Home / Spyware Encyclopedia / Proxy.SafeMall << Back

Recommendation to Automatically remove Proxy.SafeMall


Our products can remove Proxy.SafeMall and thousands of other Virus and Spyware automatically and instantly.

Proxy.SafeMall Details


  • Category Proxy
  • Discovered 5/13/2009 11:36:31 AM
  • Modified 8/11/2023 3:35:39 PM
  • Threat Level High
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
Trojan-PSW.Win32.Nilage.rg.dll 42740 1.0.0.12524f15d4c5afd934c54fdd739dbf5ff 
Trojan-PSW.Win32.Nilage.uj.dll 42740 1.0.0.100e661a873a625b980a2c4534233e109 
adll.dll 36864  ac0089b69a55608eed26e45fdecbcb5b 
Trojan-PSW.Win32.Nilage.rs.dll 40448  a257f69ff42e848b6b1dc818f056b48d 
adll.dll 35328  901993b22440d17703168681ad4f9d9f 
eihsrsas.dll 60928  83d4bed47cee4034495825261a8003c4 
Trojan-PSW.Win32.Nilage.uc.exe 42600  7efe3d6b7bec040d4df91d024c12f265 
Trojan-PSW.Win32.Nilage.sk.dll 36864  79ce407367d9d6247d5850d98ff0e3c8 
update.dll 32360  1c86d09862baed06de2468399374a94e 
Trojan-PSW.Win32.Nilage.rf.exe 38912  1bca2c0ef5a104cda8577bca34d4178c 

The following Registry Entries were created:
..\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\"{16AF5A08-C4BD-440A-B926-CA0866829EC2}"
..\Software\Classes\Clsid\{16AF5A08-C4BD-440A-B926-CA0866829EC2}\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Explorer\shellexecutehooks\"{6450d9c6-4cc7-4826-8efd-1d04afc7f7f0}"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"kavpersonal"\"%win%\svchost.exe"
..\Software\Classes\Clsid\{6450d9c6-4cc7-4826-8efd-1d04afc7f7f0}\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware