Home / Spyware Encyclopedia / Proxy.Horst.jq << Back

Recommendation to Automatically remove Proxy.Horst.jq


Our products can remove Proxy.Horst.jq and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.jq Details


  • Category Proxy
  • Discovered 5/9/2016 10:35:12 PM
  • Modified 3/4/2024 10:11:06 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
59cf469a.exe 45056  4e734e5b037b0c9764393dba8163441e 
0214a126.exe 45056  004f683412d2d38dde4d14bdb68ebe10 
726bf44be207770328b29d7e984bc39310f39e6e8c2ff741cc655a78753284c8.exe 40448  2514ceeec16a7f5f79b522aa1473b22c 
95f4c5e6014980baba2bd6a949779a5945abdf0d389ca697bd382206ddd7b2c6.exe 40448  2b56357795d4dff60380fbfe4e5d371c 
7b7a0b51dd3358c57f813822e8a03786f6d8010d289610c28b1041ddc9cf09be.exe 45056  07cacd8dd22aad25262c5fcfdb843fe7 
1613f82198e837b80c5ffffeba7cb758afb615951287d689013f20a52d25bc20.exe 40448  5b05cb2ad03155997480225531ce1338 
7d9407781c6b41108eccd8264568d7dee6eed4cd54c26c32de26fbce0bb6e586.exe 40448  5e4c33043be35b2db43e05fde91e7108 
ae0f86108645d04ec25cc04fe2cb94e3ff37da14.bin.exe 40448  08ab93c8da739342563db1b4ed4c2fde 
dc51782a60ab5a61ae3ab8f8864d361d.exe 45056  dc51782a60ab5a61ae3ab8f8864d361d 
47f7eb4e16800e214f09f9cd33a8b7c6.exe 45056  47f7eb4e16800e214f09f9cd33a8b7c6 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware