Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanDropper:Win32/Srizbi.gen!D aliases:

Name Vendor Dr.Web classification name
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Spambot.3347
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Spambot.3201
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.DownLoad.1381
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.MulDrop.18178
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Spambot.3541
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.MulDrop.17827
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel.117
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel.115
TrojanDropper:Win32/Srizbi.gen!D Microsoft BackDoor.Bulknet.201
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel.118
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.MulDrop.10117
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel.105
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel.135
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.DownLoader.22902
TrojanDropper:Win32/Srizbi.gen!D Microsoft BackDoor.Bulknet.187
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.MulDrop.8732
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel.112
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel.130
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel.106
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Spambot.3151
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Packed.560
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel.101
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Spambot.3632
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel.154
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Spambot.3089
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.MulDrop.20012
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Packed.436
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Spambot.3538
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel.144
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel.148
TrojanDropper:Win32/Srizbi.gen!D Microsoft BackDoor.Bulknet
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Spambot.2904
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.NtRootKit.774
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.MulDrop.10962
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.MulDrop.10867
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Spambot.2400
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Spambot.3096
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Spambot.3097
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel.95
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel.97
TrojanDropper:Win32/Srizbi.gen!D Microsoft BackDoor.Bulknet.192
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.Sentinel.100
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.NtRootKit.1145
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.MulDrop.9325
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.MulDrop.9287
TrojanDropper:Win32/Srizbi.gen!D Microsoft Win32.Virut.56
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.NtRootKit.433
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.MulDrop1.4779
TrojanDropper:Win32/Srizbi.gen!D Microsoft Trojan.NtRootKit.371

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.