Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_HUPIGON.EVG aliases:

Name Vendor Dr.Web classification name
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1886
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.811
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3269
BKDR_HUPIGON.EVG Trend Micro Trojan.Popwin.669
BKDR_HUPIGON.EVG Trend Micro Trojan.Popwin.664
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.165
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7292
BKDR_HUPIGON.EVG Trend Micro Win32.HLLW.Autoruner.14971
BKDR_HUPIGON.EVG Trend Micro Win32.HLLW.Autoruner.15088
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5375
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7301
BKDR_HUPIGON.EVG Trend Micro BackDoor.DarkSky.28
BKDR_HUPIGON.EVG Trend Micro BackDoor.BlackHole.2127
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7329
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1814
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6010
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.10093
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.4686
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.3295
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5260
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.676
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.810
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8440
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Gamania.16049
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.origin
BKDR_HUPIGON.EVG Trend Micro BackDoor.Hackdoor.22
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.3419
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6989
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.1562
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7398
BKDR_HUPIGON.EVG Trend Micro Trojan.Click.49073
BKDR_HUPIGON.EVG Trend Micro Trojan.Click.45013
BKDR_HUPIGON.EVG Trend Micro Trojan.Click.48073
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6207
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.745
BKDR_HUPIGON.EVG Trend Micro Win32.HLLW.Autoruner.16099
BKDR_HUPIGON.EVG Trend Micro Win32.HLLW.Autoruner.16089
BKDR_HUPIGON.EVG Trend Micro Trojan.Packed.Gen
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8701
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8080
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2705
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.25415
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.26802
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.25509
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.25383
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.33722
BKDR_HUPIGON.EVG Trend Micro Trojan.MulDrop.31437
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.25409
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.25440
BKDR_HUPIGON.EVG Trend Micro Trojan.Siggen.5645

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.