Trojan:Win32/Dorv.B!rfn
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Ranking: | 3,887 |
Threat Level: | 90 % (High) |
Infected Computers: | 46,516 |
First Seen: | September 2, 2015 |
Last Seen: | September 20, 2023 |
OS(es) Affected: | Windows |
The Trojan:Win32/Dorv.B!rfn malware is spread among PC users with the help of spam mail, fake updates to Adobe Flash Player and may be incorporated with free programs on untrusted software centers. The Dorv.B!rfn trojan may place its files in the Temp folder to evade security scans and may modify your Windows Registry to start at boot-up. Malware researchers note that Trojan:Win32/Dorv.B!rfn is similar to Trojan:Win32/Ropest and Trojan:Win32/Reveton.A and might decrease your computer performance as it is resource-hungry. Trojan:Win32/Dorv.B!rfn can send information like your system properties, Internet browsing history to its C&C (command and control) servers. The hackers that operate Trojan:Win32/Dorv.B!rfn can use it to record your keystrokes and install other malware like Alureon and Pihar. There are cases where hackers that operate trojans like Trojan:Win32/Dorv.B!rfn install ransomware such as CryptoWall and Onion to earn affiliate revenue. Moreover, experts note that Trojan:Win32/Dorv.B!rfn is used for click fraud predominantly. Your Internet bandwidth may be limited, and your browser may crash as long as Trojan:Win32/Dorv.B!rfn is on your system. Also, Trojan:Win32/Dorv.B!rfn may attempt to disable your Windows Firewall and allow third parties to access your PC remotely. You may want to seek the assistance of a trustworthy anti-malware tool to eliminate Trojan:Win32/Dorv.B!rfn and secure your system.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.