Backdoor:Win32/Hupigon.CN Description

Type: Backdoors

Backdoor:Win32/Hupigon.CN is a backdoor Trojans that enables a remote cybercriminal to obtain full access and control over the corrupted PC. While being installed, Backdoor:Win32/Hupigon.CN makes system modifications by adding malevolent files on the infected computer. Backdoor:Win32/Hupigon.CN also modifies the Windows Registry. Backdoor:Win32/Hupigon.CN inserts and executes its copyon the targeted PC. Backdoor:Win32/Hupigon.CN's copies have the read-only and hidden attributes set. Backdoor:Win32/Hupigon.CN modifies the registry entries to make sure that it launches when you start Windows. Backdoor:Win32/Hupigon.CN executes a variety of harmful activities, such as, logging keystrokes or stealing confidential information, controlling and taking screenshots, controlling a web camera of the desktop, turning on a microphone to listen to and record the victim, recording the affected PC owner's private details such as usernames, passwords and the websites visited, once the attacked PC is corrupted and connected to the web or a network.

Technical Information

File System Details

Backdoor:Win32/Hupigon.CN creates the following file(s):
# File Name Detection Count
1 [system folder] \windows.exe N/A
2 [system folder] \ windowsapplication1.exe N/A
3 %APPDATA% \svchost.exe\multistarter.exe N/A
4 %APPDATA% \svchost.exe N/A
5 [system folder] \taskmrg.exe (not taskmgr.exe) N/A

Registry Details

Backdoor:Win32/Hupigon.CN creates the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run "Policies" = "%SYSTEM%\server.exe"
HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components\[RANDOM CHARACTERS] "StubPath" = "%SYSTEM%\windows.exe restart" or "%SYSTEM%\server.exe restart"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "Policies" = "%SYSTEM%\windows.exe"
HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components\2DW0SJYE-LCXY-1KR2-V0J8-4JW360NX073R" "StubPath" = [system folder]\windows.exe restart

Site Disclaimer is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.