Home / Spyware Encyclopedia / Proxy.Horst.jn << Back

Recommendation to Automatically remove Proxy.Horst.jn


Our products can remove Proxy.Horst.jn and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.jn Details


  • Category Proxy
  • Discovered 3/19/2013 8:13:53 PM
  • Modified 8/2/2023 6:03:55 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1ab5a4b8daf437a8ab6398ff585ffbc3.exe 63760  1ab5a4b8daf437a8ab6398ff585ffbc3 
80a9c3bc7269f927a1783f5ab8264698dcc29478.bin.exe 45056  0bf491c03eac5db6aae5c2bf92fa200e 
8ed5ef8f6797e2cfe8d5cf8891462e14.exe 45056  8ed5ef8f6797e2cfe8d5cf8891462e14 
8c8e7cbcc2762bd7a7e8ee937fc36a82.vir.exe 45056  8c8e7cbcc2762bd7a7e8ee937fc36a82 
a4eff7809decf2b7d2e85dcd61e2d67b.vir.exe 45056  a4eff7809decf2b7d2e85dcd61e2d67b 
trojan-proxy.win32.horst.jn-c3607eb7205572c429f8478b05a257d2c105a3e6.exe 36864  8424b493f06a1b0cfdaabc90aa4d881714/07/2023
trojan-proxy.win32.horst.jn-74ffe02aae6b11fc875aebb39640f4dcc42cabfaf8655a4e217ab20be7ac04d0.exe 114688  0932a30bd40f0ad16b4fe094ee8b4e8f24/07/2023
trojan-proxy.win32.horst.jn-b47f8d8ea871b82a061528653ede0fa933521c38.exe 45056  caef004400379fee194742ab3301180208/08/2023
8ed5ef8f6797e2cfe8d5cf8891462e14.exe 45056  8ed5ef8f6797e2cfe8d5cf8891462e1402/08/2023
9882d6fc9dda9e1d1c8c2c1dffafa314.exe 40960  9882d6fc9dda9e1d1c8c2c1dffafa31414/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware