Home / Spyware Encyclopedia / Proxy.Cimuz.al << Back

Recommendation to Automatically remove Proxy.Cimuz.al


Our products can remove Proxy.Cimuz.al and thousands of other Virus and Spyware automatically and instantly.

Proxy.Cimuz.al Details


  • Category Proxy
  • Discovered 12/28/2010 12:52:33 PM
  • Modified 2/22/2019 12:31:33 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
mdms.exe 115995Microsoft Corporation5.1.2600.2180b2b96e7760d7e249ae334f35b105acdb 
b2b96e7760d7e249ae334f35b105acdb.exe 115995Microsoft Corporation5.1.2600.2180b2b96e7760d7e249ae334f35b105acdb 
69510c75e199c901104ad006d8e4f292.vXE.exe 135168Microsoft Corporation5.1.2600.218069510c75e199c901104ad006d8e4f292 
8ac3fb3ae53e84a1777d9935e6c0473a.vXE.exe 135168Microsoft Corporation5.1.2600.21808ac3fb3ae53e84a1777d9935e6c0473a 
8da48bf0ff1271a80246ad0af281ac011ef07f681dd1d734f8692e6b26dcfcc102fc2989126dc59b5e25a673a84125bac2a.exe 135168Microsoft Corporation5.1.2600.21803cfb4537efbead56479881e31af2d98d 
d8228f5508e2e33f8f214a99f644d90f.vXE.exe 135168Microsoft Corporation5.1.2600.2180d8228f5508e2e33f8f214a99f644d90f 
151f5cb77da7dae1031a859278bae054c7f0b591c3e15ad336cfc9561c9d9a44.exe 39849Microsoft Corporation5.1.2600.21802c9d6496b48334bfaf21407463b07943 
5b43c2465c9ee7c39a9e3cc8a8800ad8.vxe.exe 23177Microsoft Corporation5.1.2600.21805b43c2465c9ee7c39a9e3cc8a8800ad8 
685f5be52e465ca553104a5626d6c1cd.exe 39425Microsoft Corporation5.1.2600.2180685f5be52e465ca553104a5626d6c1cd 
6853e71712681338c863f18609ce3c36.exe 39181Microsoft Corporation5.1.2600.21806853e71712681338c863f18609ce3c36 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware