Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Sisproc aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Sisproc Microsoft Trojan.Siggen.7980
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad1.7906
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader1.25201
Trojan:Win32/Sisproc Microsoft Trojan.Mixqu.4
Trojan:Win32/Sisproc Microsoft BackDoor.Pigeon.57668
Trojan:Win32/Sisproc Microsoft Trojan.Siggen2.10047
Trojan:Win32/Sisproc Microsoft Trojan.KillFiles.1237
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.53892
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad1.14682
Trojan:Win32/Sisproc Microsoft Trojan.Siggen1.60479
Trojan:Win32/Sisproc Microsoft Trojan.Siggen1.57921
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader1.25732
Trojan:Win32/Sisproc Microsoft Trojan.Siggen.15766
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad1.13621
Trojan:Win32/Sisproc Microsoft BackDoor.Pigeon.26143
Trojan:Win32/Sisproc Microsoft Trojan.Siggen.33393
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader1.36463
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad1.6014
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad2.17903
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad1.13267
Trojan:Win32/Sisproc Microsoft Trojan.Siggen2.6786
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad1.13874
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad1.14730
Trojan:Win32/Sisproc Microsoft Trojan.AVKill.1160
Trojan:Win32/Sisproc Microsoft Win32.HLLW.Autoruner.8739
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader1.31188
Trojan:Win32/Sisproc Microsoft Trojan.PWS.LDPinch.5311
Trojan:Win32/Sisproc Microsoft BackDoor.Beast.248

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.