Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Win32/Hupigon.ADE aliases:

Name Vendor Dr.Web classification name
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.9374
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.2254
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.9384
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.10513
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.2575
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.5020
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.2364
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.5009
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.5273
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.5255
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.8514
Win32/Hupigon.ADE Microsoft BackDoor.Graybird
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.12932
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.3817
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.3822
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.3819
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.3816
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.3818
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.2702
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.2843
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.9639
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.5311
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.4840
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.6180
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.2122
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.7168
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.10267
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.2215
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.11870
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.9848
Win32/Hupigon.ADE Microsoft BackDoor.Huai.2449
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.4408
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.2925
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.11829
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.9643
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.10360
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.1021
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.1535
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.6884
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.3265
Win32/Hupigon.ADE Microsoft Trojan.Packed.140
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.9388
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.8430
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.951
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.5476
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.9379
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.10304
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.6436
Win32/Hupigon.ADE Microsoft BackDoor.Gserv
Win32/Hupigon.ADE Microsoft BackDoor.Pigeon.8667

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.