Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Sisproc aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.13686
Trojan:Win32/Sisproc Microsoft Trojan.Lucifer
Trojan:Win32/Sisproc Microsoft BackDoor.Manslut
Trojan:Win32/Sisproc Microsoft Adware.Newweb
Trojan:Win32/Sisproc Microsoft BackDoor.Zapinit.35
Trojan:Win32/Sisproc Microsoft Trojan.Runex.2
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Lich
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.38980
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.39440
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Banker.4895
Trojan:Win32/Sisproc Microsoft Trojan.Rent.86
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.4247
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.37293
Trojan:Win32/Sisproc Microsoft Win32.HLLO.Blop.36
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.27624
Trojan:Win32/Sisproc Microsoft BackDoor.Huai.3196
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.37189
Trojan:Win32/Sisproc Microsoft BackDoor.Graybird
Trojan:Win32/Sisproc Microsoft BackDoor.Uragan
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.41972
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.58295
Trojan:Win32/Sisproc Microsoft Trojan.Proxy.2670
Trojan:Win32/Sisproc Microsoft Trojan.Click.50026
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.18414
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.33930
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.46697
Trojan:Win32/Sisproc Microsoft Trojan.PWS.LDPinch.4353
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Banker.6109
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.43105
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.5616
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.52695
Trojan:Win32/Sisproc Microsoft BackDoor.Generic.1269
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.57256
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.30867
Trojan:Win32/Sisproc Microsoft BAT.DownLoader.4
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.52360
Trojan:Win32/Sisproc Microsoft BackDoor.Beizhu.429
Trojan:Win32/Sisproc Microsoft Win32.HLLM.Beater
Trojan:Win32/Sisproc Microsoft BackDoor.Jxspy.11
Trojan:Win32/Sisproc Microsoft Adware.IEHelper
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.1375
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.29388
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.12403
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.50790
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.54897
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.33486
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Banker.4423
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.47351
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.14562
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.39006

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.