC.Wallop.5
Trojan:Win32/Orsam!rts Microsoft Trojan.Siggen.2199
Trojan:Win32/Orsam!rts Microsoft Win32.HLLW.Autoruner.15737
Trojan:Win32/Orsam!rts Microsoft Trojan.MulDrop.10143
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoader.21075
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoader.43034
Trojan:Win32/Orsam!rts Microsoft Trojan.Packed.295
Trojan:Win32/Orsam!rts Microsoft Trojan.PWS.LDPinch.4308
Trojan:Win32/Orsam!rts Microsoft Trojan.Warring.12
Trojan:Win32/Orsam!rts Microsoft Trojan.Lenovo
Trojan:Win32/Orsam!rts Microsoft BackDoor.BO2k.108
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoader.37488
Trojan:Win32/Orsam!rts Microsoft Trojan.Sentinel.based
Trojan:Win32/Orsam!rts Microsoft Trojan.Proxy.3292
Trojan:Win32/Orsam!rts Microsoft Trojan.MulDrop1.4865
Trojan:Win32/Orsam!rts Microsoft Trojan.Packed.436
Trojan:Win32/Orsam!rts Microsoft Trojan.StartPage.21579
Trojan:Win32/Orsam!rts Microsoft Trojan.Siggen.3334
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoader.52974
Trojan:Win32/Orsam!rts Microsoft Trojan.Iespy.445
Trojan:Win32/Orsam!rts Microsoft Trojan.DelAll.111
Trojan:Win32/Orsam!rts Microsoft Trojan.PWS.Wow.1731
Trojan:Win32/Orsam!rts Microsoft Trojan.MulDrop.35592
Trojan:Win32/Orsam!rts Microsoft DDoS.5645
Trojan:Win32/Orsam!rts Microsoft Adware.Dongtian
Trojan:Win32/Orsam!rts Microsoft Trojan.Click.24870
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoad.27615
Trojan:Win32/Orsam!rts Microsoft Trojan.PWS.Gamania.17309
Trojan:Win32/Orsam!rts Microsoft Trojan.LydraSpy.1099
Trojan:Win32/Orsam!rts Microsoft Tool.Fakemake.7
Trojan:Win32/Orsam!rts Microsoft Trojan.KillFiles.578
Trojan:Win32/Orsam!rts Microsoft Trojan.KillFiles
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoader.37845
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoader.49656

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.