Home / Spyware Encyclopedia / Proxy.3proxy.dk << Back

Recommendation to Automatically remove Proxy.3proxy.dk


Our products can remove Proxy.3proxy.dk and thousands of other Virus and Spyware automatically and instantly.

Proxy.3proxy.dk Details


  • Category Proxy
  • Discovered 11/16/2011 9:51:24 PM
  • Modified 7/16/2020 4:30:51 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1024x768_a_562x421jpeg.scr 275669  a1a907c7ebacd22c32bae979c62997d2 
cssrs.exe 46080  199a984c4027236c6650952650b8b917 
94796de39c55b548fdcea2f89598bea0.vxe.exe 275926  94796de39c55b548fdcea2f89598bea0 
0c3ecd922accc90bed1c7ec106274c8907bdad346619ccd7cfb509af29d32123d0cbffbd178ceb232e5478fd9c72646e168.exe 275927  1d51a93502584b3a85d770ec63e03cd6 
daaa0583636647042598b7ece9c91d978f3b078c608e750302c719a728cd650971242d455df91bc50dee94ef885e59b12b8.exe 61440  421a3828f529047777dbb07e541c36ee 
6284d739a53df4bc3694b7a2ed902d46.exe 46080  6284d739a53df4bc3694b7a2ed902d46 
f873eb848392a1c23dc92d02b42e2eafd127ec4d88a9ced35b608bb3d6e3977b93658dafe1659ccb58e1d10024322202cf9.exe 561152Etru Software Development fc1d1f40728ef6bd118ae575d07c5d49 
06a34a00cebd8fd49bcda68cc5474a07.exe 46080  06a34a00cebd8fd49bcda68cc5474a07 
7085d091cd640e30e6e4c0a467db35834a024f84.bin.exe 46080  eb26eee5debe8e33a39883ab516c3388 
2fbe453cbb19a6f2f0741425ca45450080f6f03f.bin.exe 46080  a37f84a8b52bc6b62c217ff9d03f5fb0 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware