Home / Spyware Encyclopedia / Proxy.Horst.hz << Back

Recommendation to Automatically remove Proxy.Horst.hz


Our products can remove Proxy.Horst.hz and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.hz Details


  • Category Proxy
  • Discovered 3/15/2013 11:36:47 PM
  • Modified 4/3/2024 11:30:56 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
5c176223d397dedf1b2b793f431512bafe6a94845b480fdf2969c1a2e89a8c348cc12d018df607a54414608b48831edf904.exe 180142  8741c8000d368a11656b0dde46066da2 
41220f50e651fefd370494b73a1f29aefed450da7c663a8765645a7cd47851cf.exe 183544  0feb09f1ae1e4482e289bef5f240ea5d 
1d2b5ed4.exe 62464  1f29f4481bb61a7c059a2b2e45ad1c78 
3409fde36b00899e625326dccee8dbdca0c6e19530efedf691eb05e202ca2085.exe 83968  c21d44c3d7e99fa81bf16f94a21d2559 
167a73d0bda29ecd913ab233752ae6acd16c20caf06b8e841ef26dd35055e8401544a8114134e7e4fd9165aa4c884654b3e.exe 179200  67e410110efbfa5c8ae57bc337a52a79 
02e3406e8461bc2b7c65d055899bca1ad03eaa8cf46d914e2a66015d127bdc266e7774d4d8814b06fb8c77b833e9b03c5cf.exe 179200  17133b1cb630631bc5c1aa183095d9b8 
277e212e362d41e4cba2adb57ce53efa78d39ed896f2621e5b4a2d7d8b4d12ea90654fe75f3c18d0c5ef1cf77bb7fb651bf.exe 179200  a712fad549bc06a8cebf1d05271aea61 
24a0b66b4740ad14cddbcc66189571a0.exe 41472  24a0b66b4740ad14cddbcc66189571a0 
0c1ac811d25fd414b67c4e3bf63302444dbc9fa5740e7413aadd3718d344e594.exe 155475  2fd5f2e52c3625a67238ff7bd783b565 
3236262b44db14bb4b3172ee0292376d.exe 8801  3236262b44db14bb4b3172ee0292376d 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware