Home / Spyware Encyclopedia / Proxy.Horst.jy << Back

Recommendation to Automatically remove Proxy.Horst.jy


Our products can remove Proxy.Horst.jy and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.jy Details


  • Category Proxy
  • Discovered 12/4/2012 7:25:20 AM
  • Modified 7/27/2023 4:45:11 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
8d2a9c61.exe 45056  2134dd36a4f960b27e73fc8224bbd5c9 
2af3e9494a4d97c4ecfc22d114fcb263773c2456b1cb22e8fc429dca216c95cc.exe 45056  b1b6f7ada1f15b0000b898543cbfb1bb 
f3dcca80b13e9df40bdaff9a87ffad23e0fa5887d3b08e6f867315cd938404d8.exe 45056  cca90b98063db91bcc296e515bf6c904 
16b2731a005c2b50d83fa511e130543f.exe 45056  16b2731a005c2b50d83fa511e130543f 
021ff6408e41061a0b3e60475d34c38290d351b1a434e43f70ec779c91269294.exe 45056  83609685e83777dcad33811b81cfaf01 
442b0f4ec76061e3d4c326f6bc4cc4501a848266f235d517298a723a8d4e0eb8.exe 45056  272c6f8d0bf6e9f49c74fe497f83dde6 
44209d7956d53bcd59befce3267b55b30494558b79f4f053c62c2ab845b4ae75.exe 63760  02c3d17cfe3cfbcdfa90d301d13837eb 
f3311d0f4bda050710c9374af326e2dc.exe 45056  f3311d0f4bda050710c9374af326e2dc 
284fcfb7bcfdbc5fbb4fe70e451195e4.exe 59808  284fcfb7bcfdbc5fbb4fe70e451195e4 
5b1dd4479aa54dbee5d08e787d340b5b.exe 63760  5b1dd4479aa54dbee5d08e787d340b5b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware