Home / Spyware Encyclopedia / Proxy.Agent.bom << Back

Recommendation to Automatically remove Proxy.Agent.bom


Our products can remove Proxy.Agent.bom and thousands of other Virus and Spyware automatically and instantly.

Proxy.Agent.bom Details


  • Category Proxy
  • Discovered 5/3/2010 11:10:24 AM
  • Modified 8/2/2023 6:02:24 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
5543337f.exe 29696  6354f73718121fee997f31a292ddc39f 
5aa909985444fbf416629f572dddc65695745e4d415941a13af14943ae7cdd6f.exe 33280  7f57409f18e75c8097405848da083839 
7058935ccb93b5b3aee66d935552f341.exe 33280  8413f640afe7005aa25f64bef7e42e4d 
8ec41aaf6ce6de0e14e2201e52f61d144181694a66aa9c2fc2c9b835c26b88d3.exe 29696  479509252cb2cb58774b1b1a43bc9450 
926b22739eea6884e55187c74036bf38495d545a42727c056fdd1f03b28f6fb0.exe 29696  875afa60f84ba1e2dd13cdf41bc3eb11 
13581103124c536d8fa0cbe18a0b37e9eba84a08de6aacefd127112940be4633b175a300f8f07c61e30da132e926a.exe 124928  107e15b4bfe7deead9f23ee4dee00b37 
c505e1d03a957146766c3a95c454c12f994a514d.bin.exe 29696  9aad775da5a3093a71925ef323a5464f 
c6f66d9d99dd3b9f8beca3b7ef2a4499.exe 15360  c6f66d9d99dd3b9f8beca3b7ef2a4499 
755d0f162993a7a22832400803e78105.vir.exe 87040  a2752a5651eff14785753369e27cb53e 
trojan-proxy.win32.agent.bom-062c84f9484ce1f806b118d77116f42132dbfbe666b458def5a35570ee1a8703.exe 74752  1746b481e257b86f914f16d04e04722726/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware