Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Hupigon.gen aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.9207
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.21471
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.21480
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.21589
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.338
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.9156
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.8967
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.14683
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.8935
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.9078
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.8936
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.8982
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.8826
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.8829
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.273
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.1560
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.303
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.916
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.8457
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.1602
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.8330
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.2254
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.6755
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.1232
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.7169
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.IRC.Sdbot.1881
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.1308
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.8550
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.11448
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.818
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.2556
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.8067
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.IRC.Sdbot.2793
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.8949
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.1001
Backdoor:Win32/Hupigon.gen Microsoft Trojan.PWS.Vipgsm
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.5225
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.9969
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.8504
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.4498
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.4468
Backdoor:Win32/Hupigon.gen Microsoft Trojan.StartPage.21146
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.4521
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.8640
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.9768
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.14026
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.11672
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.14034
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.8793
Backdoor:Win32/Hupigon.gen Microsoft BackDoor.Pigeon.5237

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.