Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.SFB aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.SFB Trend Micro Trojan.PWS.Bancos.2230
TROJ_Generic.SFB Trend Micro Trojan.PWS.Bancos.2686
TROJ_Generic.SFB Trend Micro Trojan.PWS.Bancos.2334
TROJ_Generic.SFB Trend Micro Trojan.PWS.Bancos.2310
TROJ_Generic.SFB Trend Micro Win32.HLLW.Autoruner.2796
TROJ_Generic.SFB Trend Micro Tool.DialupPass.270
TROJ_Generic.SFB Trend Micro Tool.Siggen.1540
TROJ_Generic.SFB Trend Micro Tool.Siggen.2098
TROJ_Generic.SFB Trend Micro Adware.Bho.360
TROJ_Generic.SFB Trend Micro Trojan.MulDrop1.4231
TROJ_Generic.SFB Trend Micro Trojan.MulDrop1.4447
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.44048
TROJ_Generic.SFB Trend Micro Trojan.DownLoader.62364
TROJ_Generic.SFB Trend Micro Tool.Yabrute
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.36009
TROJ_Generic.SFB Trend Micro Trojan.PWS.Wsgame.12411
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35639
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38846
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40961
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40337
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.36031
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.36076
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40664
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38110
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.36866
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39490
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.36480
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41367
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38157
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37978
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41890
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39834
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35853
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38374
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38529
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37892
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.36056
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35484
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41417
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39298
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.36400
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39492
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41164
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37467
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40850
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41239
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39301
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35522
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39804
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37424

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.