Home / Spyware Encyclopedia / Proxy.Agent.gjs << Back

Recommendation to Automatically remove Proxy.Agent.gjs


Our products can remove Proxy.Agent.gjs and thousands of other Virus and Spyware automatically and instantly.

Proxy.Agent.gjs Details


  • Category Proxy
  • Discovered 3/10/2015 4:05:09 PM
  • Modified 2/7/2024 10:58:06 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
5c4be87f4b77f76dc1ef117b76e54be2b49dd674bfdb17d0ca3caecfd4321fcd.dll 225280  919e162f6e753db4cfd9fbc06ebe0b3d 
1126420389477a6fd6947007540996c29bdcbcdb85ed6dc3ddc69d110b48e7a2fa8e855ad3bf08d484689810f7591.dll 367104  4878c1b6d23e7a786ae2c2395f6eff69 
2489b656573f8f3a6fe29f87533aa4ed.exe 422404  2489b656573f8f3a6fe29f87533aa4ed 
087962d41d4799091b0eef13e003baa0.dll 18944  087962d41d4799091b0eef13e003baa0 
154050056854c6610cc9739302bf72ad03ca7c2d6def11716c86b300d0eb241444616c17c08f307d87e0a969ca54a.dll 310808  896c43a13c69d4adec7b58b92ef258a3 
1540570599117a0d82530a11525c9c964bc56e3470b0e7a630ad9fdfa8dd3b58ad1ffb6dde15214d3e58ff604957e.dll 12800  f11e88294d45e2b37d868aa26dd10840 
17360904536bc9160da1e9d3491db7d0a1018a63555e5846dc0f36a6153ee9da9f514e82f64ac3c45c282617a1107.dll 314392  8accaca7572967b231843dd2a467e84e 
190948026572047b29516763b3aadb7f3217153cecfc93e4c21b3b05ac92ca6213e308d665da7f9b95a5aa273991c.exe 232685  2c2f1f4387c658bcb88335ae18030a3f 
fa5a46e8c89e09a940a4c66abb0ffc79.vir.dll 379904  fa5a46e8c89e09a940a4c66abb0ffc79 
6dfe2ecdb8b74188f30f73c534d11398.vir.dll 44544  6dfe2ecdb8b74188f30f73c534d11398 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware