Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Orsam!rts aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Orsam!rts Microsoft Win32.HLLW.Autohit.8805
Trojan:Win32/Orsam!rts Microsoft Trojan.PWS.Lineage.4351
Trojan:Win32/Orsam!rts Microsoft BackDoor.Bifrost.817
Trojan:Win32/Orsam!rts Microsoft Trojan.PWS.Gamania.17825
Trojan:Win32/Orsam!rts Microsoft Trojan.Inject.5214
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoad1.36414
Trojan:Win32/Orsam!rts Microsoft Win32.HLLW.Autohit.7874
Trojan:Win32/Orsam!rts Microsoft BackDoor.Iam
Trojan:Win32/Orsam!rts Microsoft Win32.HLLW.Mofei.39
Trojan:Win32/Orsam!rts Microsoft Trojan.Blackmailer.1086
Trojan:Win32/Orsam!rts Microsoft Trojan.Shutdown.467
Trojan:Win32/Orsam!rts Microsoft Trojan.Shutdown.439
Trojan:Win32/Orsam!rts Microsoft Trojan.Shutdown.527
Trojan:Win32/Orsam!rts Microsoft Trojan.Swizzor.11188
Trojan:Win32/Orsam!rts Microsoft Trojan.Click.19092
Trojan:Win32/Orsam!rts Microsoft Trojan.Spambot
Trojan:Win32/Orsam!rts Microsoft Trojan.PWS.Qqpass.3092
Trojan:Win32/Orsam!rts Microsoft Program.RemoteAdmin
Trojan:Win32/Orsam!rts Microsoft Trojan.Siggen.2202
Trojan:Win32/Orsam!rts Microsoft Trojan.Copyself.83
Trojan:Win32/Orsam!rts Microsoft BackDoor.Httpbs.4
Trojan:Win32/Orsam!rts Microsoft Trojan.Winlock.146
Trojan:Win32/Orsam!rts Microsoft Trojan.NtRootKit.3540
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoad.2054
Trojan:Win32/Orsam!rts Microsoft Trojan.Click.19620
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoader.10840
Trojan:Win32/Orsam!rts Microsoft BackDoor.Haxur.7
Trojan:Win32/Orsam!rts Microsoft Trojan.Spambot.4331
Trojan:Win32/Orsam!rts Microsoft Trojan.Proxy.1369
Trojan:Win32/Orsam!rts Microsoft Trojan.Noword
Trojan:Win32/Orsam!rts Microsoft BackDoor.Suicide
Trojan:Win32/Orsam!rts Microsoft Program.ServUServer.60
Trojan:Win32/Orsam!rts Microsoft Trojan.Proxy.5129
Trojan:Win32/Orsam!rts Microsoft Trojan.Click.5010
Trojan:Win32/Orsam!rts Microsoft Trojan.PWS.Gamania.17796
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoad.34706
Trojan:Win32/Orsam!rts Microsoft Trojan.Winlock.42
Trojan:Win32/Orsam!rts Microsoft Trojan.WinSpy.259
Trojan:Win32/Orsam!rts Microsoft Trojan.BrowseBan.61
Trojan:Win32/Orsam!rts Microsoft Trojan.Siggen.3067
Trojan:Win32/Orsam!rts Microsoft Trojan.PWS.Wsgame.18197
Trojan:Win32/Orsam!rts Microsoft Trojan.Packed.158
Trojan:Win32/Orsam!rts Microsoft BackDoor.Beizhu.2377
Trojan:Win32/Orsam!rts Microsoft BackDoor.Fk.9
Trojan:Win32/Orsam!rts Microsoft Trojan.DownLoader.62423
Trojan:Win32/Orsam!rts Microsoft Trojan.Siggen.64148
Trojan:Win32/Orsam!rts Microsoft Trojan.Siggen.63749
Trojan:Win32/Orsam!rts Microsoft Trojan.Siggen.58745
Trojan:Win32/Orsam!rts Microsoft FDOS.Storm.12
Trojan:Win32/Orsam!rts Microsoft Trojan.Proxy.13290

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.