Home / Spyware Encyclopedia / Proxy.Agent.ay << Back

Recommendation to Automatically remove Proxy.Agent.ay


Our products can remove Proxy.Agent.ay and thousands of other Virus and Spyware automatically and instantly.

Proxy.Agent.ay Details


  • Category Proxy
  • Discovered 5/7/2013 2:23:58 PM
  • Modified 7/31/2023 5:28:19 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
autodsk.exe 33796Microsoft Corporation5.0.0.051122856cd89225d8c15858c14bdaf4c 
trojan-proxy.win32.agent.ay.exe 33796Microsoft Corporation5.0.0.051122856cd89225d8c15858c14bdaf4c 
b72fbf146a8d0215f631dbabeeb0b54914739bb8af67ce2aabcb432c19a55592.exe 86020Microsoft Corporation5.00.2134.1067d242a09546d7ebd76b86d8e6cfba6 
8ae848cc76e5bfdff614ac527bcd4bb1c057d63e05db3a9a2904a56e0a2cad3e.exe 27648Microsoft Corporation5.00.2134.12fa6977f2aabb547efd818561b5c0770 
81302b8c4b6b2a283a21a43d5c4e1760.vir.sys 329056  81302b8c4b6b2a283a21a43d5c4e1760 
Trojan-Proxy.Win32.Agent.ay 33796Microsoft Corporation5.0.0.051122856cd89225d8c15858c14bdaf4c23/01/2020
trojan-proxy.win32.agent.ay.7f62c94adfc4789664bac5eaa510c418.exe 69636  7f62c94adfc4789664bac5eaa510c41819/08/2020
trojan-proxy.win32.agent.ay-55df5f84298ff760a861dfa4b2246af34f7d566ef45495f66c0815ebf58318f9.exe 30720  9072b8a9669310256c3c17c98655e29031/07/2023
0fa7b201c69ee6b9df1729d40257d2ba.vxe.exe 30724Microsoft Corporation5.00.2134.10fa7b201c69ee6b9df1729d40257d2ba18/07/2023
c5d529af1fc7cceb304c97f0e65404f04006096f.bin.exe 109194  fbd6d0ec16698e4606c6f142f4be7f5d18/04/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware