Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Sisproc aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Sisproc Microsoft Trojan.Inject.5347
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Wsgame.5359
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.3843
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.31791
Trojan:Win32/Sisproc Microsoft Win32.HLLW.Lime.based.18
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.13703
Trojan:Win32/Sisproc Microsoft Trojan.StartPage.382
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Pro
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.8523
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.50019
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Wsgame.6372
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.10801
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.52376
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.27761
Trojan:Win32/Sisproc Microsoft Trojan.Siggen.4446
Trojan:Win32/Sisproc Microsoft Trojan.Psbot
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.50142
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.50141
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.44910
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Banker.1035
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Zuzu
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.7665
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.47436
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.55454
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.35938
Trojan:Win32/Sisproc Microsoft BackDoor.Pigeon.21914
Trojan:Win32/Sisproc Microsoft Trojan.PWS.Gamania.8784
Trojan:Win32/Sisproc Microsoft BackDoor.Tash
Trojan:Win32/Sisproc Microsoft BackDoor.Pigeon.9706
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.31437
Trojan:Win32/Sisproc Microsoft Trojan.Click.17948
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.929
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.21057
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.14563
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.59565
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.42841
Trojan:Win32/Sisproc Microsoft Trojan.Click.17958
Trojan:Win32/Sisproc Microsoft Trojan.LiveSpy
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.3665
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.19401
Trojan:Win32/Sisproc Microsoft Trojan.Click.49734
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.64901
Trojan:Win32/Sisproc Microsoft BackDoor.Gold
Trojan:Win32/Sisproc Microsoft Trojan.KeyLogger.2399
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.64465
Trojan:Win32/Sisproc Microsoft Trojan.DownLoader.13979
Trojan:Win32/Sisproc Microsoft Win32.HLLM.Limar.2640
Trojan:Win32/Sisproc Microsoft Trojan.DownLoad.47342
Trojan:Win32/Sisproc Microsoft Trojan.PWS.GoldSpy.2167
Trojan:Win32/Sisproc Microsoft Trojan.MulDrop.4163

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.