Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor.Hupigon.DKL in virus library:

A class of malware that can execute commands from a remote server and allow attackers to remotely control an infected device.

Backdoor.Hupigon.DKL aliases:

Name Vendor Dr.Web classification name
Backdoor.Hupigon.DKL BitDefender Win32.HLLW.Whboy
Backdoor.Hupigon.DKL BitDefender Win32.HLLP.Whboy
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.4583
Backdoor.Hupigon.DKL BitDefender BackDoor.Beizhu
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.194
Backdoor.Hupigon.DKL BitDefender Trojan.DownLoader.26998
Backdoor.Hupigon.DKL BitDefender Trojan.Adduser
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.4962
Backdoor.Hupigon.DKL BitDefender BackDoor.Graybird
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.5085
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.2684
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.1711
Backdoor.Hupigon.DKL BitDefender Trojan.DownLoader.28161
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.3745
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.2364
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.2908
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.227
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.1690
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.5102
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.4793
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.2647
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.2102
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.2613
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.2692
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.3427
Backdoor.Hupigon.DKL BitDefender Trojan.Arpinject
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.11457
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.6901
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.7483
Backdoor.Hupigon.DKL BitDefender Trojan.MulDrop.11862
Backdoor.Hupigon.DKL BitDefender Win32.HLLW.Autoruner.1647
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.4438
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.2259
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.2858
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.2710
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.8582
Backdoor.Hupigon.DKL BitDefender Trojan.MulDrop.12585
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.738
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.10623
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.1909
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.3544
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.2293
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.2292
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.2306
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.2384
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.634
Backdoor.Hupigon.DKL BitDefender Trojan.DownLoader.33701
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.2472
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.10587
Backdoor.Hupigon.DKL BitDefender BackDoor.Pigeon.8040

1 2 3 4

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.