Home / Spyware Encyclopedia / Proxy.Horst.wo << Back

Recommendation to Automatically remove Proxy.Horst.wo


Our products can remove Proxy.Horst.wo and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.wo Details


  • Category Proxy
  • Discovered 5/9/2016 10:43:13 PM
  • Modified 7/31/2023 5:24:46 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ca97d6e3.exe 89088  fbde25921e75a8fc73363f97ee079c8e 
e0307e0b.exe 80384  6e63100c2babcda0af485481aae8d679 
13cee9f7cdd33545c67a3b1a2515bca7.exe 80384  13cee9f7cdd33545c67a3b1a2515bca7 
124057025064e015e14afdd320856401f4341271edc2099fad10d2f055f765b3775d43b387ff31917645f46e9c2de.exe 26112  54d11398096559cef1ec875dd2fec551 
1240540203590e765f488a9328115cde16f3096d269f5a3a9472a4364c2fdb5f8fba529b7c7f17e715abe51ee1e97.exe 28160  56e0732827a66082798f84478e44050e 
ac35988a09bb285cd9539063e535cd8c0e13efd8abf726207e804b969deae413.exe 26112  669f7c9865b15e6c8f18f96ef773efa5 
7838460a935fabd6aea61570a6a85b0f8f073cf8245d6e69916383a16b874459.exe 107242  1267948d05e20f6342729bd3a55f1f7f 
a840289e892890dc0f774507939b5b2a.exe 27136  a840289e892890dc0f774507939b5b2a 
18a46cbad396d4f9db8ad7a8f0b8bed8.vir.exe 107363  18a46cbad396d4f9db8ad7a8f0b8bed8 
d7b899dc20db7b126331b8ae2ade2bb9.vir.exe 77824  d7b899dc20db7b126331b8ae2ade2bb9 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware