Home / Spyware Encyclopedia / Proxy.Agent.gen << Back

Recommendation to Automatically remove Proxy.Agent.gen


Our products can remove Proxy.Agent.gen and thousands of other Virus and Spyware automatically and instantly.

Proxy.Agent.gen Details


  • Category Proxy
  • Discovered 8/10/2024 6:25:56 PM
  • Modified 8/12/2024 12:17:37 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
69331b1ae603140fd67dc4397fc1862157b2e81d.bin.exe 55296  1abfddd72aad82e2ff32861653c79ffa13/03/2024
a408e30bbd449367291366d337d54f82.bin.exe 198144  a408e30bbd449367291366d337d54f8207/12/2023
4481331f4f75ac48f242827a718a7657.exe 2745856  4481331f4f75ac48f242827a718a765709/10/2023
0ef70c9fba109ea2ca577b4dc6911d011c74be2e7e8cb373da58d0d73d3a9b64.exe 8447488  2e2936521234405556119aa2b8029c6c30/08/2023
f34db51ba6d57b43a3418b5ec6ad2b4579e92a6e12e182e66f919ee1099c910c.exe 2745856  67b410238191434af79830e7bf2269a625/08/2023
trojan-proxy.win32.agent.hi-c4824b08cbadbc4e30fa6877ba2dc0c93b62b060.exe 34816  b209d5b9d4e12caec998c61c0333f70508/08/2023
trojan.win32.yakes.xzen-574c366770e7d962aa3f3ba58cc1811acac78861ac4e16580e26c2f8b91904c1.exe 31243  60eb69030850ceaba8ab1634f3c786b024/07/2023
d0c2b6995c0c28fc6bf5d4f48510d5f0269000f3c3fb3ab9a9db0417b130c75c.exe 2946048  84f7e02b41245dfb8e5a9a9879143df723/02/2023
34211c2dedb9ea77861c23795d66d1e2.exe 1409024  34211c2dedb9ea77861c23795d66d1e222/10/2022
276e698e7b6ec2dc7119523277199edb.exe 749205  276e698e7b6ec2dc7119523277199edb22/10/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware