Home / Spyware Encyclopedia / Proxy.Daemonize.ba << Back

Recommendation to Automatically remove Proxy.Daemonize.ba


Our products can remove Proxy.Daemonize.ba and thousands of other Virus and Spyware automatically and instantly.

Proxy.Daemonize.ba Details


  • Category Proxy
  • Discovered 7/14/2023 8:57:02 AM
  • Modified 7/14/2023 12:17:07 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
sdchostc.exe 12000  66f97b117fb2ca95c5cc2ea79dce6059 
sdchosts.exe 17000  60333c5866e8117a50e20b071c53ca0e 
6df38f83e983b91056b61f8e94f6ae7d16ee0486da370e5e451b5bd7f546c5c1.exe 83387  2016b7183783013beaa82b2e350bd745 
Trojan-Proxy.Win32.Daemonize.ba 17000  60333c5866e8117a50e20b071c53ca0e23/01/2020
58d0b61432c31fb49544a9b15b5001c990b6f05e9499376973857a9c648115db.exe 0  062374f288132c24fed908f166fdec0f25/06/2020
trojan-proxy.win32.daemonize.ba-01b259cb8676b640a07e53e3dd889894e4a19157.exe 21052  49c05a17b24d05a404a8782d289d77d614/07/2023
trojan-proxy.win32.daemonize.ba-876d4e90021c60cda75315110547d137fedbde66.exe 33444  2d0066a6948249362cd00c9f61fb4a4b14/07/2023
trojan-proxy.win32.daemonize.ba-8a8cf07f9f72ca98804fe78ed736c9b6b3b45aeb.exe 17924  8ea3c62e223b761c8d0e563d429a2f3114/07/2023
f2f056b0574653d06e9bf253ffd7a074.vir.exe 21216  f2f056b0574653d06e9bf253ffd7a074 
47e6bfa1206715305f8e67276f1c5e7e97dcd6d18193bed18a3d7724f8c68395.exe 19916  92c52960cccf4dbc03e09656d61c7553 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware