My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets


Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Trojan.Proxy.3747 in virus library:

A class of malware that turns infected devices into proxy servers to redirect criminal network traffic through them.

Trojan.Proxy.3747 aliases:

Name Vendor Dr.Web classification name
TR/Crypt.XPACK.Gen Avira Trojan.Proxy.3747
Program:Win32/XPAntiVirus Microsoft Trojan.Proxy.3747
Heur.Trojan.Generic Kaspersky Trojan.Proxy.3747
Trojan.Agent.AJOS BitDefender Trojan.Proxy.3747
TSPY_ZBOT.RC Trend Micro Trojan.Proxy.3747
Trojan-Spy.Win32.Zbot.cyy Kaspersky Trojan.Proxy.3747
Trojan-Spy.Win32.Zbot.ctt VirusBlokAda Trojan.Proxy.3747
Backdoor.Bot.19202 BitDefender Trojan.Proxy.3747
TSPY_ZBOT.SV Trend Micro Trojan.Proxy.3747
TR/Spy.ZBot.dwr.1 Avira Trojan.Proxy.3747 McAfee Trojan.Proxy.3747
TR/Dropper.Gen Avira Trojan.Proxy.3747
PWS:Win32/Zbot.gen!G Microsoft Trojan.Proxy.3747
TR/Spy.ZBot.DYC Avira Trojan.Proxy.3747 McAfee Trojan.Proxy.3747
Trojan.Spy.Zbot.JI BitDefender Trojan.Proxy.3747
TSPY_ZBOT.UC Trend Micro Trojan.Proxy.3747
Generic PWS.y McAfee Trojan.Proxy.3747
VirTool:Win32/Obfuscator.BL Microsoft Trojan.Proxy.3747
Trojan:Win32/Zbot.BF Microsoft Trojan.Proxy.3747
Trojan.Win32.FraudPack.gen VirusBlokAda Trojan.Proxy.3747
TSPY_ZBOT.MMS Trend Micro Trojan.Proxy.3747
Malware-Cryptor.Win32.General.2 VirusBlokAda Trojan.Proxy.3747
Trojan.FakeAlert.Gen.1 BitDefender Trojan.Proxy.3747
Trojan.Spy.Wsnpoem.GC BitDefender Trojan.Proxy.3747
PWS:Win32/Zbot.PK Microsoft Trojan.Proxy.3747
TR/Crypt.ZPACK.Gen Avira Trojan.Proxy.3747
Malware-Cryptor.Win32.General.3 VirusBlokAda Trojan.Proxy.3747
TROJ_Generic.DIT Trend Micro Trojan.Proxy.3747
TROJ_Generic.SFB Trend Micro Trojan.Proxy.3747
Generic Downloader.z McAfee Trojan.Proxy.3747
PWS:Win32/Zbot.gen!R Microsoft Trojan.Proxy.3747

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.