Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_HPGN-2 aliases:

Name Vendor Dr.Web classification name
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6288
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3489
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5165
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9214
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7163
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4991
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5301
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5204
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5021
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6699
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5266
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2779
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6375
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3035
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8770
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4834
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7190
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2436
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5067
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8491
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6645
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.13293
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.10052
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.10267
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.21377
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8911
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9203
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2153
Mal_HPGN-2 Trend Micro Trojan.MulDrop.11007
Mal_HPGN-2 Trend Micro Trojan.MulDrop.10056
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.1566
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9992
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.11096
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7829
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2574
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7046
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3163
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.22892
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.22711
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.1842
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5396
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8682
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2266
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8301
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4872
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2301
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4804
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2260
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.17456
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3063

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.