Home / Spyware Encyclopedia / Proxy.Agent.gjs << Back

Recommendation to Automatically remove Proxy.Agent.gjs


Our products can remove Proxy.Agent.gjs and thousands of other Virus and Spyware automatically and instantly.

Proxy.Agent.gjs Details


  • Category Proxy
  • Discovered 3/10/2015 4:05:09 PM
  • Modified 2/7/2024 10:58:06 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1540570599117a0d82530a11525c9c964bc56e3470b0e7a630ad9fdfa8dd3b58ad1ffb6dde15214d3e58ff604957e.dll 12800  f11e88294d45e2b37d868aa26dd10840 
c49102453f175a054069ae67b5d579f0.vir.dll 129536 1.0.0.0c49102453f175a054069ae67b5d579f0 
b37e1275f0e2c3a95c285972a640f4fa.vir.dll 21504  b37e1275f0e2c3a95c285972a640f4fa 
2442e6cc30da5f790a4c410a1d36a8d2.vir.dll 8494  2442e6cc30da5f790a4c410a1d36a8d2 
190948026572047b29516763b3aadb7f3217153cecfc93e4c21b3b05ac92ca6213e308d665da7f9b95a5aa273991c.exe 232685  2c2f1f4387c658bcb88335ae18030a3f 
154050056854c6610cc9739302bf72ad03ca7c2d6def11716c86b300d0eb241444616c17c08f307d87e0a969ca54a.dll 310808  896c43a13c69d4adec7b58b92ef258a3 
15014501701b380b3e2d72926682a6a2349ea310dcf0df7b6924d49d3c51bee83afd0d7c0a33cb3624bbac84f256c.dll 1224704  7eebf50886e480856ed0c326159a7f53 
5c81e2348bdb4d77c6e5d7b4844d0cce.dll 225280  5c81e2348bdb4d77c6e5d7b4844d0cce 
5c4be87f4b77f76dc1ef117b76e54be2b49dd674bfdb17d0ca3caecfd4321fcd.dll 225280  919e162f6e753db4cfd9fbc06ebe0b3d 
virusshare_12536a4dbaf15353a9f3a9f8bd81d050.dll 383489  12536a4dbaf15353a9f3a9f8bd81d05008/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware