Home / Spyware Encyclopedia / Proxy.Agent.gsa << Back

Recommendation to Automatically remove Proxy.Agent.gsa


Our products can remove Proxy.Agent.gsa and thousands of other Virus and Spyware automatically and instantly.

Proxy.Agent.gsa Details


  • Category Proxy
  • Discovered 9/19/2024 4:34:43 AM
  • Modified 9/19/2024 10:54:57 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ec5b5740ce05ed022abd55ec15e34d64f56d7060990da1f5ed192db8d73611d8.mrg.exe 55296  ebe35eadc91a5ed049a7432bd9eb385209/06/2022
c3958a89d41a92a2d9675bf145631fdf8d8c12c816fcc8ec55ece4dda732045f.mrg.exe 43736  c30ac557218039bd8535c11a299b002f20/09/2022
abc433ad09b5f3e445518b862227db49ec7a3c1d.bin.exe 55296  041df689e22e21173e94ee5f6a0cff9e25/11/2022
d600c4edd7f808226b88cd4733f071775b389a95.bin.exe 55296  027beb50324323d019132ff5560c62fb25/11/2022
6bf384b97f4bd98ec204e92227704090.vir.exe 55296  6bf384b97f4bd98ec204e9222770409029/11/2022
03e392069644a88fb0018f3f30506889c1da6824.bin.exe 55296  8b68c2405716f4183077824bc556b23529/11/2022
5ce487986446e1c2eb71ba8353178b6f96d30fa8.bin.exe 55296  e2b638dcfded6a071ef465beeea2b87b02/12/2022
394008351aec04c026fee6a4307d05e1.exe 55296  394008351aec04c026fee6a4307d05e116/12/2022
101680f55d75a0b403d91c19aa9537874d41eba6.bin.exe 43736  6971b8a0e27e301dd1ad222b03118eab12/01/2023
c5e3657ef48eaccc43e977336ae1ef69.exe 55296  c5e3657ef48eaccc43e977336ae1ef6903/02/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware