Home / Spyware Encyclopedia / Proxy.Glupteba.gen << Back

Recommendation to Automatically remove Proxy.Glupteba.gen


Our products can remove Proxy.Glupteba.gen and thousands of other Virus and Spyware automatically and instantly.

Proxy.Glupteba.gen Details


  • Category Proxy
  • Discovered 8/22/2024 5:38:49 PM
  • Modified 8/22/2024 6:58:52 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ad4178bf147be4b217780f4c9d429ae72e108204467c239725475f629776d8bd.exe 683008EpicNet Inc.7.2.1.1d31362d42ad8916bbaf61bf2072baf16 
7a99b55e3aca2743828d54e48f68fa4de0fc66032338b6cec642d5d29c6ab725.exe 683008EpicNet Inc.7.2.1.1c9e15ed372a1349ec3723aa4e9182e86 
699f8522b31084218e661367290ab752b291d1def464e08e58c37fb801867536.exe 683008EpicNet Inc.7.2.1.1056d803e02933c9b31c2353bf02ece0e 
25440b7dbb014443c9a1faf9341c1bcf.exe 683008EpicNet Inc.7.2.1.125440b7dbb014443c9a1faf9341c1bcf 
374a5d1617c8f86ffbdce75976687f4a800059d90cf108127961eda1a0d24dd6.exe 683008EpicNet Inc.7.2.1.177c35a80b58873db3889401db4a4454a 
ac1cc81ccf42f0b88d1b49ccde7474dd99e61a49811bb33b7b1d0af173abeb81.exe 683008EpicNet Inc.7.2.1.108db35c445c108fe659abb9e4376c11d 
d722f4db91e9ab7e914df82653e7197678568bcb758d3ed5e69f112f1c394c4b.exe 683008EpicNet Inc.7.2.1.1f69a6ccbe9aa98623a044a810940d0cd 
8eb7df3194bf0ee3a825143a0d8f6934ad06b4075993afd473a2fc3e022d40a9.exe 683008EpicNet Inc.7.2.1.1f92d115914ae71845b06f4f9ee9acf5f 
978a921b6050a3fdde35fb2f50e29e082331a7f502c4eec075412d2d67046eae.exe 683008EpicNet Inc.7.2.1.1183fd76c2e5038f37b52769c15a9a6e4 
e00fc7d6f84ff16177c72f83e49660a4.exe 683008EpicNet Inc.7.2.1.1e00fc7d6f84ff16177c72f83e49660a4 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware