Home / Spyware Encyclopedia / Proxy.Horst.wo << Back

Recommendation to Automatically remove Proxy.Horst.wo


Our products can remove Proxy.Horst.wo and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.wo Details


  • Category Proxy
  • Discovered 5/9/2016 10:43:13 PM
  • Modified 7/31/2023 5:24:46 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
13cee9f7cdd33545c67a3b1a2515bca7.exe 80384  13cee9f7cdd33545c67a3b1a2515bca7 
124057025064e015e14afdd320856401f4341271edc2099fad10d2f055f765b3775d43b387ff31917645f46e9c2de.exe 26112  54d11398096559cef1ec875dd2fec551 
1240540203590e765f488a9328115cde16f3096d269f5a3a9472a4364c2fdb5f8fba529b7c7f17e715abe51ee1e97.exe 28160  56e0732827a66082798f84478e44050e 
7838460a935fabd6aea61570a6a85b0f8f073cf8245d6e69916383a16b874459.exe 107242  1267948d05e20f6342729bd3a55f1f7f 
e0307e0b.exe 80384  6e63100c2babcda0af485481aae8d679 
d7b899dc20db7b126331b8ae2ade2bb9.vir.exe 77824  d7b899dc20db7b126331b8ae2ade2bb921/07/2023
e8c8aa97f47e89a555d4e8c2751333a0.vir.exe 94208  e8c8aa97f47e89a555d4e8c2751333a0 
d7b899dc20db7b126331b8ae2ade2bb9.vir.exe 77824  d7b899dc20db7b126331b8ae2ade2bb9 
359e2123503afb2c642f57d3abd7df31.vir.exe 97280  359e2123503afb2c642f57d3abd7df31 
333bb491cee1574a1ea3d34057bf1a97.vir.exe 86016  333bb491cee1574a1ea3d34057bf1a97 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware