Home / Spyware Encyclopedia / Proxy.Horst.hr << Back

Recommendation to Automatically remove Proxy.Horst.hr


Our products can remove Proxy.Horst.hr and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.hr Details


  • Category Proxy
  • Discovered 1/23/2013 12:29:55 AM
  • Modified 10/4/2024 11:43:36 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
24e97149.exe 151552  8280e1e1660be216169a9ff7c3f192b8 
988e9efc.exe 155648  5450789a58c4cbcb344b8bdb2354ebd3 
28c4fe9c.exe 155648  4b9e72e35e807120e271748f635e8b09 
2ef33103d35c5e34e9cec86e0c399bce.vxe.exe 155648  2ef33103d35c5e34e9cec86e0c399bce 
568ef482488675e3b5159ee89dc8f2a2e9be0e918457a77c614533e1d0bd3e2db59559739ff0949613c44b5e3a54d1b2b5f.exe 155648  d1dbfe85d9bf5eba9d230983f34a8aed 
3a0e5cb1eb8051ddf85f7d93f7498877e8bc11fbb77051f51da8194ab4398bd84a573cbf3b4681692b655ad17850eee82fb.exe 155648  20e4edcbb3c3131008ec1ebe0727e118 
317a29749d02822ca646409ed2f387711d43430cd516da6abf9d80911442f918.exe 48128  289550b33c125a26baaa457315668e49 
2b9ccecdd5cb3eed65f1f7893bd0df44.exe 49152  2b9ccecdd5cb3eed65f1f7893bd0df44 
1b8499aae2d08c08848d352e7b1ea917.exe 44544  1b8499aae2d08c08848d352e7b1ea917 
7eea93dcf181f45e594774bf58975e937d471a76b8958bd8e43aa95e0b30723b.exe 48128  5c4824b11733686b74e78d5fe36f5708 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware