Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

MalwareScope.Trojan-PSW.Pinch.1 aliases:

Name Vendor Dr.Web classification name
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.1009
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.MulDrop.3953
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.395
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.Packed.198
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Win32.HLLM.Beagle.45056
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Win32.HLLM.Beagle
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda BackDoor.Rerival
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda BackDoor.Pinched
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.Packed.166
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Win32.HLLM.Beagle.18848
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.Click.17849
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.Click.17836
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.MulDrop.11300
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.MulDrop.6269
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.176
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.Butter
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.283
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.312
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.307
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.289
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.313
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.Claus
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.295
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.287
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.292
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.301
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.317
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.309
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.306
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.298
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.320
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.319
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.302
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.314
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.316
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.323
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.310
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.286
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.290
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.322
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.288
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.321
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.303
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.297
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.293
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.318
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.324
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.285
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.305
MalwareScope.Trojan-PSW.Pinch.1 VirusBlokAda Trojan.PWS.LDPinch.304

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.