Home / Spyware Encyclopedia / Proxy.Agent.gsa << Back

Recommendation to Automatically remove Proxy.Agent.gsa


Our products can remove Proxy.Agent.gsa and thousands of other Virus and Spyware automatically and instantly.

Proxy.Agent.gsa Details


  • Category Proxy
  • Discovered 9/19/2024 4:34:43 AM
  • Modified 9/19/2024 10:54:57 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
18a0da6f4c9e72f8adfe3656fc6e75e54481388a.bin.exe 55296  9dc3b965bcf22408f5918be944b639bc25/11/2022
34c786b39d75419e3dc1d550415fbf36531d772c.bin.exe 55296  43b6483d5b2dc51ffca000442b40125808/02/2023
6776fc2b003ce4acf73db16c0b8bfa6a.exe 55296  6776fc2b003ce4acf73db16c0b8bfa6a09/02/2023
68ee4eb51a3b5e17fd852731aca14d61.exe 55296  68ee4eb51a3b5e17fd852731aca14d6109/02/2023
2e1f77612556edd5281b235487541dcb.exe 55296  2e1f77612556edd5281b235487541dcb15/03/2023
b7905afff55cb2964445a2aa1cc140ad.exe 55296  b7905afff55cb2964445a2aa1cc140ad30/03/2023
9f16c2ee6a3a941576372c9d00b2412175b98f59.bin.exe 55296  d2c956a1e610f00c3325d682b6506e4d19/04/2023
b5e6ea109cb679a18d3793ce33c8e687bcae7c8a.bin.exe 55296  4f20512bca60a39f873d464cbac4262413/06/2023
9bde1e97e19115e6b6cc7657a0e18fa4c8e83c7a.bin.exe 55296  1ab4e83b46a02525401c44786d31b94105/07/2023
trojan-proxy.win32.agent.gsa-e0f65862094fef8da32e2a49fcace9ae497f363adb21c39977bfeb52e8a989e8.exe 43736  39e2bd866e9cd890e0dd07f4391aa41031/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware