Home / Spyware Encyclopedia / Proxy.Horst.jy << Back

Recommendation to Automatically remove Proxy.Horst.jy


Our products can remove Proxy.Horst.jy and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.jy Details


  • Category Proxy
  • Discovered 12/4/2012 7:25:20 AM
  • Modified 7/27/2023 4:45:11 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
44209d7956d53bcd59befce3267b55b30494558b79f4f053c62c2ab845b4ae75.exe 63760  02c3d17cfe3cfbcdfa90d301d13837eb 
4b7f27902a98c73c90cec1364435c925.exe 45056  4b7f27902a98c73c90cec1364435c925 
37f33f74192095e86b3c0b5a25a722e3.exe 63760  37f33f74192095e86b3c0b5a25a722e3 
855e2289a39a6ed1fb3fed4c9dcaad7e.exe 59808  855e2289a39a6ed1fb3fed4c9dcaad7e 
e4aff4c335d8d57e9083955f05c6531d1811ef8096cbb11ef03d97fef5d16db5.exe 63760  40a11f2d7922fec771417c026697918f 
886b5de622353ce21d65c48b0e0af2759f92d7375495d4da5c1a62481217e1ed.exe 56640  f717bf50fc0983eba86645902185e20b 
b5499e0e1c7f16b53dab2e80870de7bd.vir.exe 45056  b5499e0e1c7f16b53dab2e80870de7bd 
f1432a415e1cf192ec896562ea6007f7.vir.exe 45056  f1432a415e1cf192ec896562ea6007f7 
d12c6ec4e4b82fac308076a93b2dfbf5.exe 45056  d12c6ec4e4b82fac308076a93b2dfbf517/04/2020
trojan-proxy.win32.horst.jy-3e9fef1ff8fabb61a17e5194366cd62c4e415726.exe 45056  2b8de77a7f0360653bfe40de1cf03c4508/08/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware