Home / Spyware Encyclopedia / Proxy.Horst.jn << Back

Recommendation to Automatically remove Proxy.Horst.jn


Our products can remove Proxy.Horst.jn and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.jn Details


  • Category Proxy
  • Discovered 9/6/2012 8:03:44 PM
  • Modified 10/3/2024 11:11:04 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
02a2bf75eca5bf7aa16793e158967b79.exe 36864  02a2bf75eca5bf7aa16793e158967b79 
4034cf5b63b55e9712362cea275b590c626895ca111be624abd0d87bee1e4c3ef07a1b1d2357e1a647bad86efc0c55123e2.exe 36864  36d8901970fc6ecaf814965e35fdafe7 
4f081251ffbe3481a6fde0fa49f94a45.exe 36864  4f081251ffbe3481a6fde0fa49f94a45 
391917d32233a755c23942c1535c7586.exe 36864  391917d32233a755c23942c1535c7586 
da158c56bb9876b111665ba567c903b5.exe 45056  da158c56bb9876b111665ba567c903b5 
80a9c3bc7269f927a1783f5ab8264698dcc29478.bin.exe 45056  0bf491c03eac5db6aae5c2bf92fa200e 
9882d6fc9dda9e1d1c8c2c1dffafa314.exe 40960  9882d6fc9dda9e1d1c8c2c1dffafa314 
0cc82d1facb3e553391ca4f714bf55aa.exe 45056  0cc82d1facb3e553391ca4f714bf55aa 
8ed5ef8f6797e2cfe8d5cf8891462e14.exe 45056  8ed5ef8f6797e2cfe8d5cf8891462e14 
2cfb65d568b96561b49519377f7eb880.exe 45056  2cfb65d568b96561b49519377f7eb880 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware