Home / Spyware Encyclopedia / Proxy.Glupteba.gen << Back

Recommendation to Automatically remove Proxy.Glupteba.gen


Our products can remove Proxy.Glupteba.gen and thousands of other Virus and Spyware automatically and instantly.

Proxy.Glupteba.gen Details


  • Category Proxy
  • Discovered 2/1/2019 1:14:25 PM
  • Modified 11/8/2023 5:35:33 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
0dd2c0210e8f26e9bedb2e97e3a6aa4c8af088f3d923bdeb84a701c022d95630.exe 683008EpicNet Inc.7.2.1.16b33ddc24dfa79c7f0c3881737a1bad9 
3756c0e9d05de859f1000dcd655d315543aca42655e199404c36af889a316916.exe 683008EpicNet Inc.7.2.1.1abb839674872b6aea23d3bc8a6d14e8f 
a16d94db4139eb15e4e0709cd869c66ee789f9ecfe327c768647c550475a5546.exe 683008EpicNet Inc.7.2.1.19f761061b5aaffe8e6dd3c721e4cccf0 
be72769c494d14f906121f2ca289df3a9e4e82d4e2181547ece004cf0a4a2aaf.exe 683008EpicNet Inc.7.2.1.132f8403e9a40fbaf1ac2c30704377778 
dc9af1e7b0b3c3baf2d67437e303bce051502df5461c0d890197e0098f3676c0.exe 683008EpicNet Inc.7.2.1.12408377c7e779562e5e36ec977575122 
cloudnet.exe 683008EpicNet Inc.7.2.1.1feeb4b4fff818ac8482d5a8f65358e0419/11/2019
cloudnet.exe 683008EpicNet Inc.7.2.1.1fe30d5abd9464e378faf3436e8d7e2e819/11/2019
cloudnet.exe 683008EpicNet Inc.7.2.1.162cc342a52bb2d6743c3da379f9e2cde29/11/2019
cloudnet.exe 683008EpicNet Inc.7.2.1.1b87fc0fb239f62580dd83ab6fed806b329/11/2019
cloudnet.exe 683008EpicNet Inc.7.2.1.157621cd13ec38a5fda9f94e988386f6a29/11/2019

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware