Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Hupigon.CN aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Hupigon.CN Microsoft Trojan.DownLoader.63530
Backdoor:Win32/Hupigon.CN Microsoft Trojan.KeyLogger.390
Backdoor:Win32/Hupigon.CN Microsoft Trojan.Proxy.698
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.27136
Backdoor:Win32/Hupigon.CN Microsoft Trojan.PWS.Qqpass.103
Backdoor:Win32/Hupigon.CN Microsoft Trojan.DownLoader.11081
Backdoor:Win32/Hupigon.CN Microsoft Trojan.PWS.Qqpass.117
Backdoor:Win32/Hupigon.CN Microsoft BackDoor.TTY.32
Backdoor:Win32/Hupigon.CN Microsoft Trojan.DownLoader.37138
Backdoor:Win32/Hupigon.CN Microsoft Trojan.Proxy.2408
Backdoor:Win32/Hupigon.CN Microsoft BackDoor.Pigeon.766
Backdoor:Win32/Hupigon.CN Microsoft Trojan.KeyLogger.3314
Backdoor:Win32/Hupigon.CN Microsoft Trojan.Proxy.662
Backdoor:Win32/Hupigon.CN Microsoft Trojan.AFX.25
Backdoor:Win32/Hupigon.CN Microsoft Trojan.PWS.Qqpass.425
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.based
Backdoor:Win32/Hupigon.CN Microsoft Trojan.Proxy.657
Backdoor:Win32/Hupigon.CN Microsoft BackDoor.Dotted
Backdoor:Win32/Hupigon.CN Microsoft Trojan.PWS.Lasp
Backdoor:Win32/Hupigon.CN Microsoft Trojan.MulDrop.4034
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.36352
Backdoor:Win32/Hupigon.CN Microsoft Trojan.Proxy.1210
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.12800
Backdoor:Win32/Hupigon.CN Microsoft Trojan.PWS.Qqpass.68
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.29700
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.19460
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.34304
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.33284
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.24576
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.33796
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.32768
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.36864
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.26628
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.19968
Backdoor:Win32/Hupigon.CN Microsoft BackDoor.IRC.Sdbot.148
Backdoor:Win32/Hupigon.CN Microsoft Trojan.Proxy.577
Backdoor:Win32/Hupigon.CN Microsoft Trojan.Proxy.575
Backdoor:Win32/Hupigon.CN Microsoft Trojan.Proxy.570
Backdoor:Win32/Hupigon.CN Microsoft Trojan.Proxy.566
Backdoor:Win32/Hupigon.CN Microsoft Trojan.Proxy.574
Backdoor:Win32/Hupigon.CN Microsoft Trojan.Proxy.555
Backdoor:Win32/Hupigon.CN Microsoft Trojan.Proxy.600
Backdoor:Win32/Hupigon.CN Microsoft Trojan.Proxy.601
Backdoor:Win32/Hupigon.CN Microsoft Trojan.Proxy.545
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.25088
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.18848
Backdoor:Win32/Hupigon.CN Microsoft Trojan.Spambot.2564
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.32256
Backdoor:Win32/Hupigon.CN Microsoft Win32.HLLM.Beagle.45173
Backdoor:Win32/Hupigon.CN Microsoft Trojan.PWS.Qqrobber.113

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.