Home / Spyware Encyclopedia / Proxy.Horst.jn << Back

Recommendation to Automatically remove Proxy.Horst.jn


Our products can remove Proxy.Horst.jn and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.jn Details


  • Category Proxy
  • Discovered 9/6/2012 8:03:44 PM
  • Modified 10/3/2024 11:11:04 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
02a2bf75eca5bf7aa16793e158967b79.exe 36864  02a2bf75eca5bf7aa16793e158967b79 
eb79b9b60b70423c3670eb701cd4a5bd36facf029caba310415b650fd6454092_tmp1.tmp.exe 45056  7e68dab13a5942d753fb9a359e5d263a 
9ebec719c1e32df47e0bf5dfca77780fea2dbd089bfcf9a5b1c52182299ede42.exe 40960  03f4386636325d1686d8fd46f76b2084 
4034cf5b63b55e9712362cea275b590c626895ca111be624abd0d87bee1e4c3ef07a1b1d2357e1a647bad86efc0c55123e2.exe 36864  36d8901970fc6ecaf814965e35fdafe7 
4f081251ffbe3481a6fde0fa49f94a45.exe 36864  4f081251ffbe3481a6fde0fa49f94a45 
391917d32233a755c23942c1535c7586.exe 36864  391917d32233a755c23942c1535c7586 
da158c56bb9876b111665ba567c903b5.exe 45056  da158c56bb9876b111665ba567c903b5 
1ab5a4b8daf437a8ab6398ff585ffbc3.exe 63760  1ab5a4b8daf437a8ab6398ff585ffbc3 
80a9c3bc7269f927a1783f5ab8264698dcc29478.bin.exe 45056  0bf491c03eac5db6aae5c2bf92fa200e 
9882d6fc9dda9e1d1c8c2c1dffafa314.exe 40960  9882d6fc9dda9e1d1c8c2c1dffafa314 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware