Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Orsam!rts aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Orsam!rts Microsoft Adware.Cashon.54
Trojan:Win32/Orsam!rts Microsoft Trojan.Proxy.1780
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoader.54879
Trojan:Win32/Orsam!rts Microsoft Win32.HLLW.Autohit.7223
Trojan:Win32/Orsam!rts Microsoft BackDoor.Maper
Trojan:Win32/Orsam!rts Microsoft Trojan.PWS.Webmonier.60
Trojan:Win32/Orsam!rts Microsoft Trojan.Havedo
Trojan:Win32/Orsam!rts Microsoft Trojan.PWS.Spy.69
Trojan:Win32/Orsam!rts Microsoft Trojan.Wmchange
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoad.36238
Trojan:Win32/Orsam!rts Microsoft Trojan.PWS.Gamania.17943
Trojan:Win32/Orsam!rts Microsoft Win32.HLLW.Bigga.102
Trojan:Win32/Orsam!rts Microsoft Win32.HLLW.Bigga.101
Trojan:Win32/Orsam!rts Microsoft Trojan.Click.4817
Trojan:Win32/Orsam!rts Microsoft Trojan.MulDrop.34047
Trojan:Win32/Orsam!rts Microsoft Trojan.EmailSpy.208
Trojan:Win32/Orsam!rts Microsoft BackDoor.Rozmowa.35
Trojan:Win32/Orsam!rts Microsoft VirusConstructor.Minipanzer
Trojan:Win32/Orsam!rts Microsoft Win32.HLLW.Medbod.864
Trojan:Win32/Orsam!rts Microsoft Trojan.Proxy.794
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoad.948
Trojan:Win32/Orsam!rts Microsoft Trojan.Tenax
Trojan:Win32/Orsam!rts Microsoft BackDoor.Theef.111
Trojan:Win32/Orsam!rts Microsoft Trojan.KeyLogger.3268
Trojan:Win32/Orsam!rts Microsoft Trojan.Click.25895
Trojan:Win32/Orsam!rts Microsoft Adware.MegaSearch.23
Trojan:Win32/Orsam!rts Microsoft Program.Wpe
Trojan:Win32/Orsam!rts Microsoft Trojan.MSNSpy.13
Trojan:Win32/Orsam!rts Microsoft Program.HideVault
Trojan:Win32/Orsam!rts Microsoft Trojan.Dumb.3
Trojan:Win32/Orsam!rts Microsoft Tool.Elfwrsec
Trojan:Win32/Orsam!rts Microsoft Trojan.Winlock.215
Trojan:Win32/Orsam!rts Microsoft BackDoor.Merojan.35
Trojan:Win32/Orsam!rts Microsoft BackDoor.Hackdoor.23
Trojan:Win32/Orsam!rts Microsoft Trojan.Winlock.313
Trojan:Win32/Orsam!rts Microsoft Trojan.Siggen1.5456
Trojan:Win32/Orsam!rts Microsoft Trojan.Siggen1.6254
Trojan:Win32/Orsam!rts Microsoft Trojan.Siggen1.5421
Trojan:Win32/Orsam!rts Microsoft Trojan.Siggen1.5536
Trojan:Win32/Orsam!rts Microsoft Trojan.KeyLogger.5413
Trojan:Win32/Orsam!rts Microsoft Trojan.Siggen.4800
Trojan:Win32/Orsam!rts Microsoft Trojan.PWS.Qqpass.2097
Trojan:Win32/Orsam!rts Microsoft Trojan.MulDrop.23267
Trojan:Win32/Orsam!rts Microsoft Trojan.PWS.Brauz.9
Trojan:Win32/Orsam!rts Microsoft BackDoor.Poison.812
Trojan:Win32/Orsam!rts Microsoft Trojan.KeyLogger.3519
Trojan:Win32/Orsam!rts Microsoft Trojan.Proxy.1996
Trojan:Win32/Orsam!rts Microsoft Trojan.Proxy.972
Trojan:Win32/Orsam!rts Microsoft Trojan.Click.27363
Trojan:Win32/Orsam!rts Microsoft Trojan.Persuit

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.