Home / Spyware Encyclopedia / Proxy.3proxy.af << Back

Recommendation to Automatically remove Proxy.3proxy.af


Our products can remove Proxy.3proxy.af and thousands of other Virus and Spyware automatically and instantly.

Proxy.3proxy.af Details


  • Category Proxy
  • Discovered 5/25/2010 11:51:43 AM
  • Modified 3/1/2021 10:06:46 AM
  • Threat Level Medium
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
19181300892a73530c2d6e3fd6f2635a76f7118770725d3e2f9d415511484a5686f1ef8c4b3f8481f62e3734691eb.exe 18944  5d3f13453574a7730f29fe3f85a0b66913/08/2020
5f510cf729a52ab84b3ba15000a52443.vir.exe 368997  5f510cf729a52ab84b3ba15000a52443 
7f4f984a614a6f7da43557f0eb5f3193.vir.exe 297586  7f4f984a614a6f7da43557f0eb5f3193 
bf51f85631070849c879657328521f4a.vir.exe 42496  bf51f85631070849c879657328521f4a 
55347b91ac07e5f99caab46f98c9a281.vir.exe 357758  55347b91ac07e5f99caab46f98c9a281 
674f51d3da9691121810f9c0156426c1cb61ec22202ce431b8564787dd27aa8e.exe 301633  89cab84d98d7cfddf0fc6b9d466f5bdc 
464b814d9d9fce895d183c402f932beb2fae5120731dd15c84193968b30666d9.exe 287640  e1586936f162285d7f1277b25767aaf5 
67d3181254e14e96a846ed8027e0a8e1465c8830054ed9bf5875464b6cd664a2.exe 418497  2e4d3f9661fb974d209c1d76400ad4c0 
ef623f6225490ea39806277c6293be61.exe 5938176Microsoft Corporation6.00.3790.0 (srv03_ef623f6225490ea39806277c6293be61 
7305111dffcbd34c65221ec5b216092e.exe 1396736Microsoft Corporation6.00.3790.0 (srv03_7305111dffcbd34c65221ec5b216092e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware