Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TrojanDownloader:Win32/Cutwail.S aliases:

Name Vendor Dr.Web classification name
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.Rntm.6
TrojanDownloader:Win32/Cutwail.S Microsoft BackDoor.Bulknet.225
TrojanDownloader:Win32/Cutwail.S Microsoft BackDoor.Bulknet.219
TrojanDownloader:Win32/Cutwail.S Microsoft BackDoor.Bulknet.206
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.Inject.3570
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.Inject.3477
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.63553
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.63566
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.59056
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoad.932
TrojanDownloader:Win32/Cutwail.S Microsoft BackDoor.Bulknet.171
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.61474
TrojanDownloader:Win32/Cutwail.S Microsoft BackDoor.Bulknet.223
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoad.2077
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.Rntm.16
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.Rntm.8
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.59496
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoad.3187
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.63903
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.59701
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.57335
TrojanDownloader:Win32/Cutwail.S Microsoft BackDoor.Bulknet.217
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.59094
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.63655
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoad.3764
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoad.3682
TrojanDownloader:Win32/Cutwail.S Microsoft BackDoor.Bulknet.210
TrojanDownloader:Win32/Cutwail.S Microsoft BackDoor.Bulknet.203
TrojanDownloader:Win32/Cutwail.S Microsoft BackDoor.Bulknet.185
TrojanDownloader:Win32/Cutwail.S Microsoft BackDoor.Bulknet.184
TrojanDownloader:Win32/Cutwail.S Microsoft BackDoor.Bulknet.208
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.62373
TrojanDownloader:Win32/Cutwail.S Microsoft BackDoor.Bulknet.220
TrojanDownloader:Win32/Cutwail.S Microsoft BackDoor.Bulknet.209
TrojanDownloader:Win32/Cutwail.S Microsoft BackDoor.Bulknet.216
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.56872
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.Rntm.7
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.62315
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.MulDrop.17242
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.49586
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.62296
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.MulDrop.16399
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.63559
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoader.59773
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoad.27589
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.Packed.254
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.Packed.226
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.Packed.154
TrojanDownloader:Win32/Cutwail.S Microsoft Trojan.DownLoad.12655
TrojanDownloader:Win32/Cutwail.S Microsoft BackDoor.Bulknet.193

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.