Home / Spyware Encyclopedia / Proxy.Slaper.a << Back

Recommendation to Automatically remove Proxy.Slaper.a


Our products can remove Proxy.Slaper.a and thousands of other Virus and Spyware automatically and instantly.

Proxy.Slaper.a Details


  • Category Proxy
  • Discovered 11/7/2023 11:08:49 AM
  • Modified 11/7/2023 4:24:27 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ac36db93f86001653ad5817b5d68e5409fcd2efd.bin.exe 2048  f75b00c83fc64e8265f9b66fe63fe80207/11/2023
08e885f2987956ebf5eb50d4b59ed82c80d4a58cba77ae24f7d41d8f5a0a8058.exe 3916  e14bf88e227f14746fb3dae797dfbfe719/06/2020
0942117de621773520616420644aca914cbad1ef2b90a66d313cd40792642a3f.exe 2048  753419b4f780b3ac8e7785a7200763a217/06/2020
459d1e3256ee1cbd3d605a151989d9227dee61312350af194c2947c28218d3ad.exe 0  3db00e79465dda13420c2795fb6b7f9023/01/2020
070ab1df49119ef2bdd05138b76888d1.vir.exe 2048  070ab1df49119ef2bdd05138b76888d1 
4433ceec73d968fcd75ddd3ec9e79ef8.vir.exe 237568  4433ceec73d968fcd75ddd3ec9e79ef8 
186643899bfd1e3f30c1f4b02fd56949.vir.exe 241664  186643899bfd1e3f30c1f4b02fd56949 
08e885f2987956ebf5eb50d4b59ed82c80d4a58cba77ae24f7d41d8f5a0a8058.exe 3916  e14bf88e227f14746fb3dae797dfbfe7 
0942117de621773520616420644aca914cbad1ef2b90a66d313cd40792642a3f.exe 2048  753419b4f780b3ac8e7785a7200763a2 
7f3cd6dd1fa043abc2aab1b53512a1a4.vir.exe 3921  7f3cd6dd1fa043abc2aab1b53512a1a4 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware