Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_HPGN-2 aliases:

Name Vendor Dr.Web classification name
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8474
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2766
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3269
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2769
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6492
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9967
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5540
Mal_HPGN-2 Trend Micro Trojan.MulDrop.11519
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9444
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7496
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4899
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.23141
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.23200
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3772
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7123
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2709
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5361
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.978
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3813
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9466
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7196
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8455
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3494
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4558
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8303
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.18876
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5285
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3029
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2215
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3693
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8786
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.10710
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6078
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5465
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.503
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.11331
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8304
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4928
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6436
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4451
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8349
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7028
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3598
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8168
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3153
Mal_HPGN-2 Trend Micro Trojan.MulDrop.2789
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.86
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.1117
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.72
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2336

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.