Library
My library

Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanDownloader:Win32/Cutwail.AJ aliases:

Name Vendor Dr.Web classification name
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.23598
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.Siggen.1641
TrojanDownloader:Win32/Cutwail.AJ Microsoft Win32.HLLC.Sys.1
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.32942
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.33158
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.38937
TrojanDownloader:Win32/Cutwail.AJ Microsoft BackDoor.Bulknet.396
TrojanDownloader:Win32/Cutwail.AJ Microsoft BackDoor.Siggen.584
TrojanDownloader:Win32/Cutwail.AJ Microsoft BackDoor.Bulknet.214
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.40159
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.Inject.5751
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoader.origin
TrojanDownloader:Win32/Cutwail.AJ Microsoft BackDoor.Bulknet.402
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.38526
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.56178
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.28430
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.51734
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.51257
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.Siggen.6064
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.51381
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad1.12268
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.51925
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.MulDrop.30421
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.52480
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad1.12256
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad1.13051
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.Click.28981
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.Siggen.31367
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.57997
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.53220
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.53158
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.53283
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.57954
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.Siggen.12854
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.Siggen.8414
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.54117
TrojanDownloader:Win32/Cutwail.AJ Microsoft Trojan.DownLoad.54090

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.