Home / Spyware Encyclopedia / Proxy.Horst.aj << Back

Recommendation to Automatically remove Proxy.Horst.aj


Our products can remove Proxy.Horst.aj and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.aj Details


  • Category Proxy
  • Discovered 2/21/2012 8:45:25 PM
  • Modified 8/2/2023 6:03:21 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
trojan-proxy.win32.horst.aj.exe 67072  ac1fec069175c6f7dee06ed50438cc5e 
tmp1.tmp 49152  7fc80b10ceb4a3ec8a48b9f48bc01ff9 
10acc2d50a26a71f46d4c1b4a05671ba.exe 53248  10acc2d50a26a71f46d4c1b4a05671ba 
822e91f90def4acffb3c2bae900d766f_tmp1.tmp.exe 49152  6e92f3e76fcfa2b93b158d82933a9755 
5d90600cfd7610868be0cc8b7acdd3d1eb5d235f_tmp1.tmp.exe 53248  bd8fde65446c558e539c4776b4f2e34514/07/2023
3a84e9f342293a70f8695af7d767da183d8ae8ac581fb769673c729ef40879a2.exe 49152  fd9a03240b06d8be1f089cefbee5633f14/07/2023
3a46505b1d69f182ed06f99cbd0d89865ba330c420d82bd52cd0b5245622f213.exe 55808  fe513b14b5426630552633802a1d2dd314/07/2023
2763070c9ce04e1e3ea66a2f9a139f0e3831fc092586e327d5220480eb6cdc39.exe 55808  97632cf8133737fcb1059b4ee48ada5b14/07/2023
2bad8ea4eb175524d59fef35afe5cb3ec3c5b9d72273174119ed020887020b6d.exe 49152  6ccc6952ec6d2fd68411ed85312d90c108/08/2023
43b3f4cee2a74e2d6aa1d306c29ade0fcb2f37d6acba3d526959ddd04952a764.exe 0  9ea19e68a915548aefab02d433e7495208/08/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware