Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.SFB aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37687
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40376
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39180
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41123
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39902
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35888
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41330
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39663
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35451
TROJ_Generic.SFB Trend Micro Adware.Henbang.75
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.42589
TROJ_Generic.SFB Trend Micro Trojan.Siggen.57781
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.42591
TROJ_Generic.SFB Trend Micro Trojan.Msliksur.5
TROJ_Generic.SFB Trend Micro Adware.Siggen.2970
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.42408
TROJ_Generic.SFB Trend Micro Trojan.Popuper.26725
TROJ_Generic.SFB Trend Micro Trojan.PWS.Spy.4427
TROJ_Generic.SFB Trend Micro Trojan.PWS.Banker.42448
TROJ_Generic.SFB Trend Micro Trojan.Siggen.1732
TROJ_Generic.SFB Trend Micro BackDoor.Turkojan.20
TROJ_Generic.SFB Trend Micro Trojan.PWS.Spy.3645
TROJ_Generic.SFB Trend Micro Trojan.PWS.Spy.4233
TROJ_Generic.SFB Trend Micro Trojan.Click.48640
TROJ_Generic.SFB Trend Micro Trojan.Click.48785
TROJ_Generic.SFB Trend Micro Trojan.Click.45122
TROJ_Generic.SFB Trend Micro Trojan.Click.47210
TROJ_Generic.SFB Trend Micro Trojan.Click.45191
TROJ_Generic.SFB Trend Micro Trojan.PWS.Banker.41192
TROJ_Generic.SFB Trend Micro Trojan.PWS.Banker.41735
TROJ_Generic.SFB Trend Micro Trojan.PWS.Banker.41814
TROJ_Generic.SFB Trend Micro Trojan.PWS.Banker.41766
TROJ_Generic.SFB Trend Micro Trojan.PWS.Banker.42092
TROJ_Generic.SFB Trend Micro Trojan.PWS.Banker.42056
TROJ_Generic.SFB Trend Micro Trojan.PWS.LDPinch.7528
TROJ_Generic.SFB Trend Micro Trojan.PWS.Spy.4045
TROJ_Generic.SFB Trend Micro Trojan.MulDrop1.4678
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35655
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37967
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40293
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.36762
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41400
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35459
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38723
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38195
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39757
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40719
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38272
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40702
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37848

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.