Home / Spyware Encyclopedia / Proxy.SafeMail << Back

Recommendation to Automatically remove Proxy.SafeMail


Our products can remove Proxy.SafeMail and thousands of other Virus and Spyware automatically and instantly.

Proxy.SafeMail Details


  • Category Proxy
  • Discovered 9/7/2006 8:37:00 PM
  • Modified 8/3/2023 5:31:06 PM
  • Threat Level High
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
TROJAN-PSW.WIN32.NILAGE.PW.dll 42740 1.0.0.1e3360d34fcda432f1dae5875cb55b8f0 
dllz.dll 39936  8fdcb027e0a87ea1b268487b00d2efb6 
Trojan-PSW.Win32.Nilage.pp.exe 33855  66835423b5e1975a2f470a225e3a3d92 
Trojan-PSW.Win32.Nilage.pg.dll 56832  3ddb7da7d39224c76aea80f8418e8d01 
rundll132.exe 25652  065507bc26d1578c7a5dc278c0bed09d 
TROJAN-PSW.WIN32.NILAGE.QJ.EXE 25652  065507bc26d1578c7a5dc278c0bed09d 
rodll.dll 36864  87edf90feeca0039474f7becf430785703/08/2023
rundll132.exe 26412  007e3eb777ee5411414596b7512b354c 
rodll.dll 36864  87edf90feeca0039474f7becf4307857 
TROJAN-PSW.WIN32.NILAGE.PW.EXE 13579  9d58300861990145853613e01d88ff56 

The following Registry Entries were created:
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Rro"\"%WIN%\rundll132.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"reseurce"\"%WIN%\svchost.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"_rx"\"%WIN%\rundll32.exe"
..\Software\Microsoft\Windows\CurrentVersion\Explorer\shellexecutehooks\"{3fdeb171-8f86-4669-b664-69b8db553683}"
..\Software\Classes\Clsid\{3fdeb171-8f86-4669-b664-69b8db553683}\(Default)
..\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\ur32artreg\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware