Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Dynamer!dtc aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.30647
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.BlackHole.4946
Trojan:Win32/Dynamer!dtc Microsoft Win32.HLLW.Texmer.962
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.37207
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.49478
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.29873
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Inject.14246
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.Qqshou.635
Trojan:Win32/Dynamer!dtc Microsoft Trojan.StartPage.31827
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen1.63985
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Click1.26844
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen2.8211
Trojan:Win32/Dynamer!dtc Microsoft Win32.HLLW.Autoruner.31079
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.51243
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.48970
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Inject.11856
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop.37105
Trojan:Win32/Dynamer!dtc Microsoft Win32.HLLW.Kelvin.155
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.54826
Trojan:Win32/Dynamer!dtc Microsoft Trojan.KillProc.2490
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Click1.27460
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Shipup.154
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.36369
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.Panda.171
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Packed.17379
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.Siggen.26976
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Stubby.116
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.40266
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen2.5396
Trojan:Win32/Dynamer!dtc Microsoft Program.Wpe.120
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.25113
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoad2.17917
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.Siggen.26943
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.28103
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Hosts.2145
Trojan:Win32/Dynamer!dtc Microsoft Win32.HLLW.MyBot.135
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.IRC.Sdbot.11242
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.51275
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Szlig.67
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoad2.17699
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.37870
Trojan:Win32/Dynamer!dtc Microsoft Trojan.AVKill.3016
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.Bifrost.15122
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.Furq.22
Trojan:Win32/Dynamer!dtc Microsoft Win32.HLLW.Autoruner.35264
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen.11685
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen2.6405
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.Wsgame.22979
Trojan:Win32/Dynamer!dtc Microsoft Trojan.KillProc.2293
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Click1.26627

1 2 3 4 5 6 7 8 9 10 11 12 13 14

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.