Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Sisproc aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.3483
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.3287
Trojan:Win32/Sisproc Microsoft Trojan.Hobot
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Banker.1617
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.11531
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Qqpass.2715
Trojan:Win32/Sisproc Microsoft Dialer.Von
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.30737
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Gamania.10735
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Banker.4430
Trojan:Win32/Sisproc Microsoft Trojan.AVKill.144
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Banker.4497
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.30203
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.11409
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.11349
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Gamania.6152
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.30753
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.30672
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.30701
Trojan:Win32/Sisproc Microsoft BackDoor.Pigeon.12116
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Hangame
Trojan:Win32/Sisproc Microsoft Trojan.Siggen.1911
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.38302
Trojan:Win32/Sisproc Microsoft Trojan.Guis
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.9549
Trojan:Win32/Sisproc Microsoft Trojan.Thunder
Trojan:Win32/Sisproc Microsoft BackDoor.HackDef.438
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Kpo
Trojan:Win32/Sisproc Microsoft Win32.HLLW.Autoruner.6375
Trojan:Win32/Sisproc Microsoft Trojan.Proxy.8176
Trojan:Win32/Sisproc Microsoft Trojan.Johnny
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.7058
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.27923
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.38846
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.38845
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.38840
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.38843
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.38841
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.38799
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.38842
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.38844
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.12792
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.28867
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.27838
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.49725
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.63327
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.37846
Trojan:Win32/Sisproc Microsoft Trojan.Winlock
Trojan:Win32/Sisproc Microsoft Trojan.Navapsvcer.28
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Gamania.10892

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.