Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

VBS/Inor aliases:

Name Vendor Dr.Web classification name
VBS/Inor McAfee Worm.Bizex
VBS/Inor McAfee Trojan.MulDrop.597
VBS/Inor McAfee Trojan.MulDrop.2028
VBS/Inor McAfee Trojan.MulDrop.529
VBS/Inor McAfee Trojan.MulDrop.2351
VBS/Inor McAfee Trojan.MulDrop.819
VBS/Inor McAfee VBS.Kelebek
VBS/Inor McAfee Trojan.MulDrop.671
VBS/Inor McAfee Trojan.MulDrop.544
VBS/Inor McAfee Trojan.ProAgent.121
VBS/Inor McAfee VBS.Psyme
VBS/Inor McAfee Trojan.MulDrop.2349
VBS/Inor McAfee Trojan.DownLoader.2076
VBS/Inor McAfee VBS.Psyme.130
VBS/Inor McAfee VBS.Generic.435
VBS/Inor McAfee VBS.Psyme.133
VBS/Inor McAfee Trojan.DownLoader.1951
VBS/Inor McAfee Win32.HLLM.Foo.54784
VBS/Inor McAfee Trojan.MulDrop.601
VBS/Inor McAfee Trojan.MulDrop.478
VBS/Inor McAfee VBS.Generic.425
VBS/Inor McAfee Trojan.MulDrop.668
VBS/Inor McAfee Trojan.MulDrop.586
VBS/Inor McAfee Trojan.Inor
VBS/Inor McAfee VBS.Psyme.145
VBS/Inor McAfee Trojan.MulDrop.979
VBS/Inor McAfee VBS.Inor
VBS/Inor McAfee Trojan.AppActXComp
VBS/Inor McAfee VBS.Generic.397
VBS/Inor McAfee Trojan.DownLoader.1142
VBS/Inor McAfee Trojan.MulDrop.477
VBS/Inor McAfee Win32.HLLM.Perf
VBS/Inor McAfee Trojan.MulDrop.17265
VBS/Inor McAfee VBS.Psyme.120
VBS/Inor McAfee VBS.Psyme.144
VBS/Inor McAfee VBS.Siggen.7087
VBS/Inor McAfee Trojan.MulDrop.2908
VBS/Inor Avira Trojan.MulDrop.17262
VBS/Inor McAfee VBS.Siggen.7116
VBS/Inor McAfee Trojan.MulDrop.17263
VBS/Inor McAfee Tool.Inor
VBS/Inor McAfee VBS.Psyme.203
VBS/Inor Avira Trojan.MulDrop.477
VBS/Inor McAfee Trojan.Bedrill
VBS/Inor McAfee Trojan.MulDrop.406
VBS/Inor McAfee Trojan.MulDrop.584
VBS/Inor McAfee Trojan.MulDrop.1390
VBS/Inor McAfee Trojan.MulDrop.583
VBS/Inor McAfee Trojan.MulDrop.1350
VBS/Inor McAfee VBS.Siggen.7106

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.