Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.SFB aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.SFB Trend Micro Trojan.Click.50035
TROJ_Generic.SFB Trend Micro Trojan.Click.49737
TROJ_Generic.SFB Trend Micro Trojan.Click.50011
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.43661
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.3733
TROJ_Generic.SFB Trend Micro BackDoor.Citadel.6
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.12077
TROJ_Generic.SFB Trend Micro Tool.Transmit
TROJ_Generic.SFB Trend Micro Trojan.Siggen.58641
TROJ_Generic.SFB Trend Micro Trojan.PWS.Legmir.2448
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.44748
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.44758
TROJ_Generic.SFB Trend Micro Trojan.Virtumod.based.12
TROJ_Generic.SFB Trend Micro Trojan.Click.26119
TROJ_Generic.SFB Trend Micro BackDoor.Puma.3
TROJ_Generic.SFB Trend Micro Trojan.Sniff.91
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40051
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41234
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38873
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41518
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38728
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.36112
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38282
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39068
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35881
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37455
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39761
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37820
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39144
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41512
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.36938
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40453
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41182
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39181
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35550
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35886
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35559
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37494
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39304
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35760
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40020
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40371
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38370
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38554
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35466
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37349
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41200
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.36275
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.46287
TROJ_Generic.SFB Trend Micro Trojan.Packed.404

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.