Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

WORM/Zhelatin.Gen aliases:

Name Vendor Dr.Web classification name
WORM/Zhelatin.Gen Avira Trojan.Packed.584
WORM/Zhelatin.Gen Avira Trojan.Packed.391
WORM/Zhelatin.Gen Avira Trojan.Packed.267
WORM/Zhelatin.Gen Avira BackDoor.Bulknet.188
WORM/Zhelatin.Gen Avira Trojan.Packed.202
WORM/Zhelatin.Gen Avira Trojan.Packed.221
WORM/Zhelatin.Gen Avira Trojan.Packed.206
WORM/Zhelatin.Gen Avira Trojan.Packed.203
WORM/Zhelatin.Gen Avira Trojan.Packed.218
WORM/Zhelatin.Gen Avira Trojan.Packed.220
WORM/Zhelatin.Gen Avira Trojan.Packed.201
WORM/Zhelatin.Gen Avira Trojan.Spambot.2566
WORM/Zhelatin.Gen Avira Trojan.DownLoader.1293
WORM/Zhelatin.Gen Avira Trojan.MulDrop.7043
WORM/Zhelatin.Gen Avira Trojan.Packed.68
WORM/Zhelatin.Gen Avira Trojan.Rntm.6
WORM/Zhelatin.Gen Avira Trojan.DownLoader.28157
WORM/Zhelatin.Gen Avira Trojan.Spambot.2890
WORM/Zhelatin.Gen Avira Trojan.Spambot.3077
WORM/Zhelatin.Gen Avira Trojan.Spambot.2569
WORM/Zhelatin.Gen Avira Trojan.Packed.61
WORM/Zhelatin.Gen Avira Trojan.Packed.364
WORM/Zhelatin.Gen Avira Trojan.Packed.84
WORM/Zhelatin.Gen Avira Trojan.Packed.85
WORM/Zhelatin.Gen Avira Trojan.Spambot.3388
WORM/Zhelatin.Gen Avira Trojan.Spambot.2386
WORM/Zhelatin.Gen Avira Trojan.Packed.36
WORM/Zhelatin.Gen Avira Trojan.DownLoader.22971
WORM/Zhelatin.Gen Avira Trojan.DownLoader.1430
WORM/Zhelatin.Gen Avira Trojan.Spambot.2881
WORM/Zhelatin.Gen Avira Trojan.Packed.52
WORM/Zhelatin.Gen Avira Trojan.Spambot.3251
WORM/Zhelatin.Gen Avira Trojan.Packed.208
WORM/Zhelatin.Gen Avira Trojan.Packed.210
WORM/Zhelatin.Gen Avira Trojan.Spambot.3253
WORM/Zhelatin.Gen Avira Dialer.Tibs.57
WORM/Zhelatin.Gen Avira Dialer.Tibs.58
WORM/Zhelatin.Gen Avira Trojan.Spambot.2377
WORM/Zhelatin.Gen Avira Trojan.Hoster.222
WORM/Zhelatin.Gen Avira Trojan.DownLoader.19990
WORM/Zhelatin.Gen Avira Trojan.DownLoader.61663
WORM/Zhelatin.Gen Avira Trojan.Packed.489
WORM/Zhelatin.Gen Avira Trojan.Proxy.2356
WORM/Zhelatin.Gen Avira Trojan.Packed.185
WORM/Zhelatin.Gen Avira Trojan.Spambot.3539
WORM/Zhelatin.Gen Avira Trojan.DownLoader.29490
WORM/Zhelatin.Gen Avira Trojan.DownLoad.965
WORM/Zhelatin.Gen Avira Trojan.DownLoader.50175
WORM/Zhelatin.Gen Avira Win32.Dref
WORM/Zhelatin.Gen Avira Trojan.DownLoader.60044

1 2 3 4 5 6 7 8 9 10 11

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.