Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.SFB aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.SFB Trend Micro Win32.HLLW.Autoruner.17648
TROJ_Generic.SFB Trend Micro Trojan.Siggen.6626
TROJ_Generic.SFB Trend Micro Trojan.Click.28176
TROJ_Generic.SFB Trend Micro Trojan.PWS.Siggen.1680
TROJ_Generic.SFB Trend Micro Tool.Siggen.132
TROJ_Generic.SFB Trend Micro BackDoor.IRC.Sdbot.7204
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.56920
TROJ_Generic.SFB Trend Micro Win32.HLLW.Autoruner.8569
TROJ_Generic.SFB Trend Micro Trojan.Click.28134
TROJ_Generic.SFB Trend Micro Trojan.Siggen.11852
TROJ_Generic.SFB Trend Micro BackDoor.Poison.3477
TROJ_Generic.SFB Trend Micro BackDoor.IRC.Sdbot.6741
TROJ_Generic.SFB Trend Micro BackDoor.Bifrost.1650
TROJ_Generic.SFB Trend Micro Adware.Siggen.138
TROJ_Generic.SFB Trend Micro BackDoor.Bifrost.7259
TROJ_Generic.SFB Trend Micro Trojan.Click.29302
TROJ_Generic.SFB Trend Micro Trojan.Siggen.6885
TROJ_Generic.SFB Trend Micro Trojan.PWS.Hotevil.5
TROJ_Generic.SFB Trend Micro Tool.Pwdump.30
TROJ_Generic.SFB Trend Micro Trojan.Click.28112
TROJ_Generic.SFB Trend Micro Trojan.PWS.Banker.32384
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.54928
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.57189
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.12599
TROJ_Generic.SFB Trend Micro Trojan.Click.34363
TROJ_Generic.SFB Trend Micro Dialer.Virgilio.36
TROJ_Generic.SFB Trend Micro Trojan.KeyLogger.4521
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.18509
TROJ_Generic.SFB Trend Micro Tool.ProcessKill.16
TROJ_Generic.SFB Trend Micro Adware.Siggen.125
TROJ_Generic.SFB Trend Micro Win32.HLLW.Autoruner.7935
TROJ_Generic.SFB Trend Micro Trojan.DownLoad1.17238
TROJ_Generic.SFB Trend Micro BackDoor.Pigeon.26825
TROJ_Generic.SFB Trend Micro Trojan.Proxy.5880
TROJ_Generic.SFB Trend Micro BackDoor.Bifrost.8002
TROJ_Generic.SFB Trend Micro BackDoor.Redgirl.124
TROJ_Generic.SFB Trend Micro Trojan.Siggen.38722
TROJ_Generic.SFB Trend Micro Trojan.Click.28801
TROJ_Generic.SFB Trend Micro BackDoor.IRC.Sdbot.10764
TROJ_Generic.SFB Trend Micro BackDoor.IRC.Sdbot.6334
TROJ_Generic.SFB Trend Micro Trojan.PWS.Dybalom
TROJ_Generic.SFB Trend Micro Trojan.Proxy.8673
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.40353
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.52835
TROJ_Generic.SFB Trend Micro BackDoor.IRC.Sdbot.5830
TROJ_Generic.SFB Trend Micro BackDoor.Siggen.2109
TROJ_Generic.SFB Trend Micro Trojan.PWS.Bancos.471
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.37649
TROJ_Generic.SFB Trend Micro BackDoor.IRC.Sdbot.10742
TROJ_Generic.SFB Trend Micro BackDoor.Bifrost.1723

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.