Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_HUPIGON.EVG aliases:

Name Vendor Dr.Web classification name
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.12548
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.11505
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Vipgsm
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.7126
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.7047
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.11879
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.2978
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5057
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6139
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.82
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.194
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1252
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.14446
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4695
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4744
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4722
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4698
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4674
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4476
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4672
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.26738
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4659
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4712
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5007
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4648
BKDR_HUPIGON.EVG Trend Micro Win32.HLLW.Wuke
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.1969
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.1383
BKDR_HUPIGON.EVG Trend Micro Win32.HLLP.Whboy.77
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.11726
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.747
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7917
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.5869
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.10679
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.9933
BKDR_HUPIGON.EVG Trend Micro Trojan.Click.17894
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.43127
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.32906
BKDR_HUPIGON.EVG Trend Micro Adware.MWS
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.12171
BKDR_HUPIGON.EVG Trend Micro Tool.DialupPass.243
BKDR_HUPIGON.EVG Trend Micro Win32.HLLW.Autoruner.961
BKDR_HUPIGON.EVG Trend Micro Win32.HLLW.Autoruner.213
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.534
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.372
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.4046
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Gamania.10010
BKDR_HUPIGON.EVG Trend Micro BackDoor.IRC.Sdbot.2793
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.35788
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Legmir.602

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.