Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

TROJ_EMBEDDED.CN aliases:

Name Vendor Dr.Web classification name
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.8010
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.7980
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9789
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.11951
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.8759
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9154
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autoruner.7680
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autoruner.7702
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.10034
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.7649
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.8033
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.8694
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9833
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9969
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.10242
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.7872
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.7933
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.7981
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.8007
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.7944
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.7949
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.7983
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.7850
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9233
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9570
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9442
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.11845
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.11851
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.11907
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.10044
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.7860
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9110
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9664
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.8762
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9114
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9132
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.10150
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9810
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9887
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.8017
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9544
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9624
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9189
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autoruner.based
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9562
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9481
TROJ_EMBEDDED.CN Trend Micro Trojan.KillFiles.932
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.6918
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.10326
TROJ_EMBEDDED.CN Trend Micro Win32.HLLW.Autohit.9029

1 2 3

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.