Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Hupigon aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Hupigon Microsoft BackDoor.Huai.1969
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8330
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.6008
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.7472
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.2213
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.2034
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3618
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3729
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3607
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3715
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3616
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3300
Backdoor:Win32/Hupigon Microsoft Trojan.MulDrop.11519
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.5118
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.2267
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.7779
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3683
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.7463
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3662
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3541
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.8326
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3689
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3656
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3671
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3250
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3635
Backdoor:Win32/Hupigon Microsoft Trojan.MulDrop.3920
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1825
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3969
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3650
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3687
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.6201
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3654
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3675
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.4936
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.7762
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3614
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.1876
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.6892
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3734
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3667
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3741
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3613
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3612
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.7100
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.3655
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.4941
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.4406
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.11143
Backdoor:Win32/Hupigon Microsoft BackDoor.Pigeon.6210

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.