Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Sisproc aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Sisproc Microsoft Win32.HLLW.Autoruner.15195
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Banker.4961
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.39758
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.53092
Trojan:Win32/Sisproc Microsoft BackDoor.Pigeon.23645
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.35558
Trojan:Win32/Sisproc Microsoft BackDoor.Pigeon.9133
Trojan:Win32/Sisproc Microsoft Trojan.Packed.366
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Wsgame.17213
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.11672
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.19046
Trojan:Win32/Sisproc Microsoft BackDoor.Cia.82
Trojan:Win32/Sisproc Microsoft Trojan.PWS.GoldSpy.2705
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.47368
Trojan:Win32/Sisproc Microsoft BackDoor.Pigeon.5102
Trojan:Win32/Sisproc Microsoft Trojan.Isbar.458
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.57260
Trojan:Win32/Sisproc Microsoft BackDoor.Sentry.16
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.10242
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.14521
Trojan:Win32/Sisproc Microsoft Trojan.Click.1577
Trojan:Win32/Sisproc Microsoft BackDoor.Pigeon.6871
Trojan:Win32/Sisproc Microsoft Trojan.Click.49635
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.40447
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.56395
Trojan:Win32/Sisproc Microsoft Trojan.Touch.origin
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Swz
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.6159
Trojan:Win32/Sisproc Microsoft Win32.HLLW.Booti
Trojan:Win32/Sisproc Microsoft BackDoor.Xepher
Trojan:Win32/Sisproc Microsoft BackDoor.Dong
Trojan:Win32/Sisproc Microsoft Trojan.Adcab
Trojan:Win32/Sisproc Microsoft Trojan.Inject.8385
Trojan:Win32/Sisproc Microsoft Adware.Baidu.352
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.613
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.26607
Trojan:Win32/Sisproc Microsoft Trojan.Siggen1.5791
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.35118
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Banker.26421
Trojan:Win32/Sisproc Microsoft Trojan.Ugly.29360
Trojan:Win32/Sisproc Microsoft BackDoor.Sentry.34
Trojan:Win32/Sisproc Microsoft BackDoor.Beizhu.808
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.59629
Trojan:Win32/Sisproc Microsoft BackDoor.Pigeon.3759
Trojan:Win32/Sisproc Microsoft BackDoor.Shexpi
Trojan:Win32/Sisproc Microsoft Trojan.Siggen.56685
Trojan:Win32/Sisproc Microsoft BackDoor.Dgrat.132
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.3771
Trojan:Win32/Sisproc Microsoft BackDoor.Pigeon.23126
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.1816

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.