Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Dynamer!dtc aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Swizzor.16454
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoad.51652
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.Cybergate.1
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Packed.20436
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen.11543
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen2.6391
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.BlackHole.4869
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.Bifrost.14965
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.53811
Trojan:Win32/Dynamer!dtc Microsoft Trojan.KillProc.2014
Trojan:Win32/Dynamer!dtc Microsoft Trojan.AVKill.3078
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.30795
Trojan:Win32/Dynamer!dtc Microsoft Trojan.StartPage.31755
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen2.5301
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Inject.4065
Trojan:Win32/Dynamer!dtc Microsoft Trojan.StartPage.31854
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen1.61712
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.32802
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.53364
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.Banker.53356
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.27964
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.Panda.368
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.27965
Trojan:Win32/Dynamer!dtc Microsoft Win32.HLLW.Autoruner.9222
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.49377
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen2.116
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.35018
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.33575
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.34798
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Proxy.9970
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Iespy.859
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.51965
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.14589
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.Siggen.26786
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.16077
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Inject.11732
Trojan:Win32/Dynamer!dtc Microsoft Trojan.AVKill.2902
Trojan:Win32/Dynamer!dtc Microsoft Program.Ardamax.972
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen2.8116
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.14942
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.51199
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen2.9690
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.Banker.53220
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoad2.18071
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.31211
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen.8304
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.50028
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.36794
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen2.6757
Trojan:Win32/Dynamer!dtc Microsoft Trojan.KillProc.2306

1 2 3 4 5 6 7 8 9 10 11 12 13 14

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.