Home / Spyware Encyclopedia / Proxy.Delf.bz << Back

Recommendation to Automatically remove Proxy.Delf.bz


Our products can remove Proxy.Delf.bz and thousands of other Virus and Spyware automatically and instantly.

Proxy.Delf.bz Details


  • Category Proxy
  • Discovered 5/10/2016 12:20:32 AM
  • Modified 7/24/2023 3:08:34 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
trojan-proxy.win32.delf.bz 57344  32e8de215466daf64bdd471a645a8e83 
170d12a97629276f0add6e08a14ff01f.vxe.exe 201216  170d12a97629276f0add6e08a14ff01f 
trojan-proxy.win32.delf.bz.c8dbd8b5f4cb075f5769ca17726286a9.exe 207872  c8dbd8b5f4cb075f5769ca17726286a921/08/2020
trojan-proxy.win32.delf.bz-a06a510e0ebb394876bc4eba9117ff327c9dcdea.exe 59392  99769cad9d462b813b46132fc3641e8a14/07/2023
2c03b2d909962a265c73f3f34569899f.vir.exe 154624  2c03b2d909962a265c73f3f34569899f21/07/2023
trojan-proxy.win32.delf.bz.3cca28d20eb70636da5dce80fb5206e6.exe 201216  3cca28d20eb70636da5dce80fb5206e612/12/2020
a28133ded286b235dab46e696c645b8b.vir.exe 181760  a28133ded286b235dab46e696c645b8b 
f934452b7240c99ccfc952fddc057530.vir.exe 159232  f934452b7240c99ccfc952fddc057530 
119881bed03fc292f2fb46c16bbf5c27a02afd8142a61408df49f9b1c4f30880.exe 59392  a62e93d777483f816e9ddff7a9461b2a 
13050009213b435e7f9d3e1eff999d3769dbab14f63e54dbd8a6f846d921b035629d13db84818643e17615655cc8b.exe 58368  2207a971087f2db774565b301c6e2b95 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware