Home / Spyware Encyclopedia / Proxy.Delf.dj << Back

Recommendation to Automatically remove Proxy.Delf.dj


Our products can remove Proxy.Delf.dj and thousands of other Virus and Spyware automatically and instantly.

Proxy.Delf.dj Details


  • Category Proxy
  • Discovered 7/24/2020 5:12:48 AM
  • Modified 7/24/2020 1:33:05 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
trojan-proxy.win32.delf.dj.3b1c83fb8f3b1c09206a51c6f4be37cb.exe 240640  3b1c83fb8f3b1c09206a51c6f4be37cb24/07/2020
57cb8f9b49799c37ba0bfc8019eaca4c.vir.dll 240645Microsoft Corporation5.1.2600.218057cb8f9b49799c37ba0bfc8019eaca4c 
1ab434b681921a5e5d145e3f8464a027.vir.dll 240710Microsoft Corporation5.1.2600.21801ab434b681921a5e5d145e3f8464a027 
655886c5cf340b1ad3593a3d3b6a22a8.vir.dll 373775Microsoft Corporation5.1.2600.2180655886c5cf340b1ad3593a3d3b6a22a8 
46b9d27da7e807fdebadabf938105181.vir.dll 240644Microsoft Corporation5.1.2600.218046b9d27da7e807fdebadabf938105181 
a31be2c27cd51c228552e8ca7a29a065.vir.dll 373764Microsoft Corporation5.1.2600.2180a31be2c27cd51c228552e8ca7a29a065 
19539f19937ffb894229cac26ac8bab0.vir.dll 373764Microsoft Corporation5.1.2600.218019539f19937ffb894229cac26ac8bab0 
037a930cb47fefa0ad929e487942ac44.vir.dll 373830Microsoft Corporation5.1.2600.2180037a930cb47fefa0ad929e487942ac44 
fbad422fb66ade4f84ca6a72cdbf4e03.vir.dll 240644Microsoft Corporation5.1.2600.2180fbad422fb66ade4f84ca6a72cdbf4e03 
c3a36a1299e9ff4bd47ccc5f80d1ad31.vir.dll 240644Microsoft Corporation5.1.2600.2180c3a36a1299e9ff4bd47ccc5f80d1ad31 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware