Home / Spyware Encyclopedia / Proxy.Horst.jy << Back

Recommendation to Automatically remove Proxy.Horst.jy


Our products can remove Proxy.Horst.jy and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.jy Details


  • Category Proxy
  • Discovered 12/4/2012 7:25:20 AM
  • Modified 7/27/2023 4:45:11 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2af3e9494a4d97c4ecfc22d114fcb263773c2456b1cb22e8fc429dca216c95cc.exe 45056  b1b6f7ada1f15b0000b898543cbfb1bb 
16b2731a005c2b50d83fa511e130543f.exe 45056  16b2731a005c2b50d83fa511e130543f 
44209d7956d53bcd59befce3267b55b30494558b79f4f053c62c2ab845b4ae75.exe 63760  02c3d17cfe3cfbcdfa90d301d13837eb 
749f3bbc79f6836eb29967bbf241d9ae.exe 63760  749f3bbc79f6836eb29967bbf241d9ae 
82ab57bbc909821311ba2d367bab8fce6ab5f2c1.bin.exe 45056  f3dc1a9e170bc5854f56a32081e4269d 
94243c75fe48a9c258f631b4eee5a3e0.vir.exe 20384  94243c75fe48a9c258f631b4eee5a3e0 
trojan-proxy.win32.horst.jy-3e9fef1ff8fabb61a17e5194366cd62c4e415726.exe 45056  2b8de77a7f0360653bfe40de1cf03c4508/08/2023
855e2289a39a6ed1fb3fed4c9dcaad7e.exe 59808  855e2289a39a6ed1fb3fed4c9dcaad7e 
f64e415ac7dff2cc3f4a7bd43afb210e.exe 45056  f64e415ac7dff2cc3f4a7bd43afb210e 
57be6ad472b0bdc70113616dd873d288.exe 45056  57be6ad472b0bdc70113616dd873d288 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware