Home / Spyware Encyclopedia / Proxy.Jaber.g << Back

Recommendation to Automatically remove Proxy.Jaber.g


Our products can remove Proxy.Jaber.g and thousands of other Virus and Spyware automatically and instantly.

Proxy.Jaber.g Details


  • Category Proxy
  • Discovered 6/9/2016 10:26:15 PM
  • Modified 7/31/2023 5:24:54 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
trojan-proxy.win32.jaber.g-c591bab00edb23482b5e1a3815699a46e6b10d4f.exe 28672  16c67515543773aebd251c719f609fcd14/07/2023
21d2cb83e86b2fe75826adebb0ac110580e74388966ac2b228121f779ef2e093.exe 301568  f266c493ef850e517a35ff79dc36601211/02/2023
387ad95466ee040ee4c4a5f1d62208dc95a9d0c21100b5a3f347810064792fc2.exe 87040  6ff0adbcb0dfdd6643994dce54563e9723/01/2020
a69379de9294560b71d8ac14d17bf5af.vir.exe 325632  a69379de9294560b71d8ac14d17bf5af 
13f837408077bb5ad512827a934cb1cc.vir.exe 28672  13f837408077bb5ad512827a934cb1cc 
191550053117a26db224d56fa760d7199436dcd073290572b51cfdf45b738c1e6991591593cd6e8166dcf0e9073b0.exe 325632  60398b604ff20a78540cc02872fdd693 
21d2cb83e86b2fe75826adebb0ac110580e74388966ac2b228121f779ef2e093.exe 301568  f266c493ef850e517a35ff79dc366012 
trojan-proxy.win32.jaber.g 87040  6ff0adbcb0dfdd6643994dce54563e97 
3941bcdf.exe 18149  097f8d00c2ab64c9724330fbf8448be9 
d5741823.exe 18112  287f12d2305b1ba6d2e375dbc8dc37fc 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware