Home / Spyware Encyclopedia / Proxy.Horst.za << Back

Recommendation to Automatically remove Proxy.Horst.za


Our products can remove Proxy.Horst.za and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.za Details


  • Category Proxy
  • Discovered 3/19/2013 3:13:12 PM
  • Modified 7/27/2023 4:45:19 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b4760a039065805bd9c99b18f5760e90.exe 49152  b4760a039065805bd9c99b18f5760e90 
11261802175b752b63c59d7d6a0415dca9714908bf9f4eefde408100a00a6cb02abea61110860d87e0da334273d2b.exe 49152  4b1a1ccd7b13dee81010434fab1c194e 
11261802175b752b63c59d7d6a0415dca9714908bf9f4eefde408100a00a6cb02abea61110860d87e0da334273d2b.exe 49152  4b1a1ccd7b13dee81010434fab1c194e27/07/2023
4360a797160142ddc2f2230e0c90b4bb.exe 49152  4360a797160142ddc2f2230e0c90b4bb21/07/2023
trojan-proxy.win32.horst.za.7e9d8eaec227836426e8833239d2c891.exe 49152  7e9d8eaec227836426e8833239d2c89119/08/2020
de7546055e735f5d5146d672885a024f.exe 49152  de7546055e735f5d5146d672885a024f26/06/2020
2897356882cf773d03036c7c8498ae92.vir.exe 71952  2897356882cf773d03036c7c8498ae92 
3529f45f152ae6bb50bd4fdb988e5472.vir.exe 49152  3529f45f152ae6bb50bd4fdb988e5472 
ddbbb047f9f37d7db66f8e616be13bc6.vir.exe 71952  ddbbb047f9f37d7db66f8e616be13bc6 
0fdf2d8f1a33260eeb01c6ef2e5f0809.vir.exe 59509  0fdf2d8f1a33260eeb01c6ef2e5f0809 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware