Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Mal_HPGN-2 aliases:

Name Vendor Dr.Web classification name
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.11214
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4677
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2834
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4340
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.11098
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5212
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.951
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3027
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9578
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3609
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5310
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8464
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.12956
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2887
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2876
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3403
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3398
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.113
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2966
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2208
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9744
Mal_HPGN-2 Trend Micro Trojan.MulDrop.15710
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.1269
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.1217
Mal_HPGN-2 Trend Micro Trojan.DownLoader.35171
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9806
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2755
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.4618
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.6783
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7165
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5585
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8264
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2410
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.2481
Mal_HPGN-2 Trend Micro Trojan.PWS.Vipgsm.521
Mal_HPGN-2 Trend Micro Win32.Alman
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8513
Mal_HPGN-2 Trend Micro Trojan.MulDrop.6432
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.14053
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7271
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.8704
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.7198
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.13125
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5682
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.9506
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.12578
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.11180
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.3201
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5352
Mal_HPGN-2 Trend Micro BackDoor.Pigeon.5093

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.