Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_HUPIGON.EVG aliases:

Name Vendor Dr.Web classification name
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.9894
BKDR_HUPIGON.EVG Trend Micro BackDoor.Beizhu.195
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1826
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8792
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8300
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1737
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3487
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.11504
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8217
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7090
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1627
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2532
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1560
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8291
BKDR_HUPIGON.EVG Trend Micro Win32.HLLW.Autoruner.1298
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.2047
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6956
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.3204
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7339
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5269
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7936
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.252
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3526
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6024
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Qqpass.93
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.21891
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6534
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8370
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.10886
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.11870
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.10091
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8015
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8692
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.11195
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3561
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.12043
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.33701
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.55098
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8379
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8301
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.42369
BKDR_HUPIGON.EVG Trend Micro Trojan.Packed.560
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.7125
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8423
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8394
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8469
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.9611
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.786
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8385
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8358

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.