Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.SFB aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41556
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37136
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40049
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41578
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35647
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41449
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38122
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39678
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41390
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39767
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40899
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39812
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41117
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38115
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.42287
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37980
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41280
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41311
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40833
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40768
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41322
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37122
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38463
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.36743
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35513
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41023
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38129
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37878
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37542
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37840
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.36587
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35528
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37485
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37731
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39118
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40061
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.39976
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.40062
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41204
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.36700
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.35566
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.41402
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.37296
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.36967
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.38218
TROJ_Generic.SFB Trend Micro Trojan.Packed.365
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.46314
TROJ_Generic.SFB Trend Micro BackDoor.Huai.2967
TROJ_Generic.SFB Trend Micro Win32.HLLW.MyBot.5588
TROJ_Generic.SFB Trend Micro Win32.HLLW.Autoruner.16077

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.