Home / Spyware Encyclopedia / Proxy.Horst.gow << Back

Recommendation to Automatically remove Proxy.Horst.gow


Our products can remove Proxy.Horst.gow and thousands of other Virus and Spyware automatically and instantly.

Proxy.Horst.gow Details


  • Category Proxy
  • Discovered 5/4/2013 8:51:27 AM
  • Modified 7/14/2023 12:16:26 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
1eda2e1a7e9d4ba80e79b1232e201b170162326a525101df128e3500a5e404cd.exe 45056  cf5e58fd51435296af60099146637fc9 
70303c9774e86ae63a7b66536a24558391c58ddd004c5646d6c91225f4f93ac9.exe 45056  fdab0ca2bcbb2ec21ef12a9e672868a6 
38777d898070ec51022f0f15f255ffc9.vir.exe 45056  38777d898070ec51022f0f15f255ffc912/12/2020
21e2ccf8120b86bf597dc44aeee2a91d0a39ac04236bc0527961bc28a6796bf8.exe 45056  bd384b55c99b21874958c2e06100abdc14/07/2023
eb016e20ea3c50f47989b8a24343665b.vir.exe 45056  eb016e20ea3c50f47989b8a24343665b 
4101dafe526fa746a345584d0f660df7f73c97ee140de1775ff2fb8666565b71.exe 45056  7a97c1c948c455598b0e8b7cedb8e62b 
21e2ccf8120b86bf597dc44aeee2a91d0a39ac04236bc0527961bc28a6796bf8.exe 45056  bd384b55c99b21874958c2e06100abdc 
38777d898070ec51022f0f15f255ffc9.vir.exe 45056  38777d898070ec51022f0f15f255ffc9 
1d9811cf2bbc752adc91904838e14d39.exe 45056  1d9811cf2bbc752adc91904838e14d39 
15eb5accb7cdda4ea694aea817134ddc.exe 45056  15eb5accb7cdda4ea694aea817134ddc 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware