Home / Spyware Encyclopedia / Proxy.Agent.gkw << Back

Recommendation to Automatically remove Proxy.Agent.gkw


Our products can remove Proxy.Agent.gkw and thousands of other Virus and Spyware automatically and instantly.

Proxy.Agent.gkw Details


  • Category Proxy
  • Discovered 5/9/2016 7:37:31 PM
  • Modified 5/10/2016 12:09:53 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
151322071834e0347297486f071369c338478d704f5f967965eda2b6485595f06b030c0a8e40e7d094ca823a6db11.exe 313528 3, 3, 8, 120abef4f8aeaa9413a67145bee0caa22 
347f3559fb8b156fae2d24ff4d416115.exe 467471 3, 3, 8, 1347f3559fb8b156fae2d24ff4d416115 
3bdd8e9aa51a72f49a16b29fb1e9c27e.exe 387649 3, 3, 8, 13bdd8e9aa51a72f49a16b29fb1e9c27e 
13c63f657db04956155eb84937f23687.vir.exe 661176 3, 3, 8, 113c63f657db04956155eb84937f23687 
4c86e8ffd0252ae7c964b0848b28edbce766c1ef.bin.exe 467477 3, 3, 8, 1f30461ad120011957150cca0160c2358 
2529512d6f7cf2e54f5080c5638330e184a42fc980eff9711c341caaf2f0f750.exe 313373 3, 3, 8, 1ba96288468de8614e7b346f5434f4b17 
c91d41e18f47b4c469ffef2506a10c609e9b173a.bin.exe 467503 3, 3, 8, 1979626a28980af268c17715ce27938df 
32b8db1e7daf1ad34f29f703e9f58f03.exe 387649 3, 3, 8, 132b8db1e7daf1ad34f29f703e9f58f03 
274a0db82d449bfa51d2ef6713418b34.exe 387617 3, 3, 8, 1274a0db82d449bfa51d2ef6713418b34 
3efb3b918814b9a6bd53f353d0b7809d.exe 467658 3, 3, 8, 13efb3b918814b9a6bd53f353d0b7809d 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware