Home / Spyware Encyclopedia / Proxy.Cimuz.bg << Back

Recommendation to Automatically remove Proxy.Cimuz.bg


Our products can remove Proxy.Cimuz.bg and thousands of other Virus and Spyware automatically and instantly.

Proxy.Cimuz.bg Details


  • Category Proxy
  • Discovered 12/27/2022 2:12:35 PM
  • Modified 12/28/2022 1:03:31 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
mdms.exe 116049Microsoft Corporation5.1.2600.2180aef1da9d9ac496a25c39c527a0537e6d 
18c506e7e7baf705871db803332f7b65.exe 135168Microsoft Corporation5.1.2600.218018c506e7e7baf705871db803332f7b65 
41a1b8f0000010cbb16bbd0043544d71.exe 116049Microsoft Corporation5.1.2600.218041a1b8f0000010cbb16bbd0043544d71 
trojan-proxy.win32.cimuz.bg.exe 39381Microsoft Corporation5.1.2600.21801642b59b8bd531a6e2d2331c7910e010 
trojan-proxy.win32.cimuz.bf.exe 39217Microsoft Corporation5.1.2600.21804440392528545020390d89541dcad201 
mdms.exe 39381Microsoft Corporation5.1.2600.21801642b59b8bd531a6e2d2331c7910e010 
28586b9283193ea258a843af40eb11774441c5e37dcdbbb7210874612192771f.exe 39405Microsoft Corporation5.1.2600.2180103285643a47f91d77a7c5c482088569 
a157d4eca59c197315afece2cf0f77c2.exe 114688  a157d4eca59c197315afece2cf0f77c228/12/2022
5de96d478483b2b2c5133d5ac38c1f65b3d338018185d8143f21f7056c10c827.exe 22833Microsoft Corporation5.1.2600.218039f90f034c9e750a2a5a795fa4156ad7 
f09b6f7db845af2c7b013d2e848dddc2.vxe.exe 39281Microsoft Corporation5.1.2600.2180f09b6f7db845af2c7b013d2e848dddc2 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware