Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

WORM_Generic.DIT aliases:

Name Vendor Dr.Web classification name
WORM_Generic.DIT Trend Micro Win32.Spooler
WORM_Generic.DIT Trend Micro BackDoor.Pigeon.11325
WORM_Generic.DIT Trend Micro Win32.HLLW.Autohit.6975
WORM_Generic.DIT Trend Micro Win32.HLLW.Autohit.6902
WORM_Generic.DIT Trend Micro Trojan.DownLoad.1345
WORM_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.2075
WORM_Generic.DIT Trend Micro Trojan.MulDrop.10856
WORM_Generic.DIT Trend Micro Win32.HLLM.Limar.2114
WORM_Generic.DIT Trend Micro Trojan.Msrem.90
WORM_Generic.DIT Trend Micro BackDoor.IRC.Cirilico.77
WORM_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.3573
WORM_Generic.DIT Trend Micro Win32.HLLW.Autohit.8780
WORM_Generic.DIT Trend Micro Trojan.Spambot.2559
WORM_Generic.DIT Trend Micro BackDoor.Mbot.36
WORM_Generic.DIT Trend Micro Trojan.Packed.452
WORM_Generic.DIT Trend Micro Trojan.NtRootKit.885
WORM_Generic.DIT Trend Micro Win32.HLLW.Mofei.21
WORM_Generic.DIT Trend Micro Win32.HLLW.Lime.7
WORM_Generic.DIT Trend Micro Trojan.Rent.166
WORM_Generic.DIT Trend Micro Win32.HLLW.Simbot
WORM_Generic.DIT Trend Micro Trojan.Spambot.3127
WORM_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.3107
WORM_Generic.DIT Trend Micro BackDoor.Pigeon.17263
WORM_Generic.DIT Trend Micro BackDoor.IRC.Simplbot
WORM_Generic.DIT Trend Micro Trojan.NtRootKit.883
WORM_Generic.DIT Trend Micro Win32.HLLW.Stalker
WORM_Generic.DIT Trend Micro Win32.Chiton.6309
WORM_Generic.DIT Trend Micro BackDoor.Siggen.502
WORM_Generic.DIT Trend Micro BackDoor.Pigeon.12692
WORM_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.4977
WORM_Generic.DIT Trend Micro Win32.HLLW.MyBot.4388
WORM_Generic.DIT Trend Micro Win32.HLLW.MyBot.4803
WORM_Generic.DIT Trend Micro Win32.HLLW.MyBot.3996
WORM_Generic.DIT Trend Micro Win32.HLLW.MyBot.4258
WORM_Generic.DIT Trend Micro Trojan.MulDrop.12992
WORM_Generic.DIT Trend Micro Trojan.PWS.Multi.56
WORM_Generic.DIT Trend Micro Trojan.DownLoader.53156
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.6259
WORM_Generic.DIT Trend Micro Trojan.Inject.3595
WORM_Generic.DIT Trend Micro Trojan.DownLoad.25414
WORM_Generic.DIT Trend Micro Trojan.DownLoad.25427
WORM_Generic.DIT Trend Micro Win32.HLLW.Fylly
WORM_Generic.DIT Trend Micro Win32.HLLW.Kober
WORM_Generic.DIT Trend Micro Win32.HLLW.Autohit.9017
WORM_Generic.DIT Trend Micro Trojan.NtRootKit.2880
WORM_Generic.DIT Trend Micro Trojan.PWS.Wsgame.12052
WORM_Generic.DIT Trend Micro Win32.HLLW.Autohit.9109
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.7492
WORM_Generic.DIT Trend Micro BackDoor.Rejoice.96
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.6681

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.