Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Rimecud.A aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Rimecud.A Microsoft Trojan.Packed.20312
Trojan:Win32/Rimecud.A Microsoft Trojan.MulDrop1.41194
Trojan:Win32/Rimecud.A Microsoft Trojan.MulDrop1.41678
Trojan:Win32/Rimecud.A Microsoft Win32.HLLW.Autoruner.22584
Trojan:Win32/Rimecud.A Microsoft Trojan.Packed.21305
Trojan:Win32/Rimecud.A Microsoft Trojan.Packed.21155
Trojan:Win32/Rimecud.A Microsoft Trojan.Packed.21241
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.11882
Trojan:Win32/Rimecud.A Microsoft Trojan.MulDrop1.43045
Trojan:Win32/Rimecud.A Microsoft BackDoor.Butter.23
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.15382
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.12342
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.15076
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.11800
Trojan:Win32/Rimecud.A Microsoft Trojan.DownLoader1.29526
Trojan:Win32/Rimecud.A Microsoft Win32.HLLW.Lime.670
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.11838
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.13129
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.14794
Trojan:Win32/Rimecud.A Microsoft Win32.HLLW.Lime.640
Trojan:Win32/Rimecud.A Microsoft Win32.HLLW.Lime.658
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.15199
Trojan:Win32/Rimecud.A Microsoft Trojan.MulDrop.55658
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.15190
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.13540
Trojan:Win32/Rimecud.A Microsoft Win32.HLLW.Lime.668
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.15425
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.15401
Trojan:Win32/Rimecud.A Microsoft Win32.HLLW.Lime.651
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.15410
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.14990
Trojan:Win32/Rimecud.A Microsoft BackDoor.Tdss.4647
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.12270
Trojan:Win32/Rimecud.A Microsoft Trojan.DownLoader1.28315
Trojan:Win32/Rimecud.A Microsoft Trojan.Siggen2.10032
Trojan:Win32/Rimecud.A Microsoft Win32.HLLW.Lime.653
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.13396
Trojan:Win32/Rimecud.A Microsoft Trojan.MulDrop1.52080
Trojan:Win32/Rimecud.A Microsoft Trojan.MulDrop1.55322
Trojan:Win32/Rimecud.A Microsoft Trojan.Packed.21329
Trojan:Win32/Rimecud.A Microsoft Trojan.Click1.25883
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.15403
Trojan:Win32/Rimecud.A Microsoft Trojan.DownLoader1.25187
Trojan:Win32/Rimecud.A Microsoft Win32.HLLW.Lime.644
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.15402
Trojan:Win32/Rimecud.A Microsoft Trojan.Siggen1.58262
Trojan:Win32/Rimecud.A Microsoft Trojan.AVKill.2677
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.13829
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.14847
Trojan:Win32/Rimecud.A Microsoft Trojan.Inject.15126

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.