Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_HUPIGON.EVG aliases:

Name Vendor Dr.Web classification name
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.11604
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5467
BKDR_HUPIGON.EVG Trend Micro BackDoor.King
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7889
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.9867
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.1715
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.1700
BKDR_HUPIGON.EVG Trend Micro Win32.HLLW.Autoruner.1300
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.7059
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.36483
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2884
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.1894
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6141
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2303
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.12765
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5371
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.952
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoad.3184
BKDR_HUPIGON.EVG Trend Micro Trojan.Click.4708
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.693
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.8793
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.516
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.2937
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Qqpass.308
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Wow.644
BKDR_HUPIGON.EVG Trend Micro BackDoor.Infol
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Gamania.4179
BKDR_HUPIGON.EVG Trend Micro BackDoor.Outbreak.35
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.6354
BKDR_HUPIGON.EVG Trend Micro BackDoor.SevenEleven
BKDR_HUPIGON.EVG Trend Micro Trojan.PWS.Qqpass.185
BKDR_HUPIGON.EVG Trend Micro Trojan.HideProc
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.267
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.9969
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.46754
BKDR_HUPIGON.EVG Trend Micro Trojan.DownLoader.51669
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.427
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5781
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.419
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5695
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5716
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.7125
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5782
BKDR_HUPIGON.EVG Trend Micro BackDoor.BlackHole.2058
BKDR_HUPIGON.EVG Trend Micro BackDoor.Huai.436
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5766
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5710
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5774
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5686
BKDR_HUPIGON.EVG Trend Micro BackDoor.Pigeon.5772

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.