Home / Spyware Encyclopedia / Proxy.Delf.h << Back

Recommendation to Automatically remove Proxy.Delf.h


Our products can remove Proxy.Delf.h and thousands of other Virus and Spyware automatically and instantly.

Proxy.Delf.h Details


  • Category Proxy
  • Discovered 3/31/2011 7:24:00 PM
  • Modified 8/11/2023 3:36:34 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
19821883a3575521d8a443514f543f9ff33f947adc3054a4092bc30787ad10e5.exe 30018  5e8dc9836d99f91024a3485718c462f3 
trojan-proxy.win32.delf.h.exe 27648  3778ddfd769f7478a2abfe993dd616e208/08/2023
trojan-proxy.win32.delf.h.exe 27648  3778ddfd769f7478a2abfe993dd616e211/08/2023
Trojan-Proxy.Win32.Delf.h 27648  3778ddfd769f7478a2abfe993dd616e211/08/2023
1a53fb1e629aeae5d8b517ae60462a20.exe 26112  1a53fb1e629aeae5d8b517ae60462a2011/08/2023
0eace6015f4e6ebf3c7a001a4d2a28524e4298cb113f6bd724cc01401e85a289.exe 48396  ff8f9af66ff3b9f21bef8b9033a67d22 
58f28a415a255f820b270e13a043b42faff0052d9f9725240ea87428e742b9e07b3d3330b9101722197072828024987b5d1.exe 27648  9917aa5dccb289011bb3fb51d2a3b12c 
1a53fb1e629aeae5d8b517ae60462a20.exe 26112  1a53fb1e629aeae5d8b517ae60462a20 
58f28a415a255f820b270e13a043b42faff0052d9f9725240ea87428e742b9e07b3d3330b9101722197072828024987b5d1.exe 27648  9917aa5dccb289011bb3fb51d2a3b12c08/08/2023
19821883a3575521d8a443514f543f9ff33f947adc3054a4092bc30787ad10e5.exe 30018  5e8dc9836d99f91024a3485718c462f304/08/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware