Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_Generic.SFB aliases:

Name Vendor Dr.Web classification name
TROJ_Generic.SFB Trend Micro Trojan.WinSpy
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.10027
TROJ_Generic.SFB Trend Micro Trojan.AVKill.595
TROJ_Generic.SFB Trend Micro BackDoor.Pigeon.15310
TROJ_Generic.SFB Trend Micro Trojan.Packed.511
TROJ_Generic.SFB Trend Micro Trojan.DownLoader.2256
TROJ_Generic.SFB Trend Micro Trojan.Packed.142
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.17243
TROJ_Generic.SFB Trend Micro Tool.BotWatch.2
TROJ_Generic.SFB Trend Micro BackDoor.PcClient
TROJ_Generic.SFB Trend Micro Trojan.Inject.3704
TROJ_Generic.SFB Trend Micro Trojan.DownLoader.54681
TROJ_Generic.SFB Trend Micro BackDoor.Poison.686
TROJ_Generic.SFB Trend Micro Trojan.KeySpy.65
TROJ_Generic.SFB Trend Micro BackDoor.Pigeon.25125
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.47184
TROJ_Generic.SFB Trend Micro Adware.Benega.15
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.47182
TROJ_Generic.SFB Trend Micro Trojan.KeyLogger.1438
TROJ_Generic.SFB Trend Micro BackDoor.Bifrost.750
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.12129
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.16844
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.20078
TROJ_Generic.SFB Trend Micro Trojan.Inject.3693
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.400
TROJ_Generic.SFB Trend Micro Trojan.Click.26421
TROJ_Generic.SFB Trend Micro Adware.Siggen.2906
TROJ_Generic.SFB Trend Micro Win32.HLLW.MyBot.5320
TROJ_Generic.SFB Trend Micro Adware.Siggen.2894
TROJ_Generic.SFB Trend Micro Win32.HLLW.MyBot.5315
TROJ_Generic.SFB Trend Micro Adware.Siggen.2909
TROJ_Generic.SFB Trend Micro Adware.Siggen.2896
TROJ_Generic.SFB Trend Micro Trojan.PWS.GoldSpy
TROJ_Generic.SFB Trend Micro Adware.Bho.335
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.12587
TROJ_Generic.SFB Trend Micro Win32.HLLW.Pacha
TROJ_Generic.SFB Trend Micro Win32.HLLW.MyBot.194
TROJ_Generic.SFB Trend Micro Trojan.PWS.Crm.10
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.46842
TROJ_Generic.SFB Trend Micro Trojan.DownLoad.46855
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.10689
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.28828
TROJ_Generic.SFB Trend Micro Trojan.Packed.638
TROJ_Generic.SFB Trend Micro Adware.Sogou.115
TROJ_Generic.SFB Trend Micro Trojan.DownLoader.61505
TROJ_Generic.SFB Trend Micro Trojan.Click.20339
TROJ_Generic.SFB Trend Micro Trojan.Starman
TROJ_Generic.SFB Trend Micro Trojan.MulDrop.14393
TROJ_Generic.SFB Trend Micro Trojan.DownLoader.62948
TROJ_Generic.SFB Trend Micro Adware.Bho.60

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.