Home / Spyware Encyclopedia / Proxy.Agent.gjs << Back

Recommendation to Automatically remove Proxy.Agent.gjs


Our products can remove Proxy.Agent.gjs and thousands of other Virus and Spyware automatically and instantly.

Proxy.Agent.gjs Details


  • Category Proxy
  • Discovered 3/10/2015 4:05:09 PM
  • Modified 2/7/2024 10:58:06 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
37d1f6590a335aff334127d7ef11bd92449cd474fa8061c8033df5e822e2156f.dll 9728  6a0fc78d56cfad12fcfb5664a51a332f 
1126420389477a6fd6947007540996c29bdcbcdb85ed6dc3ddc69d110b48e7a2fa8e855ad3bf08d484689810f7591.dll 367104  4878c1b6d23e7a786ae2c2395f6eff69 
2489b656573f8f3a6fe29f87533aa4ed.exe 422404  2489b656573f8f3a6fe29f87533aa4ed 
6c6e028e2ded9feb5ce5d1d5fd81145a.vir.dll 379392  6c6e028e2ded9feb5ce5d1d5fd81145a 
163935089102e772e8fb659234b8dd2f127a8000ef7d21d7d47d594a0267364388f57aa6b0216794ca7dd9811a684.dll 332824  d6c4f88d45a6e88fde73ec84081866eb 
190948026572047b29516763b3aadb7f3217153cecfc93e4c21b3b05ac92ca6213e308d665da7f9b95a5aa273991c.exe 232685  2c2f1f4387c658bcb88335ae18030a3f 
066ca908a3a989dc2cadab73dd025645.vir.dll 10240  066ca908a3a989dc2cadab73dd025645 
163811071868c05ea67dc80eac01a255bdb103d6c5a3b47a8bda0b54511d7f70067e4d49977727b47e758d0f727d5.dll 381440  3e4954d9da862430b783271e38dabcd8 
a0c83474e2a9c019586638bdad48e2cb.vir.dll 15872  a0c83474e2a9c019586638bdad48e2cb 
6dfe2ecdb8b74188f30f73c534d11398.vir.dll 44544  6dfe2ecdb8b74188f30f73c534d11398 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware