Home / Spyware Encyclopedia / Proxy.Glupteba.gen << Back

Recommendation to Automatically remove Proxy.Glupteba.gen


Our products can remove Proxy.Glupteba.gen and thousands of other Virus and Spyware automatically and instantly.

Proxy.Glupteba.gen Details


  • Category Proxy
  • Discovered 8/22/2024 5:38:49 PM
  • Modified 8/22/2024 6:58:52 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b7386f8aa8a0d5afd9d7b912f91812a3176e54304c33d1b5f68b0eb776de8f69.exe 683008EpicNet Inc.7.2.1.1833e57f9632180511efd0ab72a1cc064 
6f12652e67798d04d87c60d325e5ba9b.exe 683008EpicNet Inc.7.2.1.16f12652e67798d04d87c60d325e5ba9b 
25440b7dbb014443c9a1faf9341c1bcf.exe 683008EpicNet Inc.7.2.1.125440b7dbb014443c9a1faf9341c1bcf 
374a5d1617c8f86ffbdce75976687f4a800059d90cf108127961eda1a0d24dd6.exe 683008EpicNet Inc.7.2.1.177c35a80b58873db3889401db4a4454a 
161274a0e54a7cccb2519289335590fa.exe 683008EpicNet Inc.7.2.1.1161274a0e54a7cccb2519289335590fa 
c8cc1794a483166d9e695839b5b3b64c708a5d44f2a3c2e519f6346415e67fd6.exe 683008EpicNet Inc.7.2.1.13e143863d2e06144b78146ca6b60267c 
89749a9126ab1e19f6e9911350c648feb66da17607468fc6a74143fad832405b.exe 683008EpicNet Inc.7.2.1.15672cdbcbd2d23fdc0b378c2ac2b66e3 
5d72b287c85a78dff49297a92968e9b89d98c010406de529c1476bc8fa9d84dd.exe 683008EpicNet Inc.7.2.1.18fa2e7a846635e3a6fbba71b2c24197a 
6071466c2d7583bd18ca493098b84047.exe 683008EpicNet Inc.7.2.1.16071466c2d7583bd18ca493098b84047 
31aae4ed767984dca196c7bc47ab60df2ba0c7fdb867b9973138a1e56429d862.exe 683008EpicNet Inc.7.2.1.1a18fb5c2c0204d267e2828ee9dc61de9 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware