Home / Spyware Encyclopedia / Proxy.Horst.wm << Back

Recommendation to Automatically remove Proxy.Horst.wm


Our products can remove Proxy.Horst.wm and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.wm Details


  • Category Proxy
  • Discovered 8/1/2023 8:51:47 AM
  • Modified 8/1/2023 4:15:30 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b56c5146d5914c63f16acda20574ef7a.vir.exe 102400  b56c5146d5914c63f16acda20574ef7a21/07/2023
f543e64c1e0a5136c6fe084f6f95a5ba.exe 102400  f543e64c1e0a5136c6fe084f6f95a5ba21/07/2023
329c4e3b6212217c4ce51f081eead18b.exe 38942  329c4e3b6212217c4ce51f081eead18b 
98af8b65e2f2aefb4239cb6df66cac63.exe 40448  98af8b65e2f2aefb4239cb6df66cac63 
cd3faf33127a990bf658783402689206be16eb5dd108f02c661718a6510f3ac3.exe 39936  15bce27efd6dd32fe1378e146145b253 
b187cc9aa17eae483a505d2684a911804ba717c119ece3eda77dd45a16848bad.exe 40448  12857771029d33a6e1232ad643e099af 
bf65ab3e3f2e64ece6dae0274806793fa1edade1f80a9322be133f87f84d99ac.exe 40448  3f2a1c155848635b58305e2fc7a5dc5d 
27bbcdfb1798646dceb52ed09d9c5c2a.exe 40448  27bbcdfb1798646dceb52ed09d9c5c2a 
609b0daac3625e0c6fe583915ad6d0e487754e28449169e7e7e29f0a76d90dce.exe 39037  0fea9bbaba1ac5ac362b96741c3d2331 
243fcad64a5f1124812b2876fea9a6e4.exe 38772  243fcad64a5f1124812b2876fea9a6e4 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware