How to remove TNProxy.dll
- File Details
- Overview
- Analysis
TNProxy.dll
The module TNProxy.dll has been detected as PUP.Tencent
File Details
Product Name: |
|
Company Name: |
|
MD5: |
e9c00133a8d551e855a2379b96fe84d5 |
Size: |
707 KB |
First Published: |
2017-05-21 03:01:55 (7 years ago) |
Latest Published: |
2022-11-03 23:10:13 (2 years ago) |
Status: |
PUP.Tencent (on last analysis) |
|
Analysis Date: |
2022-11-03 23:10:13 (2 years ago) |
Overview
%commondir%\tencent\qqdownload\135 |
%sysdrive%\adwcleaner\quarantine\files\aoeebxjpmnptikowcmosreuybblnlvpy\qqdownload\132 |
%programfiles%\shuame\3.3.6.171\downloader |
%commondir%\tencent\qqdownload\131 |
%programfiles%\tencent\qq\bin |
%appdata%\tencent\qqphonemanager\components\qqdownload |
%programfiles%\rootjoy\downloader |
%sysdrive%\adwcleaner\quarantine\files\pjfozkqqxqhcbertljxhrxysdvbskbwi\qqdownload\131 |
%sysdrive%\adwcleaner\quarantine\files\mzbbbojvwuzhdzuupisqhrixmsrknwwj\qqdownload\135 |
%sysdrive%\adwcleaner\quarantine\files\oujtfteagizliwswcxgidqxykkwxyfhc\qqphonemanager\components\qqdownload |
tnproxy.dll |
TNProxy.dll |
A0196801.dll |
A0196338.dll |
Y7ULN4i71htcak4.dll |
tnproxy.dll.vir |
36nVTSqq.dll |
26h1tXRBfcPIHX.dll |
75362d1NaY.dll |
HARPG.dll |
71VHCem7bos.dll |
4Ft6LxsJxo6LQW5.dll |
8BTQ4Wuc27c.dll |
A0001372.dll |
N2CV.dll |
BC9FD4EDF3DD94DC4D03351ED31B85DFF7954511.dll |
j3d.dll |
F43BfF7.dll |
avj.dll |
6.dll |
mMG7rSr6f.dll |
RFlfEp8B.dll |
X8.dll |
K12fUP44z28T22.dll |
ANI5K55d9UaMh.dll |
6WM7IRry6k.dll |
4E7416sB8Hbv9h.dll |
uxB2U9.dll |
1xM.dll |
n6egx2DTk333.dll |
37XX84cA4X9.dll |
zy9jmp1FI1h2.dll |
5.dll |
i7NV3Q79sy.dll |
|
31.2% |
|
|
23.4% |
|
|
10.0% |
|
|
4.4% |
|
|
2.6% |
|
|
1.7% |
|
|
1.6% |
|
|
1.6% |
|
|
1.5% |
|
|
1.2% |
|
|
1.1% |
|
|
1.1% |
|
|
1.0% |
|
|
1.0% |
|
|
0.9% |
|
|
0.8% |
|
|
0.8% |
|
|
0.8% |
|
|
0.7% |
|
|
0.7% |
|
|
0.7% |
|
|
0.7% |
|
|
0.6% |
|
|
0.6% |
|
|
0.5% |
|
|
0.5% |
|
|
0.4% |
|
|
0.4% |
|
|
0.4% |
|
|
0.4% |
|
|
0.4% |
|
|
0.3% |
|
|
0.3% |
|
|
0.3% |
|
|
0.3% |
|
|
0.3% |
|
|
0.3% |
|
|
0.3% |
|
|
0.2% |
|
|
0.2% |
|
|
0.2% |
|
|
0.2% |
|
|
0.2% |
|
|
0.2% |
|
|
0.2% |
|
|
0.2% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
|
0.1% |
|
Windows 10 |
62.7% |
|
Windows 7 |
27.7% |
|
Windows 8.1 |
4.9% |
|
Windows Server 2008 R2 |
1.1% |
|
Windows XP |
1.0% |
|
Windows 8 |
1.0% |
|
Windows Server 2012 R2 |
1.0% |
|
Windows Server 2003 |
0.2% |
|
Windows Server 2012 |
0.2% |
|
Windows Vista |
0.1% |
|
Windows Server 2016 |
0.1% |
|
Analysis
Subsystem: |
Windows GUI |
PE Type: |
pe |
OS Bitness: |
32 |
Image Base: |
0x10000000 |
Entry Address: |
0x00085936 |
Name |
Size of data |
MD5 |
.text |
581632 |
818fac32b14b401f5fa3aac6cb95a0be |
.rdata |
77824 |
03fd38fffa567574349f2f8042a01aca |
.data |
16384 |
7afc715d196e86823c5d0337a9e67b3b |
.rsrc |
4096 |
8477c3d86f9f4cae1802fb8977f9a1c3 |
.reloc |
32768 |
1974801ed59b11362a87c5bef9a037a7 |