Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_HPGN-2 aliases:

Name Vendor Dr.Web classification name
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5268
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2575
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8051
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5137
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4980
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4589
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4805
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4904
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5068
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5078
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5065
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5106
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5370
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8458
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.1253
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.1156
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2147
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2654
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.13335
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2644
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.955
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6308
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.11720
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6526
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6510
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2376
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2272
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.11726
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7191
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3429
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4316
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.10192
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.357
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3263
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2392
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8291
Mal_HPGN-2 Trend Micro BackDoor.Beizhu.189
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.22415
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5684
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8283
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6238
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7454
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5702
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6053
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2912
Mal_HPGN-2 Trend Micro Trojan.PWS.Qqpass.400
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.13301
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8377
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2108
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8463

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.