Home / Spyware Encyclopedia / Proxy.Small.a << Back

Recommendation to Automatically remove Proxy.Small.a


Our products can remove Proxy.Small.a and thousands of other Virus and Spyware automatically and instantly.

Proxy.Small.a Details


  • Category Proxy
  • Discovered 9/21/2012 3:16:48 PM
  • Modified 12/11/2023 10:08:55 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
489c0c62774a692cbdb623c147f3a04cd2bc62e852743a838c02c54e54490cbc.exe 12176  33d9c658abcf25f969e89c68515a0358 
c1c83dae168c83094483feb172b03fe4.exe 1650  c1c83dae168c83094483feb172b03fe4 
0e6100ad22e79505b36729ce5047e9df.exe 27136  0e6100ad22e79505b36729ce5047e9df 
805280972e92f9b7c607f9f018740597.vir.exe 36864  805280972e92f9b7c607f9f018740597 
5a9a027f4274c7f6e05d30ecaa5eda5a76a2c178659f78a2fcc7524725e1e73f.exe 28672  24172c85553534e0d584bf04d8640b4d23/01/2020
trojan-proxy.win32.small.a-6ee1190388db75badd91cf73cecbdb0053fca1be.exe 11776  5d584daee743249991fe8d5fcc90cae514/07/2023
19103005311ce15bfbdca5bf4ed22b949e73f15b28fc4c524ea0463dc4f36fc5b711b20324bce7cbafb26b4862195.exe 14141  ef22155c9bae496108c8779caea4b01a14/07/2023
SREDIR(1).EXE 2512  f52d9e1ccfa4ea97c0a1c489a975203b25/02/2021
e8e2867fab72b48e5bcdee34ffd2f4154bc1a647e211afb9a12add16b42736ca.exe 29721  190ece27b5b73e4adb7ad62e46c80fc321/08/2020
0e6100ad22e79505b36729ce5047e9df.exe 27136  0e6100ad22e79505b36729ce5047e9df18/08/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware