Home / Spyware Encyclopedia / Proxy.Agent.bh << Back

Recommendation to Automatically remove Proxy.Agent.bh


Our products can remove Proxy.Agent.bh and thousands of other Virus and Spyware automatically and instantly.

Proxy.Agent.bh Details


  • Category Proxy
  • Discovered 7/14/2023 9:04:29 AM
  • Modified 7/14/2023 12:17:07 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
trojan-proxy.win32.agent.bh.exe 1241088EES Gateway by RaGe1.0.0.0b92440f703eeec70e74e89a4d76e248d09/04/2020
Trojan-Proxy.Win32.Agent.bh 1241088EES Gateway by RaGe1.0.0.0b92440f703eeec70e74e89a4d76e248d09/04/2020
trojan-proxy.win32.agent.bh-2c4ad1d15c198899b41f62172557b55ae4016ef0.exe 1409024  6145eb37952355d06e0c2a62bf7a163f14/07/2023
trojan-proxy.win32.agent.bh-222c6ca6c584273d1e3a170bfd03402247ecdfcd.exe 82290  c5313c5ee92526b05f1d2decc8d69a1908/08/2023
virusshare_3a3299eb4687577b754c8a6f262750aa.exe 1425408EES Gateway by RaGe1.033a3299eb4687577b754c8a6f262750aa28/05/2022
a6b3917fbe662ac29a08ad34733fa45926897c405d0e57f91789c8ed17928ccb.exe 49152  18890f8752af582d36222117a8e29ce520/04/2022
9771411e5883cdfb4f3addf8d6763e32329733e51eb1ba60a31d66335c58de60.exe 82289  5bd4790763d5e8fd134238944e56552004/05/2021
59fc18b6ac6dad4240c91d33408b50aa970fbc2a431e46d9dc57ca7153418e9b.exe 1425409EES Gateway by RaGe1.034466d6d77959ca5797627f2dc03b080b 
9771411e5883cdfb4f3addf8d6763e32329733e51eb1ba60a31d66335c58de60.exe 82289  5bd4790763d5e8fd134238944e565520 
3ba1c9cefcd9a562b538763f9fbe98ba.exe 81920  3ba1c9cefcd9a562b538763f9fbe98ba 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware