Home / Spyware Encyclopedia / Proxy.Slaper.e << Back

Recommendation to Automatically remove Proxy.Slaper.e


Our products can remove Proxy.Slaper.e and thousands of other Virus and Spyware automatically and instantly.

Proxy.Slaper.e Details


  • Category Proxy
  • Discovered 2/16/2024 8:20:43 PM
  • Modified 2/19/2024 11:36:50 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e990e1268207447f43dfdfb6dd37c7ab9f702c706520797d0df6922132edb07e.dll 247759 2.30.0.321f5d6da5a75badb5744ec0f7d376c081c 
ea80bae9b5ef445d3c13a1d3c38d0f5e614c558ab4311abd046ccaa09534fb09.exe 100352  38202a7d7580da53bd8e23fc1c4b4bae 
a40e06930aab5b4422d5944364af6510.vir.exe 204800  a40e06930aab5b4422d5944364af6510 
trojan-proxy.win32.slaper.e.d225f78e1a8403b7926becabd0186d4c.exe 2560  2eb6ae6acc2c20d799479a3a4e2efbdd18/06/2020
302225e7990459b3a7c9e2b3544c4982.exe 2560  0330558c80f87278edd0efa72be275ca05/01/2024
3a515ccb110b3aa7c189af0cfbd04002.vir.exe 2560  3a515ccb110b3aa7c189af0cfbd04002 
aeec20a8598aa767b19dc51817902b38.vir.exe 60604  aeec20a8598aa767b19dc51817902b38 
ef172d21a74e0e304880c82014d17c79.vir.exe 2048  ef172d21a74e0e304880c82014d17c79 
15465300315ea81685a27a4e821312a9710659eaa84e5bef6e4028a28049ef8917f6049c0b5005c8b861c2d9fe756.exe 2048  14635d1bbc589257ed3bf7ab644bccfe 
a0fc11f822858adc4031668ae24a986e3b7427619961537562dbbc623b64331e.exe 73728  287b95536da760d2598d11de97ee5a2e 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware