Home / Spyware Encyclopedia / Proxy.Delf.of << Back

Recommendation to Automatically remove Proxy.Delf.of


Our products can remove Proxy.Delf.of and thousands of other Virus and Spyware automatically and instantly.

Proxy.Delf.of Details


  • Category Proxy
  • Discovered 3/29/2012 3:30:56 AM
  • Modified 7/6/2020 2:44:50 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c6c706e43716a329c8abde0dd141a02a.exe 417282  c6c706e43716a329c8abde0dd141a02a 
f0f49c408b63a2e26c949d5ddcede93c.vir.exe 354502  f0f49c408b63a2e26c949d5ddcede93c 
p000499_000370562-848A7982_1bc060aab7e2fcceb509af40b852d4d7.EXE 0  1bc060aab7e2fcceb509af40b852d4d721/07/2023
1aca117b9da83594034c24c4af27962e29d72a174a8e1e5f2b3b2ec0b343f7b6.exe 314722  617504c51436385b22f9ad8dbbdd61b212/03/2020
5fe56dd7cc81b1bb472c4cc2601495f5.exe 438784  5fe56dd7cc81b1bb472c4cc2601495f5 
1aca117b9da83594034c24c4af27962e29d72a174a8e1e5f2b3b2ec0b343f7b6.exe 314722  617504c51436385b22f9ad8dbbdd61b2 
91e4e2621b600b8969bf690a41cb4f5b3f1ee416e6871ef593889ebcddacf97369bca8b3e9184d07dce83456591f7be1c55.exe 1011200  5912b479757b3b1272a3a69a0bc5a716 
3e3efb5ee166836c9230cde714a9cc5b3e8e3606af22f5f6db7fedce7c3038fdc765b494297e034e29bdd23997ee1de95fc.exe 416922  5f418c9cd2e26c1e8cf17ac3d6c6952d 
d12d3403402d31665cdd2a733c1c6079.vxe.exe 1011200  d12d3403402d31665cdd2a733c1c6079 
1433351_uninstall.exe 429056  49e4a0e1fd6be9c22173ff82694db8c1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware