Home / Spyware Encyclopedia / Proxy.Horst.ib << Back

Recommendation to Automatically remove Proxy.Horst.ib


Our products can remove Proxy.Horst.ib and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.ib Details


  • Category Proxy
  • Discovered 5/4/2011 4:48:28 PM
  • Modified 1/23/2020 5:20:03 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
c1673691eb6930e61ed1f83948ae973869643fc8.bin.exe 67856  0db2ad0b0501a397aecd302ffebe339c 
bc6b9173ab52fcba26aebd69b2d1efd02c8f1658.bin.exe 67856  129f238454dedfc66a11e2cd45a83bb1 
9b8903c20cfcf6a26df2a4eacb761bf29c67a111.bin.exe 67856  12b66a4a66ceeda2a5cf2ce9a92f9c7d 
129f238454dedfc66a11e2cd45a83bb1.exe 67856  129f238454dedfc66a11e2cd45a83bb1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware