Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Hupigon aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.2073
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1493
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1358
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1349
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1473
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1488
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1534
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1469
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1327
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1321
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1456
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1406
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1524
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1399
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1495
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1442
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1507
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1439
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1346
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1481
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1418
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1470
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1460
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1446
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1355
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1425
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1353
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1340
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1400
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8283
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1515
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1339
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1405
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1440
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1428
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1530
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1444
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1118
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1082
Backdoor:Win32/Hupigon Microsoft Trojan.Arpinject
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.918
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1629
Backdoor:Win32/Hupigon Microsoft Trojan.DownLoader.20700
Backdoor:Win32/Hupigon Microsoft BackDoor.Servu.74
Backdoor:Win32/Hupigon Microsoft Trojan.MulDrop.5869
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1830
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1705
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1620
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.6372
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1801

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.