Mal/Horst

Mal/Horst Description

Mal/Horst is from a family of downloading Trojans. Mal/Horst may access a user's computer system via malicious drive-by downloads or unsolicited e-mails. Mal/Horst may give remote attackers access to a victim's system, allowing them to steal confidential information. Remote attackers may also install additional infections onto a compromised computer. Mal/Horst is a danger to your computer system and the data stored on it.

Aliases: Heuristic.Malware, ], [Sunbelt], Heuristic: Suspicious File With Persistence [Prevx1], W32/Horst.gen33 [F-Secure], Trojan.DownLoader.47648 [DrWeb], HEUR/Malware [AntiVir], Heuristic: Suspicious Browser Help Object [Prevx1], Suspicious file [Panda], W32/Horst.gen29 [F-Secure], W32/Downloader.F.gen!Eldorado [F-Prot] and suspicious Trojan/Worm [eSafe].

Technical Information

File System Details

Mal/Horst creates the following file(s):
# File Name Size MD5
1 LogicFunctions.dll 247,296 ba9649e4626e47d9a8c8586ac0fe6589
2 CableRouting.dll 247,296 47f6866bb3e0852459ad09776aac79af
3 wha1.116.exe 112,640 09c92ea4dd6e9f94349232c1db24b110
More files

Registry Details

Mal/Horst creates the following registry entry or registry entries:
Directory
%ProgramFiles%\BurstWriting

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.