Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_HUPIGON.EVG aliases:

Name Vendor Dr.Web classification name
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3036
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5540
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4907
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7781
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2241
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.128
BKDR_HUPIGON.EVG Trend Micro Trojan.Iespy.395
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4867
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8916
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4340
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.11200
BKDR_HUPIGON.EVG Trend Micro Win32.HLLW.Autoruner.776
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8960
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7836
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.6191
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5266
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7311
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.4122
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2141
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7482
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5315
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3433
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.1534
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.817
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7391
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.17279
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.431
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3238
BKDR_HUPIGON.EVG Trend Micro Trojan.Inject.3919
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.9871
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8861
BKDR_HUPIGON.EVG Trend Micro BackDoor.Attacker
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7169
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.6409
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1540
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.10904
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8272
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.16156
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3932
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7327
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3823
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.22358
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5170
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1243
BKDR_HUPIGON.EVG Trend Micro Trojan.Siggen.63839
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.1510
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1257
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoad.2789
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1249
BKDR_HUPIGON.EVG Trend Micro BackDoor.Beizhu.721

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.