Home / Spyware Encyclopedia / Proxy.Agent.iw << Back

Recommendation to Automatically remove Proxy.Agent.iw


Our products can remove Proxy.Agent.iw and thousands of other Virus and Spyware automatically and instantly.

Proxy.Agent.iw Details


  • Category Proxy
  • Discovered 6/10/2012 1:17:44 AM
  • Modified 7/12/2023 5:41:10 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
update.exe 163840  1b6f5d9114ea6b4bd316a62469992d5f 
2432df4d80fad12b90a1ea9c5e73df3a.exe 705280  2432df4d80fad12b90a1ea9c5e73df3a 
b18a142be0c67071890b4134851edc45.exe 746920  b18a142be0c67071890b4134851edc45 
976e4b6caf56906edb86c97db40af503afd1236376cd5a4ffa66be54f9a05b03e571d0bcb793687ce1c66bd1669fae57983.exe 489948  cfa80c078c19c89ab6dd76f4d92e01c8 
af9b36dca62c9569f61fa4d0d7bd4192.exe 277456  af9b36dca62c9569f61fa4d0d7bd4192 
165615094541471687d2668a53a3dcabd9750ac7fa30718905c7440dfb646a66251bb29f51ea4b5d0a3000fb6160d.exe 606668  a8c1ffb496cdc8ce4f9ec71a9a8f6920 
6e90aa92d94df2dca69395b75edb1add.exe 172032  6e90aa92d94df2dca69395b75edb1add 
trojan-proxy.win32.agent.iw.c66593081ac77578ee7a68e88310ee85.exe 237056  c66593081ac77578ee7a68e88310ee8511/12/2020
4cf05f6213c8f4b56cf0602214018f42cb6aa513.bin.exe 7601728  632c784198abae8220dbedffe27e7ace05/04/2023
trojan-proxy.win32.agent.iw-236658390385d2589b76de11a91fbbd75afb5c3901232323aa9fadff7c093bb1.exe 762188  a2acf5f9c0a33f88ec2813b49429b01121/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware