Home / Spyware Encyclopedia / Proxy.3proxy.dk << Back

Recommendation to Automatically remove Proxy.3proxy.dk


Our products can remove Proxy.3proxy.dk and thousands of other Virus and Spyware automatically and instantly.

Proxy.3proxy.dk Details


  • Category Proxy
  • Discovered 11/16/2011 9:51:24 PM
  • Modified 7/16/2020 4:30:51 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1024x768_a_562x421jpeg.scr 275669  a1a907c7ebacd22c32bae979c62997d2 
cssrs.exe 46080  199a984c4027236c6650952650b8b917 
0c3ecd922accc90bed1c7ec106274c8907bdad346619ccd7cfb509af29d32123d0cbffbd178ceb232e5478fd9c72646e168.exe 275927  1d51a93502584b3a85d770ec63e03cd6 
daaa0583636647042598b7ece9c91d978f3b078c608e750302c719a728cd650971242d455df91bc50dee94ef885e59b12b8.exe 61440  421a3828f529047777dbb07e541c36ee 
f873eb848392a1c23dc92d02b42e2eafd127ec4d88a9ced35b608bb3d6e3977b93658dafe1659ccb58e1d10024322202cf9.exe 561152Etru Software Development fc1d1f40728ef6bd118ae575d07c5d49 
b504cd972ff957109d30441e57db934f82564c217da3de67e32c22ad5201f556.exe 46080  c7edbb1d89bc9e05738b0b5392f9fe2f 
2c71dccecfaf7801c64673d0d36322c9.exe 10240  2c71dccecfaf7801c64673d0d36322c9 
7085d091cd640e30e6e4c0a467db35834a024f84.bin.exe 46080  eb26eee5debe8e33a39883ab516c3388 
87fd77fb281d761bc4b1ec087d616652.exe 46080  87fd77fb281d761bc4b1ec087d616652 
bb678d074d6992542c8140bafc3499e2.exe 46080  bb678d074d6992542c8140bafc3499e2 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware