Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan:Win32/Dynamer!dtc aliases:

Name Vendor Dr.Web classification name
Trojan:Win32/Dynamer!dtc Microsoft Trojan.KillProc.2437
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.51587
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.Vkontakte.229
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.51025
Trojan:Win32/Dynamer!dtc Microsoft Trojan.AVKill.2033
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.Gamania.28630
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Click1.25240
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.Siggen.27711
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.51815
Trojan:Win32/Dynamer!dtc Microsoft Win32.HLLW.Autoruner.31588
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.Panda.387
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Raber.410
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Click.64423
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.33874
Trojan:Win32/Dynamer!dtc Microsoft Win32.HLLW.MyBot.70
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen2.5382
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Click1.27863
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.48749
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Copyself.107
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Click1.24503
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.34163
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.27878
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoad.64267
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Inject.14722
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.53023
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Click1.27086
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen2.8488
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Inject.14614
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.Spy.9175
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen.40141
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Inject.14198
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Proxy.18483
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.52190
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.36762
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Hosts.1911
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.53456
Trojan:Win32/Dynamer!dtc Microsoft Trojan.NtRootKit.9683
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoad2.18283
Trojan:Win32/Dynamer!dtc Microsoft BackDoor.Bifrost.15060
Trojan:Win32/Dynamer!dtc Microsoft Adware.Sogou.678
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop1.50319
Trojan:Win32/Dynamer!dtc Microsoft Trojan.MulDrop.40637
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen.12136
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen1.59254
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.37046
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.Banker.53058
Trojan:Win32/Dynamer!dtc Microsoft Trojan.PWS.Siggen.8736
Trojan:Win32/Dynamer!dtc Microsoft Trojan.DownLoader1.38509
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Click1.27203
Trojan:Win32/Dynamer!dtc Microsoft Trojan.Siggen2.7853

1 2 3 4 5 6 7 8 9 10 11 12 13 14

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.