Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Remhead aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Remhead Microsoft Trojan.DownLoad.44682
Trojan:Win32/Remhead Microsoft BackDoor.Pigeon.11903
Trojan:Win32/Remhead Microsoft Trojan.PWS.Wsgame.4440
Trojan:Win32/Remhead Microsoft BackDoor.Soo
Trojan:Win32/Remhead Microsoft Trojan.PWS.Wsgame.4442
Trojan:Win32/Remhead Microsoft Trojan.PWS.Gamania.6974
Trojan:Win32/Remhead Microsoft Trojan.Inject.952
Trojan:Win32/Remhead Microsoft Trojan.MulDrop.9616
Trojan:Win32/Remhead Microsoft Trojan.DownLoad.39470
Trojan:Win32/Remhead Microsoft Trojan.PWS.Wsgame.4429
Trojan:Win32/Remhead Microsoft Trojan.PWS.Wsgame.4441
Trojan:Win32/Remhead Microsoft Trojan.PWS.Wsgame.4435
Trojan:Win32/Remhead Microsoft Trojan.PWS.Wool
Trojan:Win32/Remhead Microsoft Trojan.PWS.Panda.114
Trojan:Win32/Remhead Microsoft BackDoor.HackDef.709
Trojan:Win32/Remhead Microsoft Trojan.DownLoader.29829
Trojan:Win32/Remhead Microsoft Trojan.PWS.Gamania.5280
Trojan:Win32/Remhead Microsoft Trojan.MulDrop.13726
Trojan:Win32/Remhead Microsoft BackDoor.Pigeon.4450
Trojan:Win32/Remhead Microsoft Trojan.Siggen.3657
Trojan:Win32/Remhead Microsoft Trojan.Swizzor.11406
Trojan:Win32/Remhead Microsoft Trojan.DownLoader.32666
Trojan:Win32/Remhead Microsoft BackDoor.Scard
Trojan:Win32/Remhead Microsoft BackDoor.Graybird
Trojan:Win32/Remhead Microsoft Trojan.DownLoader.18684
Trojan:Win32/Remhead Microsoft Trojan.PWS.Wsgame.4433
Trojan:Win32/Remhead Microsoft Trojan.DownLoader.5178
Trojan:Win32/Remhead Microsoft BackDoor.Beizhu.1366
Trojan:Win32/Remhead Microsoft Trojan.DownLoad.31287
Trojan:Win32/Remhead Microsoft Trojan.DownLoader.17778
Trojan:Win32/Remhead Microsoft Trojan.Yaspy
Trojan:Win32/Remhead Microsoft BackDoor.RemoteABC.8
Trojan:Win32/Remhead Microsoft BackDoor.Beizhu.2487
Trojan:Win32/Remhead Microsoft Trojan.Inject.5486
Trojan:Win32/Remhead Microsoft Trojan.DownLoader.14166
Trojan:Win32/Remhead Microsoft Trojan.MulDrop.14947
Trojan:Win32/Remhead Microsoft Tool.Pwdump.15
Trojan:Win32/Remhead Microsoft Trojan.Spambot.3197
Trojan:Win32/Remhead Microsoft BackDoor.Pigeon.11463
Trojan:Win32/Remhead Microsoft Trojan.PWS.Wsgame.1623
Trojan:Win32/Remhead Microsoft Trojan.DownLoader.13450
Trojan:Win32/Remhead Microsoft BackDoor.Bifrost.651
Trojan:Win32/Remhead Microsoft Trojan.PWS.Wsgame.4897
Trojan:Win32/Remhead Microsoft Tool.Inject.4
Trojan:Win32/Remhead Microsoft Trojan.Spambot.4233
Trojan:Win32/Remhead Microsoft Trojan.Swizzor
Trojan:Win32/Remhead Microsoft Trojan.PWS.Gamania.5191
Trojan:Win32/Remhead Microsoft Trojan.Popuper
Trojan:Win32/Remhead Microsoft Trojan.PWS.Wsgame.1897
Trojan:Win32/Remhead Microsoft Trojan.DownLoad.3689

1 2 3 4 5 6 7 8 9

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.