Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_HPGN-2 aliases:

Name Vendor Dr.Web classification name
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3610
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3168
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.23016
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.23052
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.23015
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3031
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7836
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.10105
Mal_HPGN-2 Trend Micro BackDoor.Graybird.119
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5025
Mal_HPGN-2 Trend Micro Trojan.PWS.Gamania.7489
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6032
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.448
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8072
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.13124
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3983
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6935
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4326
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7749
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8878
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8528
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.11737
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.10591
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8819
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2568
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8741
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.10714
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2366
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.17487
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2050
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7792
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.10922
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2382
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.11192
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6244
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8312
Mal_HPGN-2 Trend Micro BackDoor.Beizhu.544
Mal_HPGN-2 Trend Micro Win32.Parite.1
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8334
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5297
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4961
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4413
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.11033
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8738
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3996
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3493
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4981
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7197
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9733
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8716

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.