Home / Spyware Encyclopedia / Proxy.Horst.jy << Back

Recommendation to Automatically remove Proxy.Horst.jy


Our products can remove Proxy.Horst.jy and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.jy Details


  • Category Proxy
  • Discovered 12/4/2012 7:25:20 AM
  • Modified 7/27/2023 4:45:11 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2af3e9494a4d97c4ecfc22d114fcb263773c2456b1cb22e8fc429dca216c95cc.exe 45056  b1b6f7ada1f15b0000b898543cbfb1bb 
f3dcca80b13e9df40bdaff9a87ffad23e0fa5887d3b08e6f867315cd938404d8.exe 45056  cca90b98063db91bcc296e515bf6c904 
442b0f4ec76061e3d4c326f6bc4cc4501a848266f235d517298a723a8d4e0eb8.exe 45056  272c6f8d0bf6e9f49c74fe497f83dde6 
44209d7956d53bcd59befce3267b55b30494558b79f4f053c62c2ab845b4ae75.exe 63760  02c3d17cfe3cfbcdfa90d301d13837eb 
f3311d0f4bda050710c9374af326e2dc.exe 45056  f3311d0f4bda050710c9374af326e2dc 
37f33f74192095e86b3c0b5a25a722e3.exe 63760  37f33f74192095e86b3c0b5a25a722e3 
97895442a12d7fb78a68223230b8d554e4201873ad93de9b8b7028ddbfd42f01.exe 63760  22eac9f1398f669471a82ce9c9b2cb8a 
f64e415ac7dff2cc3f4a7bd43afb210e.exe 45056  f64e415ac7dff2cc3f4a7bd43afb210e 
e4aff4c335d8d57e9083955f05c6531d1811ef8096cbb11ef03d97fef5d16db5.exe 63760  40a11f2d7922fec771417c026697918f 
5077bb129971612ccf7a2035699dfe68.exe 45056  5077bb129971612ccf7a2035699dfe68 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware