Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Sisproc aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Sisproc Microsoft Trojan.BeagleProxy
Trojan:Win32/Sisproc Microsoft Trojan.Siggen.4594
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.32693
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.46482
Trojan:Win32/Sisproc Microsoft Trojan.Siggen.4680
Trojan:Win32/Sisproc Microsoft Trojan.Siggen.4685
Trojan:Win32/Sisproc Microsoft DDoS.Rincux
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.44909
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.48239
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.48247
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Banker.30969
Trojan:Win32/Sisproc Microsoft Trojan.KeyLogger.1334
Trojan:Win32/Sisproc Microsoft BackDoor.Pigeon.21851
Trojan:Win32/Sisproc Microsoft Trojan.Siggen1.4889
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Gamania.origin
Trojan:Win32/Sisproc Microsoft Trojan.Skysoft
Trojan:Win32/Sisproc Microsoft BackDoor.Beizhu.1366
Trojan:Win32/Sisproc Microsoft BackDoor.IRC.BegBot
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.15954
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.6619
Trojan:Win32/Sisproc Microsoft Tool.Transmit.3
Trojan:Win32/Sisproc Microsoft BackDoor.IRC.Sdbot.4934
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Book
Trojan:Win32/Sisproc Microsoft Trojan.Popuper
Trojan:Win32/Sisproc Microsoft DDoS.Attack.130
Trojan:Win32/Sisproc Microsoft Trojan.Locker.8
Trojan:Win32/Sisproc Microsoft Trojan.Starter.338
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.63548
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.43233
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.12384
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.8992
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader1.1388
Trojan:Win32/Sisproc Microsoft BackDoor.Bandito.12
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.3005
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.50237
Trojan:Win32/Sisproc Microsoft BackDoor.Pigeon.9842
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Banker.17009
Trojan:Win32/Sisproc Microsoft BackDoor.Pigeon.22847
Trojan:Win32/Sisproc Microsoft BackDoor.Siggen.838
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.48190
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.48250
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.48263
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.48246
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.48219
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.48243
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.48208
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.56931
Trojan:Win32/Sisproc Microsoft BackDoor.ProRat.16
Trojan:Win32/Sisproc Microsoft BackDoor.IRC.Tongbot
Trojan:Win32/Sisproc Microsoft BackDoor.Attack.91

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.