FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Inor aliases:

Name Vendor Dr.Web classification name
JS_PHEL.AD Trend Micro Trojan.Inor
VBS/Generic McAfee Trojan.Inor
IM-Worm.VBS.Macaron.a Kaspersky Trojan.Inor
New Malware!hta McAfee Trojan.Inor
Trojan-Dropper.HTA.Small.c Kaspersky Trojan.Inor
Trojan.Dropper Symantec Trojan.Inor
Generic Dropper.b McAfee Trojan.Inor
Trojan-Dropper.JS.Inor.a Kaspersky Trojan.Inor
Win32/Unknown!Trojan Computer Associates Trojan.Inor
VBS_INOR.BU Trend Micro Trojan.Inor
VBS/Inor McAfee Trojan.Inor
Trojan-Dropper.VBS.Inor.bu Kaspersky Trojan.Inor
Trojan-Dropper.VBS.Inor.by Kaspersky Trojan.Inor
VBS/Inor!Trojan Computer Associates Trojan.Inor
Trojan Horse Symantec Trojan.Inor
VBS_INOR.CB Trend Micro Trojan.Inor
Trojan-Dropper.VBS.Inor.cb Kaspersky Trojan.Inor
JS_INOR.CF Trend Micro Trojan.Inor
Trojan-Dropper.VBS.Inor.cf Kaspersky Trojan.Inor
Trojan-Dropper.VBS.Inor.cm Kaspersky Trojan.Inor
Trojan-Dropper.VBS.Inor.co Kaspersky Trojan.Inor
Trojan-Dropper.VBS.Inor.dx Kaspersky Trojan.Inor
Trojan-Dropper.VBS.Inor.dz Kaspersky Trojan.Inor
VBS/ObjectDataHTA!Component!Troj Computer Associates Trojan.Inor
Trojan-Dropper.VBS.Inor.e Kaspersky Trojan.Inor
VBS_INOR.X Trend Micro Trojan.Inor
Trojan-Dropper.VBS.Inor.x Kaspersky Trojan.Inor
Trojan-Dropper.VBS.Small.n Kaspersky Trojan.Inor
Trojan-Dropper.VBS.Triv Kaspersky Trojan.Inor
Dropper.Inor AVG Trojan.Inor
Trojan.Dropper.Vbs.Inor.BV BitDefender Trojan.Inor
Mal_VBSDrpr Trend Micro Trojan.Inor
HTML/Drop.Scano.E.3 Avira Trojan.Inor
W32/Areses.dr McAfee Trojan.Inor
TrojanDropper:VBS/Scano.gen Microsoft Trojan.Inor
Email-Worm.Win32.Scano.gen Kaspersky Trojan.Inor
Email-Worm.Win32.Scano.gen VirusBlokAda Trojan.Inor
I-Worm/Scano AVG Trojan.Inor
EXP/VBS.Phel.bq.3.B Avira Trojan.Inor
VBS/Exploit-Phel McAfee Trojan.Inor
JS/Phel.O Microsoft Trojan.Inor
Trojan-Dropper.VBS.Inor.cj VirusBlokAda Trojan.Inor
Exploit.VBS.Phel.BQ BitDefender Trojan.Inor
VBS.Trojan.Inor.V BitDefender Trojan.Inor
Trojan-Dropper.JS.Small.g Kaspersky Trojan.Inor
VBS.Trojan.Dropper.Inor.Gen BitDefender Trojan.Inor
Downloader.gen.a McAfee Trojan.Inor
TR/Dldr.Inor.5 Avira Trojan.Inor
Win32/Inor Microsoft Trojan.Inor
Downloader.Inor AVG Trojan.Inor

1 2 3 4 5

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies