Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Hupigon aliases:

Name Vendor Dr.Web classification name
Win32/Hupigon Microsoft Trojan.MulDrop.2790
Win32/Hupigon Microsoft BackDoor.IRC.Sdbot.1881
Win32/Hupigon Microsoft BackDoor.Pigeon.12433
Win32/Hupigon Microsoft BackDoor.Pigeon.5
Win32/Hupigon Microsoft BackDoor.Graybird
Win32/Hupigon Microsoft Trojan.DownLoader.46866
Win32/Hupigon Microsoft Trojan.Packed.200
Win32/Hupigon Microsoft Trojan.DownLoader.50468
Win32/Hupigon Microsoft BackDoor.Pigeon.9159
Win32/Hupigon Microsoft BackDoor.Pigeon.33
Win32/Hupigon Microsoft BackDoor.IRC.Sdbot.2793
Win32/Hupigon Microsoft BackDoor.Pigeon.5057
Win32/Hupigon Microsoft BackDoor.Pigeon.7169
Win32/Hupigon Microsoft BackDoor.IRC.Sdbot.2425
Win32/Hupigon Microsoft BackDoor.Pigeon.585
Win32/Hupigon Microsoft Trojan.DownLoader.27697
Win32/Hupigon Microsoft BackDoor.Pigeon.9774
Win32/Hupigon Microsoft Trojan.DownLoader.23752
Win32/Hupigon Microsoft Trojan.Iauh
Win32/Hupigon Microsoft BackDoor.Pigeon.7996
Win32/Hupigon Microsoft BackDoor.Pigeon.7281
Win32/Hupigon Microsoft BackDoor.Pigeon.4331
Win32/Hupigon Microsoft BackDoor.Pigeon.11915
Win32/Hupigon Microsoft BackDoor.Pigeon.11728
Win32/Hupigon Microsoft BackDoor.Pigeon.9581
Win32/Hupigon Microsoft BackDoor.Pigeon.569
Win32/Hupigon Microsoft BackDoor.Pigeon.8072
Win32/Hupigon Microsoft BackDoor.Pigeon.12933
Win32/Hupigon Microsoft BackDoor.Pigeon.702
Win32/Hupigon Microsoft BackDoor.Pigeon.12116
Win32/Hupigon Microsoft BackDoor.Pigeon.236
Win32/Hupigon Microsoft Trojan.MulDrop.13922
Win32/Hupigon Microsoft BackDoor.Pigeon.610
Win32/Hupigon Microsoft BackDoor.Pigeon.11870
Win32/Hupigon Microsoft BackDoor.Pigeon.1436
Win32/Hupigon Microsoft BackDoor.Pigeon.5244
Win32/Hupigon Microsoft BackDoor.Pigeon.2410
Win32/Hupigon Microsoft BackDoor.Pigeon.9283
Win32/Hupigon Microsoft BackDoor.Pigeon.1021
Win32/Hupigon Microsoft Trojan.PWS.Qqpass.400
Win32/Hupigon Microsoft BackDoor.IRC.Sdbot.3450
Win32/Hupigon Microsoft BackDoor.Pigeon.9506
Win32/Hupigon Microsoft Trojan.MulDrop.12548
Win32/Hupigon Microsoft BackDoor.Pigeon.11315
Win32/Hupigon Microsoft BackDoor.Greybird
Win32/Hupigon Microsoft BackDoor.Gserv
Win32/Hupigon Microsoft BackDoor.Pigeon.8081
Win32/Hupigon Microsoft BackDoor.Pigeon.12736
Win32/Hupigon Microsoft BackDoor.Pigeon.7130
Win32/Hupigon Microsoft BackDoor.Pigeon.8301

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.