My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets


Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Inor aliases:

Name Vendor Dr.Web classification name
TROJ_INOR.D Trend Micro Trojan.Inor
Downloader.BO.B Symantec Trojan.Inor
TROJ_INOR.F Trend Micro Trojan.Inor
Win32/Maz.A!Trojan Computer Associates Trojan.Inor
TROJ_INOR.A Trend Micro Trojan.Inor
TROJ_INOR.B Trend Micro Trojan.Inor
Win32/Maz.B!Trojan Computer Associates Trojan.Inor
Downloader.BO Symantec Trojan.Inor
TROJ_INOR.C Trend Micro Trojan.Inor
Downloader-BO McAfee Trojan.Inor
Trojan-Downloader.Win32.Inor Kaspersky Trojan.Inor
VBS_INOR.Z Trend Micro Trojan.Inor Kaspersky Trojan.Inor
VBS_INOR.E Trend Micro Trojan.Inor
VBS_INOR.G Trend Micro Trojan.Inor
VBS_ZEROLIN.A Trend Micro Trojan.Inor
Trojan-Dropper.VBS.Zerolin Kaspersky Trojan.Inor
Downloader.Trojan Symantec Trojan.Inor
CHM/Startpage!Trojan Computer Associates Trojan.Inor
Trojan-Dropper.VBS.Inor.dl Kaspersky Trojan.Inor
Trojan.Download.Inor.B Symantec Trojan.Inor
VBS_INOR.U Trend Micro Trojan.Inor
Trojan-Dropper.VBS.Inor.u Kaspersky Trojan.Inor
VBS/Maz!Worm Computer Associates Trojan.Inor
Downloader.BO.B.dr Symantec Trojan.Inor
VBS_INOR.B1 Trend Micro Trojan.Inor
VBS/Win32.Maz.B.11057!Dropper Computer Associates Trojan.Inor
Downloader.BO.dr Symantec Trojan.Inor
VBS_INOR.C.DRP Trend Micro Trojan.Inor
VBS_INOR.D Trend Micro Trojan.Inor
VBS/Win32.Maz.B.10952!Dropper Computer Associates Trojan.Inor
VBS_INOR.B.DRP Trend Micro Trojan.Inor
VBS_INOR.AZ Trend Micro Trojan.Inor
VBS_INOR.AP Trend Micro Trojan.Inor
Trojan-Dropper.VBS.Inor.ap Kaspersky Trojan.Inor
Dialer.Target Symantec Trojan.Inor
Dialer.Crosskirk Symantec Trojan.Inor
Dialer.Global Symantec Trojan.Inor
HTML/Inor.9446!Dropper Computer Associates Trojan.Inor
Trojan-Dropper.VBS.Prob Kaspersky Trojan.Inor
VBS/Inor.E!Trojan Computer Associates Trojan.Inor
VBS_BAYFRAUD.A Trend Micro Trojan.Inor
JScript/StartPage.searchcentral! Computer Associates Trojan.Inor
JS.StartPage Symantec Trojan.Inor
JS_STARTPAGE.A Trend Micro Trojan.Inor
Trojan.JS.StartPage.a Kaspersky Trojan.Inor
JS_INOR.A Trend Micro Trojan.Inor
VBS_SLOWFLODR.A Trend Micro Trojan.Inor
Virus.VBS.Dismissed.b Kaspersky Trojan.Inor
VBS_INOR.F Trend Micro Trojan.Inor

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.