Home / Spyware Encyclopedia / Proxy.Loser << Back

Recommendation to Automatically remove Proxy.Loser


Our products can remove Proxy.Loser and thousands of other Virus and Spyware automatically and instantly.

Proxy.Loser Details


  • Category Proxy
  • Discovered 5/13/2008 6:20:00 PM
  • Modified 11/2/2021 1:41:11 PM
  • Threat Level Medium
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
TROJAN-PSW.WIN32.LMIR.TM.dll 6844  fded59033a23112881d0d69dcdc3dd62 
systemlc.dll 49664  d56c5df8622e68aaeb2fa1fff61bcb06 
Trojan-PSW.Win32.Lmir.ug.exe 48128  c4f4dff6bb2300f7ce5481e4491ddb1b 
systemlc.dll 11264  a6f5d9d1f49b21875d8aa54a4e3b85d1 
explorec.exe 14336  82308ab199ecb202ad0226811db0c81e 
exploret.exe 19489  71ed490c6996abc35dfbf9baf0ce4952 
Trojan-PSW.Win32.Lmir.u.exe 155136  54a39c5e660808b74b7bf031ba791a1c 
Trojan-PSW.Win32.Lmir.ue.exe 24181  4a8817fa1b676f2214e00306d9abed65 
Trojan-PSW.Win32.Lmir.ty.exe 449536  2e83d7760670c12383606b1238459f9f 
exploret.exe 34835  0740bb7c2ab57b773d5b256bf795840d 

The following Registry Entries were created:
..\Software\Microsoft\Windows\CurrentVersion\\"run"\"%WIN.SYS32%\exploret.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"_rundlle"\"%WIN.SYS32%\TROJAN-PSW.WIN32.LMIR.UC.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Windows Media SP3"\"%WIN.SYS32%\TROJAN-PSW.WIN32.LMIR.UG.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Expatch"\"%WIN.SYS32%\TROJAN-PSW.WIN32.LMIR.TM.exe"

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware