Home / Spyware Encyclopedia / Proxy.Horst.ya << Back

Recommendation to Automatically remove Proxy.Horst.ya


Our products can remove Proxy.Horst.ya and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.ya Details


  • Category Proxy
  • Discovered 5/18/2012 11:43:06 PM
  • Modified 7/12/2023 5:41:08 PM
  • Threat Level Medium
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
34667a07.exe 103302  23637b940972b5cb3dd10995ce5e99e8 
4984b5105cb766bf2bc87ef2ae31f026856020a9a4df841f421d5e56966e254f.exe 56832  7c9461e608b23e4a93d08a286cb46939 
3347403fce5285e006b9927cc912e78f.exe 32768  3347403fce5285e006b9927cc912e78f 
7f5f43c0bead20cc06e3895d34495add.exe 28672  7f5f43c0bead20cc06e3895d34495add 
4676611ae63e3f4297e236e923397080.vir.exe 90624  4676611ae63e3f4297e236e923397080 
4984b5105cb766bf2bc87ef2ae31f026856020a9a4df841f421d5e56966e254f.exe 56832  7c9461e608b23e4a93d08a286cb4693923/01/2020
1241140828360d07bd713e8b4f7ab22596d8c5b26a65831129a9ef5dd7a60f8a4d2073bb962f26a6a60e1001fbe5d.exe 27648  bc4aff405211f4e3553512fe6d4ae96e29/06/2022
7f5f43c0bead20cc06e3895d34495add.exe 28672  7f5f43c0bead20cc06e3895d34495add04/08/2023
898ed793802f32c7d550e9a7545b4937fb829188d8f05a67032a4c75b3fade01.mrg.exe 29184  8368253f17b5b116fe3fd83b51330a6024/05/2022
317badd4121c8445210b1817622b9bde89c82ef8e031770e1b3efda4a9ccf5c4.mrg.exe 30720  ec0937332b0a016bce2daeb56d7f405624/05/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware