Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Sisrop!rts aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Sisrop!rts Microsoft Trojan.MulDrop.20976
Trojan:Win32/Sisrop!rts Microsoft Trojan.DownLoader.32516
Trojan:Win32/Sisrop!rts Microsoft Trojan.Click.18683
Trojan:Win32/Sisrop!rts Microsoft Trojan.PWS.Qqpass.2048
Trojan:Win32/Sisrop!rts Microsoft BackDoor.Sicklebot
Trojan:Win32/Sisrop!rts Microsoft Trojan.MulDrop.3430
Trojan:Win32/Sisrop!rts Microsoft Trojan.Proxy.5104
Trojan:Win32/Sisrop!rts Microsoft BackDoor.Xdoor.357
Trojan:Win32/Sisrop!rts Microsoft Trojan.PWS.Wow
Trojan:Win32/Sisrop!rts Microsoft Trojan.Proxy.3735
Trojan:Win32/Sisrop!rts Microsoft Trojan.PWS.Camspy
Trojan:Win32/Sisrop!rts Microsoft Trojan.PWS.Panda.30
Trojan:Win32/Sisrop!rts Microsoft Trojan.PWS.Panda.9
Trojan:Win32/Sisrop!rts Microsoft Trojan.Okuks.based
Trojan:Win32/Sisrop!rts Microsoft Trojan.Click.4908
Trojan:Win32/Sisrop!rts Microsoft Trojan.DownLoader.38030
Trojan:Win32/Sisrop!rts Microsoft Trojan.PWS.Panda.31
Trojan:Win32/Sisrop!rts Microsoft Trojan.PWS.Panda.4
Trojan:Win32/Sisrop!rts Microsoft Trojan.DownLoader.62308
Trojan:Win32/Sisrop!rts Microsoft BackDoor.Pigeon.20445
Trojan:Win32/Sisrop!rts Microsoft Trojan.Seeker.197
Trojan:Win32/Sisrop!rts Microsoft Trojan.MulDrop.9139
Trojan:Win32/Sisrop!rts Microsoft BackDoor.Blade.13
Trojan:Win32/Sisrop!rts Microsoft Trojan.PWS.GoldSpy
Trojan:Win32/Sisrop!rts Microsoft Trojan.DownLoader.36289
Trojan:Win32/Sisrop!rts Microsoft Trojan.DownLoader.36318
Trojan:Win32/Sisrop!rts Microsoft Trojan.DownLoader.60994
Trojan:Win32/Sisrop!rts Microsoft Trojan.PWS.Gamania.17305
Trojan:Win32/Sisrop!rts Microsoft Win32.HLLW.Fagot.18
Trojan:Win32/Sisrop!rts Microsoft BackDoor.Nunaks
Trojan:Win32/Sisrop!rts Microsoft BackDoor.Redgirl.86
Trojan:Win32/Sisrop!rts Microsoft Trojan.DownLoader.37346
Trojan:Win32/Sisrop!rts Microsoft BackDoor.Pigeon.21209
Trojan:Win32/Sisrop!rts Microsoft Trojan.Proxy.3286
Trojan:Win32/Sisrop!rts Microsoft Trojan.Qqthree
Trojan:Win32/Sisrop!rts Microsoft Trojan.PWS.Banker.15180
Trojan:Win32/Sisrop!rts Microsoft Trojan.PWS.Banker.28412
Trojan:Win32/Sisrop!rts Microsoft Trojan.StartPage.20864
Trojan:Win32/Sisrop!rts Microsoft Trojan.PWS.Webmonier
Trojan:Win32/Sisrop!rts Microsoft Trojan.DownLoader.53108
Trojan:Win32/Sisrop!rts Microsoft Trojan.Click.18768
Trojan:Win32/Sisrop!rts Microsoft Trojan.DownLoader.63639
Trojan:Win32/Sisrop!rts Microsoft Trojan.Warapps
Trojan:Win32/Sisrop!rts Microsoft Trojan.DownLoad.277
Trojan:Win32/Sisrop!rts Microsoft Trojan.MulDrop.17215
Trojan:Win32/Sisrop!rts Microsoft Trojan.PWS.Egold
Trojan:Win32/Sisrop!rts Microsoft Trojan.DownLoader.36069
Trojan:Win32/Sisrop!rts Microsoft Trojan.DownLoader.35944
Trojan:Win32/Sisrop!rts Microsoft Trojan.DownLoader.36210
Trojan:Win32/Sisrop!rts Microsoft Win32.HLLW.Rushar

1 2 3 4 5 6 7 8 9 10

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.