Home / Spyware Encyclopedia / Proxy.Glupteba.gen << Back

Recommendation to Automatically remove Proxy.Glupteba.gen


Our products can remove Proxy.Glupteba.gen and thousands of other Virus and Spyware automatically and instantly.

Proxy.Glupteba.gen Details


  • Category Proxy
  • Discovered 8/22/2024 5:38:49 PM
  • Modified 8/22/2024 6:58:52 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ad4178bf147be4b217780f4c9d429ae72e108204467c239725475f629776d8bd.exe 683008EpicNet Inc.7.2.1.1d31362d42ad8916bbaf61bf2072baf16 
374a5d1617c8f86ffbdce75976687f4a800059d90cf108127961eda1a0d24dd6.exe 683008EpicNet Inc.7.2.1.177c35a80b58873db3889401db4a4454a 
e6927efd68228d2c68b42908e58152289db87f7d4c0df81d3ccab290660a6972.exe 683008EpicNet Inc.7.2.1.1604c65256c025896b21d3aae8f010a8b 
161274a0e54a7cccb2519289335590fa.exe 683008EpicNet Inc.7.2.1.1161274a0e54a7cccb2519289335590fa 
b787ce36590af364b9f20565facad55ae15ec6cd90f6c1a896edeefff5f7ee39.exe 683008EpicNet Inc.7.2.1.1a1cb305ce3b7a94368743dc33820a006 
5d5cf6711a23671d4d72f48b79fc5df1c205dfcc49c595cc1447a909c53608e3.exe 683008EpicNet Inc.7.2.1.1f1dc6df9e746cad42bfb18fc46ffd79b 
596c2aa96af1fe9cfb5e4db00229ec62ff7dc7d14745069387d9f59a70bf9c47.exe 683008EpicNet Inc.7.2.1.15ecd99d2909dfed72f9a635a7ff23267 
68c95b22278e604742175475162bb30d3aa34127fca65b77b362b10b37ee7fb7.exe 683008EpicNet Inc.7.2.1.1eb61e6a11f015a9e54f18624477f6059 
e00fc7d6f84ff16177c72f83e49660a4.exe 683008EpicNet Inc.7.2.1.1e00fc7d6f84ff16177c72f83e49660a4 
03da27aa5077d84ceb7ac493586dcd574df8f852175d16f64af6cc7b8b2530fb.exe 683008EpicNet Inc.7.2.1.146582531eac0353ac84287f338a3b272 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware