Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Hupigon aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.24407
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8811
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.9385
Backdoor:Win32/Hupigon Microsoft Trojan.PWS.QQGhost
Backdoor:Win32/Hupigon Microsoft Trojan.DownLoader.11376
Backdoor:Win32/Hupigon Microsoft BackDoor.Rejoice.329
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.23304
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.23281
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.9058
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.9060
Backdoor:Win32/Hupigon Microsoft BackDoor.FireFly
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.9084
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.9050
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.1105
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.1085
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.9135
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.1102
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.5102
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.12932
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.7211
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.11826
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1112
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3228
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.14050
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.916
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.975
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.11728
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.2133
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.6447
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1719
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1265
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.11604
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.5057
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.4835
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3343
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.4376
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.586
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1255
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8032
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.9578
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.893
Backdoor:Win32/Hupigon Microsoft Trojan.KeyLogger.2153
Backdoor:Win32/Hupigon Microsoft Trojan.Hanmir
Backdoor:Win32/Hupigon Microsoft Trojan.PWS.Vipgsm
Backdoor:Win32/Hupigon Microsoft BackDoor.Graybird
Backdoor:Win32/Hupigon Microsoft Trojan.Stealth.50
Backdoor:Win32/Hupigon Microsoft Trojan.Ideo
Backdoor:Win32/Hupigon Microsoft Trojan.DownLoader.48978
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.194
Backdoor:Win32/Hupigon Microsoft Trojan.DownLoader.14326

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.