Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_HUPIGON.EVG aliases:

Name Vendor Dr.Web classification name
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2098
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.9275
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.852
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.609
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4445
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.9768
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7982
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4433
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.3109
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoad.31832
BKDR_HUPIGON.EVG Trend Micro Trojan.AVKill.593
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7300
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.550
BKDR_HUPIGON.EVG Trend Micro Trojan.Popwin.1451
BKDR_HUPIGON.EVG Trend Micro Trojan.Popwin.1522
BKDR_HUPIGON.EVG Trend Micro Trojan.Popwin.1468
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.23680
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3497
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3513
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5011
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.19174
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3532
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7179
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3228
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2007
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6348
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7048
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7139
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7178
BKDR_HUPIGON.EVG Trend Micro Adware.Bho.2931
BKDR_HUPIGON.EVG Trend Micro Adware.Bho.2930
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2795
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3501
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6811
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6160
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.7869
BKDR_HUPIGON.EVG Trend Micro Win32.HLLW.Autoruner.15823
BKDR_HUPIGON.EVG Trend Micro Win32.HLLW.Autoruner.15741
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6341
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.9169
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7386
BKDR_HUPIGON.EVG Trend Micro BackDoor.Beizhu.939
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.1528
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.14867
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6660
BKDR_HUPIGON.EVG Trend Micro Trojan.Raber.3
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.54916
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.9869
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6374
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2208

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.