Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

PWS:Win32/Ldpinch.BC aliases:

Name Vendor Dr.Web classification name
PWS:Win32/Ldpinch.BC Microsoft BackDoor.Cigi.29
PWS:Win32/Ldpinch.BC Microsoft Trojan.Packed.166
PWS:Win32/Ldpinch.BC Microsoft Trojan.PWS.LDPinch.2491
PWS:Win32/Ldpinch.BC Microsoft Trojan.Inject.3265
PWS:Win32/Ldpinch.BC Microsoft Trojan.Inject.549
PWS:Win32/Ldpinch.BC Microsoft Trojan.DownLoader.62001
PWS:Win32/Ldpinch.BC Microsoft Trojan.PWS.LDPinch.2084
PWS:Win32/Ldpinch.BC Microsoft Trojan.PWS.LDPinch.2814
PWS:Win32/Ldpinch.BC Microsoft Trojan.PWS.LDPinch.2120
PWS:Win32/Ldpinch.BC Microsoft Trojan.DownLoader.28216
PWS:Win32/Ldpinch.BC Microsoft Trojan.PWS.LDPinch.2080
PWS:Win32/Ldpinch.BC Microsoft Trojan.Click.5009
PWS:Win32/Ldpinch.BC Microsoft Trojan.Packed.487
PWS:Win32/Ldpinch.BC Microsoft Trojan.DownLoader.24862
PWS:Win32/Ldpinch.BC Microsoft Trojan.MulDrop.15880
PWS:Win32/Ldpinch.BC Microsoft Trojan.PWS.LDPinch.1407
PWS:Win32/Ldpinch.BC Microsoft Trojan.PWS.LDPinch.1956
PWS:Win32/Ldpinch.BC Microsoft Trojan.MulDrop.5888
PWS:Win32/Ldpinch.BC Microsoft Trojan.PWS.LDPinch.2107
PWS:Win32/Ldpinch.BC Microsoft Trojan.PWS.LDPinch.2106
PWS:Win32/Ldpinch.BC Microsoft Trojan.Proxy.3208
PWS:Win32/Ldpinch.BC Microsoft Trojan.Packed.167
PWS:Win32/Ldpinch.BC Microsoft Trojan.DownLoader.17776
PWS:Win32/Ldpinch.BC Microsoft Trojan.Elite.10
PWS:Win32/Ldpinch.BC Microsoft Trojan.Proxy.2379
PWS:Win32/Ldpinch.BC Microsoft Trojan.PWS.LDPinch.2119
PWS:Win32/Ldpinch.BC Microsoft Trojan.PWS.LDPinch.1718
PWS:Win32/Ldpinch.BC Microsoft Trojan.PWS.Webmonier
PWS:Win32/Ldpinch.BC Microsoft Trojan.DownLoader.23167
PWS:Win32/Ldpinch.BC Microsoft Trojan.PWS.LDPinch.1417
PWS:Win32/Ldpinch.BC Microsoft Trojan.MulDrop.6420
PWS:Win32/Ldpinch.BC Microsoft Trojan.DownLoader.30960
PWS:Win32/Ldpinch.BC Microsoft Trojan.DownLoad.3694
PWS:Win32/Ldpinch.BC Microsoft Trojan.Click.23967
PWS:Win32/Ldpinch.BC Microsoft Trojan.Click.24119
PWS:Win32/Ldpinch.BC Microsoft Trojan.DownLoad.26773
PWS:Win32/Ldpinch.BC Microsoft FDOS.Atomix.188
PWS:Win32/Ldpinch.BC Microsoft Trojan.EmailSpy
PWS:Win32/Ldpinch.BC Microsoft Trojan.Spambot.4304
PWS:Win32/Ldpinch.BC Microsoft Trojan.PWS.LDPinch.4355
PWS:Win32/Ldpinch.BC Microsoft Trojan.MulDrop.1161
PWS:Win32/Ldpinch.BC Microsoft Trojan.Packed.Gen
PWS:Win32/Ldpinch.BC Microsoft Trojan.DownLoader.17777
PWS:Win32/Ldpinch.BC Microsoft Win32.HLLW.Autoruner.2077
PWS:Win32/Ldpinch.BC Microsoft Win32.Parite.2
PWS:Win32/Ldpinch.BC Microsoft Trojan.PWS.LDPinch.4101
PWS:Win32/Ldpinch.BC Microsoft Trojan.DownLoad.14604
PWS:Win32/Ldpinch.BC Microsoft Trojan.Packed.1197
PWS:Win32/Ldpinch.BC Microsoft BackDoor.Bifrost.637
PWS:Win32/Ldpinch.BC Microsoft Trojan.Click.24725

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.