Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Packed.Hupigon aliases:

Name Vendor Dr.Web classification name
Packed.Hupigon AVG Trojan.MulDrop.16604
Packed.Hupigon AVG Trojan.MulDrop.15002
Packed.Hupigon AVG BackDoor.Pigeon.3916
Packed.Hupigon AVG Trojan.Packed.162
Packed.Hupigon AVG BackDoor.Pigeon.2720
Packed.Hupigon AVG BackDoor.IRC.Flood.8
Packed.Hupigon AVG BackDoor.Huai.573
Packed.Hupigon AVG BackDoor.IRC.Sdbot.2665
Packed.Hupigon AVG BackDoor.Rejoice.85
Packed.Hupigon AVG Trojan.MulDrop.14718
Packed.Hupigon AVG Trojan.MulDrop.6502
Packed.Hupigon AVG Trojan.MulDrop.16601
Packed.Hupigon AVG BackDoor.Pigeon.8283
Packed.Hupigon AVG BackDoor.Pigeon.2785
Packed.Hupigon AVG Trojan.MulDrop.10056
Packed.Hupigon AVG Trojan.MulDrop.12592
Packed.Hupigon AVG Trojan.Siggen.1756
Packed.Hupigon AVG BackDoor.Pigeon.13012
Packed.Hupigon AVG Trojan.ProAgent.55
Packed.Hupigon AVG Trojan.PWS.Ola.60
Packed.Hupigon AVG BackDoor.IRC.Sdbot.945
Packed.Hupigon AVG Trojan.Packed.166
Packed.Hupigon AVG BackDoor.Pigeon.6620
Packed.Hupigon AVG BackDoor.Pigeon.8824
Packed.Hupigon AVG BackDoor.Pigeon.20379
Packed.Hupigon AVG BackDoor.Pigeon.879
Packed.Hupigon AVG BackDoor.Pigeon.8529
Packed.Hupigon AVG Trojan.Qhost
Packed.Hupigon AVG BackDoor.Pigeon.2919
Packed.Hupigon AVG BackDoor.Huai.3409
Packed.Hupigon AVG BackDoor.PcClient.773
Packed.Hupigon AVG BackDoor.Pigeon.23622
Packed.Hupigon AVG BackDoor.Pigeon.10224
Packed.Hupigon AVG BackDoor.Pigeon.21851
Packed.Hupigon AVG Tool.Transmit.3
Packed.Hupigon AVG BackDoor.Pigeon.11870
Packed.Hupigon AVG BackDoor.Huai.5956
Packed.Hupigon AVG BackDoor.Beizhu.2360
Packed.Hupigon AVG Win32.Alman.1
Packed.Hupigon AVG BackDoor.Pigeon.22688
Packed.Hupigon AVG Trojan.PWS.Qqpass.400
Packed.Hupigon AVG BackDoor.Pigeon.7497
Packed.Hupigon AVG BackDoor.Pigeon.11939
Packed.Hupigon AVG BackDoor.Pigeon.1518
Packed.Hupigon AVG BackDoor.Pigeon.3026
Packed.Hupigon AVG BackDoor.Pigeon.194
Packed.Hupigon AVG BackDoor.Pigeon.12064
Packed.Hupigon AVG Win32.HLLP.Whboy
Packed.Hupigon AVG BackDoor.Pigeon.5102
Packed.Hupigon AVG BackDoor.Pigeon.24221

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.