Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.SFB aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.SFB Trend Micro Adware.Siggen.2677
TROJ_Generic.SFB Trend Micro Adware.Dodoor.93
TROJ_Generic.SFB Trend Micro Adware.Dodoor.96
TROJ_Generic.SFB Trend Micro Adware.Siggen.2485
TROJ_Generic.SFB Trend Micro Adware.Siggen.2708
TROJ_Generic.SFB Trend Micro Adware.Dodoor.104
TROJ_Generic.SFB Trend Micro Adware.Dodoor.106
TROJ_Generic.SFB Trend Micro Adware.Dodoor.101
TROJ_Generic.SFB Trend Micro Trojan.Siggen.1704
TROJ_Generic.SFB Trend Micro Adware.Dodoor.91
TROJ_Generic.SFB Trend Micro Trojan.Siggen.1712
TROJ_Generic.SFB Trend Micro Win32.HLLW.Autoruner.14770
TROJ_Generic.SFB Trend Micro Win32.HLLW.Autoruner.14934
TROJ_Generic.SFB Trend Micro Trojan.PWS.Lineage.6180
TROJ_Generic.SFB Trend Micro Adware.Siggen.3132
TROJ_Generic.SFB Trend Micro DDoS.Siggen.167
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.44972
TROJ_Generic.SFB Trend Micro Win32.HLLW.MyBot.5848
TROJ_Generic.SFB Trend Micro Adware.Siggen.3136
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.46453
TROJ_Generic.SFB Trend Micro Trojan.Siggen.56094
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.46305
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.46935
TROJ_Generic.SFB Trend Micro Trojan.PWS.Panda.14
TROJ_Generic.SFB Trend Micro Adware.Sogou.68
TROJ_Generic.SFB Trend Micro BackDoor.Nobrain.371
TROJ_Generic.SFB Trend Micro Adware.Bho.3107
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.46443
TROJ_Generic.SFB Trend Micro Adware.Cinmus.16597
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.46400
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.46395
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.46434
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.46446
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.43708
TROJ_Generic.SFB Trend Micro Trojan.Click.50168
TROJ_Generic.SFB Trend Micro Trojan.Siggen.60616
TROJ_Generic.SFB Trend Micro Trojan.Siggen.58729
TROJ_Generic.SFB Trend Micro Trojan.PWS.Wow.1167
TROJ_Generic.SFB Trend Micro Trojan.Virtumod.7435
TROJ_Generic.SFB Trend Micro Trojan.Virtumod.441
TROJ_Generic.SFB Trend Micro Trojan.Spambot.8252
TROJ_Generic.SFB Trend Micro Win32.HLLW.MyBot.197
TROJ_Generic.SFB Trend Micro Trojan.Virtumod.402
TROJ_Generic.SFB Trend Micro Win32.HLLW.Autoruner.7594
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.39355
TROJ_Generic.SFB Trend Micro Adware.Cinmus.14670
TROJ_Generic.SFB Trend Micro Adware.Cinmus.14613
TROJ_Generic.SFB Trend Micro Adware.Cinmus.13565
TROJ_Generic.SFB Trend Micro Adware.Cinmus.14799
TROJ_Generic.SFB Trend Micro BackDoor.IRC.Rusbot.7

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.