Home / Spyware Encyclopedia / Proxy.Horst.hs << Back

Recommendation to Automatically remove Proxy.Horst.hs


Our products can remove Proxy.Horst.hs and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.hs Details


  • Category Proxy
  • Discovered 4/18/2011 6:17:25 AM
  • Modified 8/11/2023 3:36:00 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
13786202c30202158eed2a7e241d4b45.vir.exe 81920  13786202c30202158eed2a7e241d4b45 
trojan-proxy.win32.horst.hs.exe 32768  564b531bb2002fcb123de2928cf5f4d511/08/2023
1062-62c0505471569f1b460c040f938f01a7d9914cb6.exe 42496  4621137ea9376e87110aca4428e7e3fe09/09/2021
ae8aa8a5641210889cc40c3a6f5aea05.vir.exe 114688  ae8aa8a5641210889cc40c3a6f5aea05 
8a24e5b973f88fc9268d286df5bd58bc.vir.exe 81920  8a24e5b973f88fc9268d286df5bd58bc 
c6a80f1f01ed6f5c71aee0e7da10ec50.vir.exe 81920  c6a80f1f01ed6f5c71aee0e7da10ec50 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware