Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Hupigon aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8567
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8563
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8665
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8624
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8596
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8658
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8610
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8619
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8654
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8645
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.754
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8222
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8218
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8114
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8192
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.21463
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.21087
Backdoor:Win32/Hupigon Microsoft Trojan.DownLoader.36561
Backdoor:Win32/Hupigon Microsoft Trojan.PWS.Legmir.1973
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.871
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.833
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.841
Backdoor:Win32/Hupigon Microsoft BackDoor.Beizhu.361
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.852
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.861
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.856
Backdoor:Win32/Hupigon Microsoft BackDoor.Beizhu.357
Backdoor:Win32/Hupigon Microsoft Trojan.PWS.Gamania.5368
Backdoor:Win32/Hupigon Microsoft BackDoor.IRC.Sdbot.2104
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8394
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8350
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8355
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.9611
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8096
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8430
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8363
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8274
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8373
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.7584
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.7575
Backdoor:Win32/Hupigon Microsoft Trojan.KeyLogger.1385
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8484
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.626
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.623
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.622
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.7593
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.621
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.516
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8716
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8735

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.