Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_HPGN-2 aliases:

Name Vendor Dr.Web classification name
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.21590
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6196
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7217
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8635
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8566
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.13245
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8658
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4433
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.21218
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8522
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8619
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8737
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8505
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8745
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8468
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8699
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8305
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8390
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8333
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8267
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8542
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3522
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.21340
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8492
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8572
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8612
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8290
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8776
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7781
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3526
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8281
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.610
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.13413
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8366
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.1188
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5228
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8761
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6666
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8999
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6656
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5170
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9193
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.1213
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7892
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.671
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5304
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.550
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2536
Mal_HPGN-2 Trend Micro Trojan.PWS.Vipgsm
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6438

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.