Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_HPGN-2 aliases:

Name Vendor Dr.Web classification name
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9174
Mal_HPGN-2 Trend Micro Trojan.Packed.196
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25629
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.32927
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.26828
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.44944
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.33568
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25739
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25726
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.33736
Mal_HPGN-2 Trend Micro Win32.HLLW.Autoruner.17873
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25926
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.26966
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.31537
Mal_HPGN-2 Trend Micro Trojan.Inject.11669
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.58425
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25917
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.57911
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.26934
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.58585
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25950
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.42421
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.27000
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25889
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.26967
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.44610
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.31868
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25885
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.28275
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.42902
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25897
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.44395
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.26941
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.26996
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.33714
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25862
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.33629
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.33527
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.43764
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25799
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.25974
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.42410

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.