Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Cryp_MSLRH aliases:

Name Vendor Dr.Web classification name
Cryp_MSLRH Trend Micro Trojan.MulDrop.11138
Cryp_MSLRH Trend Micro Trojan.MulDrop.2460
Cryp_MSLRH Trend Micro BackDoor.IRC.Sdbot.2872
Cryp_MSLRH Trend Micro Trojan.KeyLogger.2153
Cryp_MSLRH Trend Micro Trojan.MulDrop.4527
Cryp_MSLRH Trend Micro Qq.Generator
Cryp_MSLRH Trend Micro BackDoor.Firepass
Cryp_MSLRH Trend Micro BackDoor.Susftp
Cryp_MSLRH Trend Micro Trojan.DownLoader.2791
Cryp_MSLRH Trend Micro BackDoor.Klj
Cryp_MSLRH Trend Micro Trojan.PWS.Maran.318
Cryp_MSLRH Trend Micro Trojan.MulDrop.6454
Cryp_MSLRH Trend Micro BackDoor.Pigeon.13451
Cryp_MSLRH Trend Micro Trojan.DownLoader.42696
Cryp_MSLRH Trend Micro Trojan.MulDrop.1014
Cryp_MSLRH Trend Micro Tool.Netcat
Cryp_MSLRH Trend Micro BackDoor.Pigeon.7877
Cryp_MSLRH Trend Micro Trojan.PWS.Qqpass.1748
Cryp_MSLRH Trend Micro Win32.HLLW.MyBot.70
Cryp_MSLRH Trend Micro Trojan.MulDrop.15011
Cryp_MSLRH Trend Micro Win32.HLLM.MyDoom
Cryp_MSLRH Trend Micro BackDoor.Pigeon.7464
Cryp_MSLRH Trend Micro BackDoor.Pigeon.1282
Cryp_MSLRH Trend Micro BackDoor.PowerSpider
Cryp_MSLRH Trend Micro Trojan.StartPage.21096
Cryp_MSLRH Trend Micro Trojan.MulDrop.8997
Cryp_MSLRH Trend Micro Trojan.Proxy.485
Cryp_MSLRH Trend Micro BackDoor.Qpalso
Cryp_MSLRH Trend Micro Trojan.Heihei
Cryp_MSLRH Trend Micro Win32.HLLW.Agobot.406
Cryp_MSLRH Trend Micro BackDoor.BlackHole.2127
Cryp_MSLRH Trend Micro Trojan.MulDrop.7715
Cryp_MSLRH Trend Micro BackDoor.ProRat.252
Cryp_MSLRH Trend Micro Trojan.PWS.Legmir.141
Cryp_MSLRH Trend Micro BackDoor.Oculto
Cryp_MSLRH Trend Micro Trojan.PWS.LDPinch.493
Cryp_MSLRH Trend Micro Trojan.DownLoader.46858
Cryp_MSLRH Trend Micro Exploit.DCom.6
Cryp_MSLRH Trend Micro BackDoor.Pigeon.1745
Cryp_MSLRH Trend Micro Trojan.ProAgent.24
Cryp_MSLRH Trend Micro Trojan.Proxy.19
Cryp_MSLRH Trend Micro Trojan.Syn
Cryp_MSLRH Trend Micro Trojan.KeyLogger.2419
Cryp_MSLRH Trend Micro BackDoor.Flux.101
Cryp_MSLRH Trend Micro Trojan.MulDrop.13227
Cryp_MSLRH Trend Micro BackDoor.Attack.21
Cryp_MSLRH Trend Micro BackDoor.Pigeon.1637
Cryp_MSLRH Trend Micro BackDoor.Pigeon.1231
Cryp_MSLRH Trend Micro Trojan.DownLoader.30046
Cryp_MSLRH Trend Micro Trojan.DownLoader

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.