Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

WORM/Zhelatin.Gen aliases:

Name Vendor Dr.Web classification name
WORM/Zhelatin.Gen Avira Trojan.Packed.255
WORM/Zhelatin.Gen Avira Trojan.Packed.393
WORM/Zhelatin.Gen Avira Trojan.Packed.384
WORM/Zhelatin.Gen Avira Trojan.Packed.142
WORM/Zhelatin.Gen Avira Trojan.Packed.135
WORM/Zhelatin.Gen Avira Trojan.Packed.131
WORM/Zhelatin.Gen Avira Trojan.Packed.140
WORM/Zhelatin.Gen Avira Trojan.Packed.132
WORM/Zhelatin.Gen Avira Trojan.Packed.178
WORM/Zhelatin.Gen Avira Trojan.Packed.129
WORM/Zhelatin.Gen Avira Trojan.Packed.130
WORM/Zhelatin.Gen Avira Trojan.Packed.166
WORM/Zhelatin.Gen Avira Win32.HLLM.Dref
WORM/Zhelatin.Gen Avira Trojan.Packed.408
WORM/Zhelatin.Gen Avira Trojan.Packed.451
WORM/Zhelatin.Gen Avira Trojan.Packed.217
WORM/Zhelatin.Gen Avira Trojan.Packed.375
WORM/Zhelatin.Gen Avira Trojan.Packed.583
WORM/Zhelatin.Gen Avira Trojan.Packed.512
WORM/Zhelatin.Gen Avira Trojan.Packed.428
WORM/Zhelatin.Gen Avira Trojan.Packed.423
WORM/Zhelatin.Gen Avira Trojan.MulDrop.9725
WORM/Zhelatin.Gen Avira Trojan.MulDrop.8364
WORM/Zhelatin.Gen Avira Trojan.Packed.187
WORM/Zhelatin.Gen Avira Trojan.Packed.192
WORM/Zhelatin.Gen Avira Trojan.Packed.184
WORM/Zhelatin.Gen Avira Trojan.Packed.277
WORM/Zhelatin.Gen Avira Trojan.Packed.322
WORM/Zhelatin.Gen Avira Trojan.Packed.321
WORM/Zhelatin.Gen Avira Trojan.Packed.345
WORM/Zhelatin.Gen Avira Trojan.Packed.344
WORM/Zhelatin.Gen Avira Trojan.Packed.138
WORM/Zhelatin.Gen Avira Trojan.Packed.387
WORM/Zhelatin.Gen Avira Trojan.Packed.381
WORM/Zhelatin.Gen Avira Trojan.Packed.394
WORM/Zhelatin.Gen Avira Trojan.Packed.407
WORM/Zhelatin.Gen Avira Trojan.Packed.380
WORM/Zhelatin.Gen Avira Trojan.Packed.385
WORM/Zhelatin.Gen Avira Trojan.Packed.378
WORM/Zhelatin.Gen Avira Trojan.Packed.392
WORM/Zhelatin.Gen Avira Trojan.Packed.513
WORM/Zhelatin.Gen Avira Trojan.Packed.204
WORM/Zhelatin.Gen Avira Trojan.Packed.193
WORM/Zhelatin.Gen Avira Trojan.Packed.215
WORM/Zhelatin.Gen Avira Trojan.Packed.213
WORM/Zhelatin.Gen Avira Trojan.Packed.216
WORM/Zhelatin.Gen Avira Trojan.Packed.212
WORM/Zhelatin.Gen Avira Trojan.Packed.214
WORM/Zhelatin.Gen Avira Trojan.Packed.555
WORM/Zhelatin.Gen Avira Trojan.Packed.510

1 2 3 4 5 6 7 8 9 10 11

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.