Home / Spyware Encyclopedia / Proxy.Horst.xe << Back

Recommendation to Automatically remove Proxy.Horst.xe


Our products can remove Proxy.Horst.xe and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.xe Details


  • Category Proxy
  • Discovered 7/19/2024 6:20:45 PM
  • Modified 7/19/2024 6:46:46 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b1cebe408a14072131df8b451fcf23dd.exe 31232  b1cebe408a14072131df8b451fcf23dd03/08/2023
e8139f2accf09ebfa86ae1f1f95e0e42.vir.exe 98304  e8139f2accf09ebfa86ae1f1f95e0e42 
ade05bca2c320625a5c12f6160b15282.vir.exe 100864  ade05bca2c320625a5c12f6160b15282 
27a4f43660da805f6ee6ec66e32bf9fe.vir.exe 105472  27a4f43660da805f6ee6ec66e32bf9fe 
6fcca7abd4abdc3d8e0b6658829fb590.vir.exe 105472  6fcca7abd4abdc3d8e0b6658829fb590 
860b0e75e3a39aba5c80faf2c6ed3896.exe 34816  860b0e75e3a39aba5c80faf2c6ed3896 
dd59ea9748f5648883e1641c0e96e50d.vir.exe 31232  dd59ea9748f5648883e1641c0e96e50d 
b1cebe408a14072131df8b451fcf23dd.exe 31232  b1cebe408a14072131df8b451fcf23dd 
178d95535ea1adbd7321a7f31e6539596b5ec342e436f5be0b7a93dee879ebbf.exe 31232  e12d1d552d89fec17161d8ed17c2733d 
8e43bb13c894e1ce17c4dc988e17c1a4f47ee81300a6b59efaef358102ce7533f16c37c09450ddcf4fab67801db48225b709dd32707a5f12f7cd8e8113c3d156.exe 30208  2f4c104fb330163ba2098daaa0e17be9 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware