Home / Spyware Encyclopedia / Proxy.Horst.gkj << Back

Recommendation to Automatically remove Proxy.Horst.gkj


Our products can remove Proxy.Horst.gkj and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.gkj Details


  • Category Proxy
  • Discovered 11/28/2012 3:40:57 PM
  • Modified 7/31/2023 5:22:28 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
13043104847fc307156081eabd7a2c310a7a4e62152d2de158e187eb5ddc80d32be871702ecd5fdc6c047e4957f02.exe 49152  1cd209d9f4a52862cfa955b7df65b490 
4508e7c13f85d9f60690d36342a48a63d3d789cdb26c09cfca6e0bf8734fedb4.exe 49152  5d1b122a33f91101ce64e3f05447072f 
4508e7c13f85d9f60690d36342a48a63d3d789cdb26c09cfca6e0bf8734fedb4.exe 49152  5d1b122a33f91101ce64e3f05447072f08/08/2023
F61D11D5.EXE 49152  f45998643e821a2a8cf8d3e0f3d7af4e08/08/2023
8dd9038b96233518dfe9e658496e6013f1176cf518c292390f1b53d50a7d3bf5.exe 49152  88c7685156c542c3d3304b09db73897821/07/2023
803438680d0b6bc2385258f95b0bc7ea.exe 49152  803438680d0b6bc2385258f95b0bc7ea14/10/2022
3bfd2ac43584276e0d0819ae165bb18f.vxe.exe 49152  3bfd2ac43584276e0d0819ae165bb18f26/02/2021
4a1d93694aed2aaeeba970c83979348f.vir.exe 67856  4a1d93694aed2aaeeba970c83979348f 
50f4cdb75c945262a356548fea6d22ec.vir.exe 49152  50f4cdb75c945262a356548fea6d22ec 
f6d5ab001c3445ed705872f0bb3b7183.vir.exe 68000  f6d5ab001c3445ed705872f0bb3b7183 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware