Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Sisproc aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.37544
Trojan:Win32/Sisproc Microsoft Trojan.Click.18767
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.4637
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Banker.4837
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.8458
Trojan:Win32/Sisproc Microsoft Trojan.Click.18683
Trojan:Win32/Sisproc Microsoft Adware.Plugin
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.50787
Trojan:Win32/Sisproc Microsoft Trojan.Packed.149
Trojan:Win32/Sisproc Microsoft BackDoor.Agent
Trojan:Win32/Sisproc Microsoft BackDoor.Siggen.572
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.31036
Trojan:Win32/Sisproc Microsoft BackDoor.Vport.26
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.31944
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.26714
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.18346
Trojan:Win32/Sisproc Microsoft Adware.nCase
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.34537
Trojan:Win32/Sisproc Microsoft Win32.HLLW.MyBot.121
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.87
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.49247
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.64903
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.34256
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad1.43191
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad1.42733
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.18197
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.48266
Trojan:Win32/Sisproc Microsoft BackDoor.Siggen.638
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.28136
Trojan:Win32/Sisproc Microsoft BackDoor.Bulknet.213
Trojan:Win32/Sisproc Microsoft BackDoor.Zapinit
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Fably
Trojan:Win32/Sisproc Microsoft Trojan.AVKill.604
Trojan:Win32/Sisproc Microsoft Adware.Baidu
Trojan:Win32/Sisproc Microsoft Win32.HLLP.Lj.1
Trojan:Win32/Sisproc Microsoft Trojan.Spambot.3541
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.49114
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Banker.5870
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.34545
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.33581
Trojan:Win32/Sisproc Microsoft Win32.HLLM.Limar.2275
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.51960
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.27798
Trojan:Win32/Sisproc Microsoft Win32.HLLW.Autoruner.2538
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.5849
Trojan:Win32/Sisproc Microsoft BackDoor.ColdFushion.18
Trojan:Win32/Sisproc Microsoft BackDoor.Sentry.28
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Swz.15
Trojan:Win32/Sisproc Microsoft BackDoor.Shell
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.16323

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.