Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Dynamer!dtc aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoad2.15025
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.40714
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.41187
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.41057
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.40727
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.41060
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.40716
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.41055
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.40696
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Click.64308
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.Qqpass.5659
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoad1.64251
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Fakealert.18673
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoad.64103
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.Lineage.8574
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.LDPinch.1418
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.Gtal
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.Click.1045
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.16691
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.16721
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.Pigeon.57913
Trojan:Win32/Dynamer!dtc Microsoft Trojan.StartPage.31224
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.Click.1053
Trojan:Win32/Dynamer!dtc Microsoft Flooder.Dong
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.17324
Trojan:Win32/Dynamer!dtc Microsoft Trojan.StartPage.31216
Trojan:Win32/Dynamer!dtc Microsoft Flooder.Twoch.5
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.Click.1049
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Logicin
Trojan:Win32/Dynamer!dtc Microsoft Flooder.Errorism.1
Trojan:Win32/Dynamer!dtc Microsoft Flooder.Twoch.4
Trojan:Win32/Dynamer!dtc Microsoft Flooder.Tist
Trojan:Win32/Dynamer!dtc Microsoft Flooder.Errorism.2
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.42466
Trojan:Win32/Dynamer!dtc Microsoft Flooder.Kang
Trojan:Win32/Dynamer!dtc Microsoft Flooder.Koala
Trojan:Win32/Dynamer!dtc Microsoft Flooder.Twoch.7
Trojan:Win32/Dynamer!dtc Microsoft Flooder.Knus
Trojan:Win32/Dynamer!dtc Microsoft Flooder.Misa
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Click1.25485
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Proxy.17403
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoad1.64169
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoad2.478
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoad2.6547
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen1.36738
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Click.64158
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Click.64183
Trojan:Win32/Dynamer!dtc Microsoft Trojan.IMspam.9
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Searcher.137
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.HBot.19

1 2 3 4 5 6 7 8 9 10 11 12 13 14

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.