Home / Spyware Encyclopedia / Proxy.Symbab.o << Back

Recommendation to Automatically remove Proxy.Symbab.o


Our products can remove Proxy.Symbab.o and thousands of other Virus and Spyware automatically and instantly.

Proxy.Symbab.o Details


  • Category Proxy
  • Discovered 8/3/2023 3:59:00 PM
  • Modified 8/3/2023 5:34:47 PM
  • Threat Level Medium
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
f6edc7cc70e3e892356cd6f963fd1405cf49e23cb0ff2f31b9b0f78f5bd74a23.exe 8192  0f9b0ff64ff6407a8a3cb489bbf121ed 
76729cc7d4a628b790b51375ada5a9a0086d40a59ad157adaf17b1d4312ee55564639f7a2beb812ad010ccc47a6ee170745.exe 33280  1607d2130809a41a8cc211ccb0deaf57 
aa7c28e7f7c808d0eff95e5badf16cb313145388b200cee09dc6bde1b717d895.exe 6656  0042ca8cc644d6170468e5124109691e 
15f7218d7bf4f12bb97e1573cb563e4d.vir.exe 19968  15f7218d7bf4f12bb97e1573cb563e4d 
7f0a80744409bca4c62deba32071d8fb.vir.exe 19456  7f0a80744409bca4c62deba32071d8fb 
a9c37e02dc4482c32cae6e3ed65998c8.vir.exe 25088  a9c37e02dc4482c32cae6e3ed65998c8 
4f0311458ac9bdca0fcb4a8a7a877525.vir.exe 25088  4f0311458ac9bdca0fcb4a8a7a877525 
3283f38d246cca5542e002de757b3835.vir.exe 25088  3283f38d246cca5542e002de757b3835 
ef129253b734252231e966fcbc795acd.vir.exe 18944  ef129253b734252231e966fcbc795acd 
1f8104e3806882a53c74c8f671d438ff.vir.exe 16384  1f8104e3806882a53c74c8f671d438ff 

The following Registry Entries were created:
..\Software\Microsoft\Windows\CurrentVersion\Run\\"rundll"\"rundll.exe"

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware