Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.SFB aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.SFB Trend Micro Trojan.Click.28180
TROJ_Generic.SFB Trend Micro Win32.HLLW.MyBot.460
TROJ_Generic.SFB Trend Micro Trojan.PWS.Spy.689
TROJ_Generic.SFB Trend Micro Trojan.Siggen.12165
TROJ_Generic.SFB Trend Micro Dialer.Egroup.1495
TROJ_Generic.SFB Trend Micro Trojan.Siggen2.8620
TROJ_Generic.SFB Trend Micro Trojan.Proxy.10409
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.52804
TROJ_Generic.SFB Trend Micro BackDoor.IRC.Sdbot.6794
TROJ_Generic.SFB Trend Micro BackDoor.IRC.Sdbot.5844
TROJ_Generic.SFB Trend Micro Trojan.PWS.Hotevil.6
TROJ_Generic.SFB Trend Micro Trojan.PWS.Banker.53406
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.53208
TROJ_Generic.SFB Trend Micro BackDoor.Dosia.1296
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.54503
TROJ_Generic.SFB Trend Micro BackDoor.IRC.Sdbot.5838
TROJ_Generic.SFB Trend Micro BackDoor.Darkshell.179
TROJ_Generic.SFB Trend Micro BackDoor.Dosia.1293
TROJ_Generic.SFB Trend Micro Adware.Siggen.251
TROJ_Generic.SFB Trend Micro BackDoor.Bifrost.3059
TROJ_Generic.SFB Trend Micro Win32.HLLW.Autoruner.16534
TROJ_Generic.SFB Trend Micro Trojan.Click.28194
TROJ_Generic.SFB Trend Micro BackDoor.IRC.Combot.102
TROJ_Generic.SFB Trend Micro BackDoor.Siggen.1249
TROJ_Generic.SFB Trend Micro BackDoor.PcClient.953
TROJ_Generic.SFB Trend Micro BackDoor.Bifrost.1665
TROJ_Generic.SFB Trend Micro Trojan.Siggen.7753
TROJ_Generic.SFB Trend Micro Trojan.PWS.Spy.359
TROJ_Generic.SFB Trend Micro Trojan.PWS.Siggen.700
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.37243
TROJ_Generic.SFB Trend Micro Trojan.Click.38878
TROJ_Generic.SFB Trend Micro Trojan.Siggen.12154
TROJ_Generic.SFB Trend Micro BackDoor.Siggen.12303
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.53418
TROJ_Generic.SFB Trend Micro Trojan.Siggen.12326
TROJ_Generic.SFB Trend Micro BackDoor.IRC.Sdbot.7406
TROJ_Generic.SFB Trend Micro BackDoor.Siggen.1677
TROJ_Generic.SFB Trend Micro Win32.HLLW.MyBot.6787
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.37753
TROJ_Generic.SFB Trend Micro BackDoor.IRC.Sdbot.10939
TROJ_Generic.SFB Trend Micro Trojan.Proxy.6562
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.58918
TROJ_Generic.SFB Trend Micro Trojan.Siggen.6353
TROJ_Generic.SFB Trend Micro Trojan.Popuper.16276
TROJ_Generic.SFB Trend Micro BackDoor.Bifrost.8221
TROJ_Generic.SFB Trend Micro BackDoor.Spy.131
TROJ_Generic.SFB Trend Micro Trojan.Siggen.8272
TROJ_Generic.SFB Trend Micro Trojan.PWS.Lineage.7004
TROJ_Generic.SFB Trend Micro BackDoor.Insti.544
TROJ_Generic.SFB Trend Micro Trojan.Siggen.8339

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.