Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Bisar!rts aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Bisar!rts Microsoft Trojan.MulDrop.18956
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison.40
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison.686
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison.857
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison.858
Backdoor:Win32/Bisar!rts Microsoft Trojan.PWS.Banker.27265
Backdoor:Win32/Bisar!rts Microsoft Trojan.DownLoad1.37169
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison.864
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison.865
Backdoor:Win32/Bisar!rts Microsoft Tool.PassView.111
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Bifrost.8
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Pigeon.17504
Backdoor:Win32/Bisar!rts Microsoft Trojan.Inject.5198
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison.1032
Backdoor:Win32/Bisar!rts Microsoft Trojan.DownLoad1.41460
Backdoor:Win32/Bisar!rts Microsoft Trojan.MulDrop.28828
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison
Backdoor:Win32/Bisar!rts Microsoft Trojan.KeyLogger.2331
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison.889
Backdoor:Win32/Bisar!rts Microsoft Adware.Letscool
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison.55
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison.474
Backdoor:Win32/Bisar!rts Microsoft Tool.DialupPass
Backdoor:Win32/Bisar!rts Microsoft Trojan.MulDrop.30030
Backdoor:Win32/Bisar!rts Microsoft Trojan.MulDrop.31614
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison.50
Backdoor:Win32/Bisar!rts Microsoft Trojan.Packed.418
Backdoor:Win32/Bisar!rts Microsoft Trojan.Packed.158
Backdoor:Win32/Bisar!rts Microsoft Trojan.DownLoader.49535
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Bifrost.40
Backdoor:Win32/Bisar!rts Microsoft Trojan.Siggen.2245
Backdoor:Win32/Bisar!rts Microsoft Trojan.MulDrop.29819
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison.680
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison.1021
Backdoor:Win32/Bisar!rts Microsoft Trojan.DownLoader.46203
Backdoor:Win32/Bisar!rts Microsoft Trojan.PWS.LDPinch.3420
Backdoor:Win32/Bisar!rts Microsoft Trojan.Popuper.5540
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison.859
Backdoor:Win32/Bisar!rts Microsoft Trojan.Inject.5854
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Bifrost.750
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Spy.36
Backdoor:Win32/Bisar!rts Microsoft Trojan.PWS.Siggen.3643
Backdoor:Win32/Bisar!rts Microsoft Trojan.Inject.5089
Backdoor:Win32/Bisar!rts Microsoft Trojan.Inject.3299
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Poison.868
Backdoor:Win32/Bisar!rts Microsoft Trojan.MulDrop.32791
Backdoor:Win32/Bisar!rts Microsoft Trojan.Inject.5199
Backdoor:Win32/Bisar!rts Microsoft Trojan.DownLoader.20583
Backdoor:Win32/Bisar!rts Microsoft BackDoor.Bifrost
Backdoor:Win32/Bisar!rts Microsoft Trojan.Siggen.6106

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.