Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Hupigon aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.9902
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8796
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8622
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8571
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8720
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8499
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8583
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8640
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8553
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8727
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8546
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8578
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8609
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8557
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8564
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8402
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8464
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8264
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8428
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8358
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.765
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.796
Backdoor:Win32/Hupigon Microsoft Trojan.DownLoader.36898
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8666
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8334
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8621
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8567
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8563
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8665
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8624
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8596
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8658
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8610
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8619
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8654
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8645
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8114
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8192
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.21463
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.841
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.852
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.861
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.856
Backdoor:Win32/Hupigon Microsoft Trojan.PWS.Gamania.5368
Backdoor:Win32/Hupigon Microsoft BackDoor.IRC.Sdbot.2104
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8373
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.7584
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.7575
Backdoor:Win32/Hupigon Microsoft Trojan.KeyLogger.1385
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8484

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.