Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_HPGN-2 aliases:

Name Vendor Dr.Web classification name
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.21332
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8060
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.128
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9167
Mal_HPGN-2 Trend Micro Win32.Alman.1
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6236
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.1249
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.466
Mal_HPGN-2 Trend Micro Win32.HLLW.Autoruner.1176
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.16351
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.267
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.13298
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7042
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8940
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.17231
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8379
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.11218
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.21683
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.12933
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2100
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5567
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8382
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9743
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.10884
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6956
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2957
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5648
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.24913
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5406
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8411
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8371
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8353
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8365
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3479
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9233
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8074
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8368
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6298
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.923
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5046
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9274
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9367
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8894
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6624
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6572
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3628
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8687
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.224
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.10156
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.927

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.