Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

WORM_Generic.DIT aliases:

Name Vendor Dr.Web classification name
WORM_Generic.DIT Trend Micro Win32.HLLW.Autohit.9649
WORM_Generic.DIT Trend Micro Win32.HLLW.MyBot.95
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.3642
WORM_Generic.DIT Trend Micro Win32.HLLM.Beagle.based
WORM_Generic.DIT Trend Micro Trojan.MulDrop.18183
WORM_Generic.DIT Trend Micro BackDoor.DarkMoon.138
WORM_Generic.DIT Trend Micro Trojan.DownLoad.12610
WORM_Generic.DIT Trend Micro Win32.HLLW.Genesis
WORM_Generic.DIT Trend Micro Win32.HLLW.MyBot.7
WORM_Generic.DIT Trend Micro Win32.HLLW.Autohit.9158
WORM_Generic.DIT Trend Micro Win32.HLLW.Randi
WORM_Generic.DIT Trend Micro Win32.HLLW.Autohit.6855
WORM_Generic.DIT Trend Micro Win32.HLLW.Medbod.770
WORM_Generic.DIT Trend Micro Win32.HLLW.Autohit.7141
WORM_Generic.DIT Trend Micro Win32.HLLW.Autohit.8992
WORM_Generic.DIT Trend Micro Win32.HLLW.Autohit.6782
WORM_Generic.DIT Trend Micro Trojan.MulDrop.14205
WORM_Generic.DIT Trend Micro Win32.Lsabot
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.16286
WORM_Generic.DIT Trend Micro Win32.HLLW.Autohit.8008
WORM_Generic.DIT Trend Micro Trojan.Hooker.205
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.7650
WORM_Generic.DIT Trend Micro BackDoor.IRC.Sdbot.4987
WORM_Generic.DIT Trend Micro Win32.HLLW.Autohit.6856
WORM_Generic.DIT Trend Micro Win32.HLLW.Texmer.42
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.14594
WORM_Generic.DIT Trend Micro Trojan.Inject.683
WORM_Generic.DIT Trend Micro Program.3Proxy.69
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.15354
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.14196
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.15298
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.14416
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.14493
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.14522
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.14188
WORM_Generic.DIT Trend Micro Win32.HLLM.Dref.39
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.6610
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.14337
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.15460
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.14694
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.15493
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.14938
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.14901
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.14543
WORM_Generic.DIT Trend Micro Win32.HLLM.MyDoom.553
WORM_Generic.DIT Trend Micro Win32.HLLW.Autoruner.14236
WORM_Generic.DIT Trend Micro Trojan.DnsChange.961
WORM_Generic.DIT Trend Micro BackDoor.Huai.1517
WORM_Generic.DIT Trend Micro Win32.HLLW.Grasp.4
WORM_Generic.DIT Trend Micro DDoS.Attack.31

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.