Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_HPGN-2 aliases:

Name Vendor Dr.Web classification name
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8556
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3755
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2109
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.13297
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.23003
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5364
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2921
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8410
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5580
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.11386
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8400
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8778
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.origin
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9645
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2241
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5592
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2448
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3010
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3236
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.980
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6770
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9546
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8599
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9257
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3472
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9189
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.10522
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.907
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4809
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7863
Mal_HPGN-2 Trend Micro Tool.Transmit.3
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3832
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2908
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3044
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7328
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.23650
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.12960
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.24584
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8750
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7798
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3918
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3615
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7767
Mal_HPGN-2 Trend Micro Trojan.Packed.454
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.21687
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.10732
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3560
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8378
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6847
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9215

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.