Home / Spyware Encyclopedia / Proxy.Agent.gjs << Back

Recommendation to Automatically remove Proxy.Agent.gjs


Our products can remove Proxy.Agent.gjs and thousands of other Virus and Spyware automatically and instantly.

Proxy.Agent.gjs Details


  • Category Proxy
  • Discovered 3/10/2015 4:05:09 PM
  • Modified 2/7/2024 10:58:06 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
5c4be87f4b77f76dc1ef117b76e54be2b49dd674bfdb17d0ca3caecfd4321fcd.dll 225280  919e162f6e753db4cfd9fbc06ebe0b3d 
5c81e2348bdb4d77c6e5d7b4844d0cce.dll 225280  5c81e2348bdb4d77c6e5d7b4844d0cce 
3fa078fef54bf3e84729bbd44e94393e.dll 15872  3fa078fef54bf3e84729bbd44e94393e 
087962d41d4799091b0eef13e003baa0.dll 18944  087962d41d4799091b0eef13e003baa0 
15014501701b380b3e2d72926682a6a2349ea310dcf0df7b6924d49d3c51bee83afd0d7c0a33cb3624bbac84f256c.dll 1224704  7eebf50886e480856ed0c326159a7f53 
154050056854c6610cc9739302bf72ad03ca7c2d6def11716c86b300d0eb241444616c17c08f307d87e0a969ca54a.dll 310808  896c43a13c69d4adec7b58b92ef258a3 
6c6e028e2ded9feb5ce5d1d5fd81145a.vir.dll 379392  6c6e028e2ded9feb5ce5d1d5fd81145a 
163935089102e772e8fb659234b8dd2f127a8000ef7d21d7d47d594a0267364388f57aa6b0216794ca7dd9811a684.dll 332824  d6c4f88d45a6e88fde73ec84081866eb 
190948026572047b29516763b3aadb7f3217153cecfc93e4c21b3b05ac92ca6213e308d665da7f9b95a5aa273991c.exe 232685  2c2f1f4387c658bcb88335ae18030a3f 
17204404380e196618147970721954917df01baa25cb58cd64e4648e918885f8ddd84b761092aafad9c1303b20d4c.dll 592384  7c7ce36296006dd78c9dc04ace14028d 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware