Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Hupigon aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Hupigon Microsoft Trojan.DownLoader.5553
Backdoor:Win32/Hupigon Microsoft Trojan.DownLoader.9698
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1040
Backdoor:Win32/Hupigon Microsoft Trojan.DownLoader.50683
Backdoor:Win32/Hupigon Microsoft Trojan.DownLoader.59888
Backdoor:Win32/Hupigon Microsoft Trojan.DownLoader.51280
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.12676
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.320
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.313
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3544
Backdoor:Win32/Hupigon Microsoft Trojan.KeyLogger.2419
Backdoor:Win32/Hupigon Microsoft Trojan.KeyLogger.1852
Backdoor:Win32/Hupigon Microsoft Trojan.DownLoader.30460
Backdoor:Win32/Hupigon Microsoft Trojan.DownLoader.8558
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8755
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.12959
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.2782
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.5119
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.12850
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.2122
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.9174
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.332
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.170
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.91
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.9179
Backdoor:Win32/Hupigon Microsoft BackDoor.Netall
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.11503
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.5379
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.102
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3234
Backdoor:Win32/Hupigon Microsoft Trojan.MulDrop.3797
Backdoor:Win32/Hupigon Microsoft Trojan.MulDrop.13093
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.985
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.11706
Backdoor:Win32/Hupigon Microsoft Trojan.DownLoader.26998
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.434
Backdoor:Win32/Hupigon Microsoft BackDoor.PowerSpider.304
Backdoor:Win32/Hupigon Microsoft Trojan.Cipher
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.848
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1221
Backdoor:Win32/Hupigon Microsoft Trojan.MulDrop.9597
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.7582
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.12512
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1663
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1072
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1047
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.5278
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.13769
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.4908
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.6949

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.