Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_HPGN-2 aliases:

Name Vendor Dr.Web classification name
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5101
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.299
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.564
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.11391
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8508
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7108
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3590
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.14404
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.22884
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.22909
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.22908
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3531
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2896
Mal_HPGN-2 Trend Micro Trojan.Packed.570
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7818
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.10037
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8081
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.1289
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2466
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6652
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3979
Mal_HPGN-2 Trend Micro Trojan.DownLoad.4230
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.22859
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.1536
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25455
Mal_HPGN-2 Trend Micro Trojan.Click.38833
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.26787
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.30702
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.58435
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25553
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.32523
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.58489
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.26726
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.27091
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.34233
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.33602
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.31435
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.41693
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.26778
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.31906
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.26788
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.33896
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.43966
Mal_HPGN-2 Trend Micro Trojan.Packed.16683
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6907
Mal_HPGN-2 Trend Micro Trojan.DownLoader1.39058
Mal_HPGN-2 Trend Micro BackDoor.Bifrost.7615
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.26734
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25778
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25673

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.