Home / Spyware Encyclopedia / Proxy.Cimuz.al << Back

Recommendation to Automatically remove Proxy.Cimuz.al


Our products can remove Proxy.Cimuz.al and thousands of other Virus and Spyware automatically and instantly.

Proxy.Cimuz.al Details


  • Category Proxy
  • Discovered 12/28/2010 12:52:33 PM
  • Modified 2/22/2019 12:31:33 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b2b96e7760d7e249ae334f35b105acdb.exe 115995Microsoft Corporation5.1.2600.2180b2b96e7760d7e249ae334f35b105acdb 
d8228f5508e2e33f8f214a99f644d90f.vXE.exe 135168Microsoft Corporation5.1.2600.2180d8228f5508e2e33f8f214a99f644d90f 
trojan-proxy.win32.cimuz.al-e6d06b0d52357b3b2a9ff27caa1ed7ab1f98c194.exe 114688  e9bee21d7b84f61b54170e220c57a0b508/08/2023
04c4cc098ac1b673dd6ae17e32aad183.vir.exe 151552Microsoft Corporation5.1.2600.218004c4cc098ac1b673dd6ae17e32aad183 
73b750041e4182032196b22d280e6322181c029b36337ad4999cceb36e166859.exe 22633Microsoft Corporation5.1.2600.2180232cafbc194ca73726b1c8fc34f1cdea 
247130a7c80b8fb7fbb70b9864a69e4ef41f662fc0cda5fe07f0135c81a6df9a.exe 22597Microsoft Corporation5.1.2600.2180626e3510f3c1ad06b057687c24ec1e33 
6853e71712681338c863f18609ce3c36.exe 39181Microsoft Corporation5.1.2600.21806853e71712681338c863f18609ce3c36 
685f5be52e465ca553104a5626d6c1cd.exe 39425Microsoft Corporation5.1.2600.2180685f5be52e465ca553104a5626d6c1cd 
5b43c2465c9ee7c39a9e3cc8a8800ad8.vxe.exe 23177Microsoft Corporation5.1.2600.21805b43c2465c9ee7c39a9e3cc8a8800ad8 
151f5cb77da7dae1031a859278bae054c7f0b591c3e15ad336cfc9561c9d9a44.exe 39849Microsoft Corporation5.1.2600.21802c9d6496b48334bfaf21407463b07943 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware