Home / Spyware Encyclopedia / Proxy.Horst.hr << Back

Recommendation to Automatically remove Proxy.Horst.hr


Our products can remove Proxy.Horst.hr and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.hr Details


  • Category Proxy
  • Discovered 1/23/2013 12:29:55 AM
  • Modified 10/4/2024 11:43:36 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
24e97149.exe 151552  8280e1e1660be216169a9ff7c3f192b8 
058e4d91.exe 151552  0fed7cecd1b2d6bbe1ea45e2ea5a5399 
4cd33d19ed70bae5afa1f4ff8386758c.vxe.exe 155648  4cd33d19ed70bae5afa1f4ff8386758c 
2ef33103d35c5e34e9cec86e0c399bce.vxe.exe 155648  2ef33103d35c5e34e9cec86e0c399bce 
85bd39f5c35240f4d2872bea4369cb8b.exe 155648  85bd39f5c35240f4d2872bea4369cb8b 
568ef482488675e3b5159ee89dc8f2a2e9be0e918457a77c614533e1d0bd3e2db59559739ff0949613c44b5e3a54d1b2b5f.exe 155648  d1dbfe85d9bf5eba9d230983f34a8aed 
3a0e5cb1eb8051ddf85f7d93f7498877e8bc11fbb77051f51da8194ab4398bd84a573cbf3b4681692b655ad17850eee82fb.exe 155648  20e4edcbb3c3131008ec1ebe0727e118 
3c1764b1e41bc84074c851d08a5a907c.exe 48640  3c1764b1e41bc84074c851d08a5a907c 
2b9ccecdd5cb3eed65f1f7893bd0df44.exe 49152  2b9ccecdd5cb3eed65f1f7893bd0df44 
79869b662e58311fb765e3e59aec0a0f.exe 44544  79869b662e58311fb765e3e59aec0a0f 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware