Home / Spyware Encyclopedia / Proxy.Daemonize << Back

Recommendation to Automatically remove Proxy.Daemonize


Our products can remove Proxy.Daemonize and thousands of other Virus and Spyware automatically and instantly.

Proxy.Daemonize Details


  • Category Proxy
  • Discovered 2/11/2008 9:29:00 AM
  • Modified 10/4/2024 11:43:27 AM
  • Threat Level Critical
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
Trojan-PSW.Win32.Lmir.dq.exe 115712 1, 0, 0, 1e1515d99cd56b39e6bccf0a8e192c446 
336b55f3.exe 13000  e5e917412811d47769895bf7aeb9b846 
sysmodule64.dll 67072  dd87c93365c5340093d75b213217a4b1 
6e88ca8c.exe 43520  d9f3aef3bba381bb90d2026bc692be72 
2a45c35b.exe 77824  b4ffa78773f066335ce09525d2a34232 
C48D38B7.EXE 38482  8f41bae72459f70c76b8eceace9d76a2 
36594897.exe 20216  892fa456b614b643091a7bcc908fa8b5 
399822bc.exe 39216  60ab9f4551406c5924779771ceaf6285 
wininet.exe 91197  2934dcc2e1f4f20d4d8ea21950c319cf 
8ab6f3e5.exe 14848  231530b9ca9bd6249bec0b9fae703134 

The following Registry Entries were created:
..\System\CurrentControlSet\Services\SharedAccess\Parameters\firewallpolicy\StandardProfile\AuthorizedApplications\List\"%WIN.SYS32%\msctupd.exe"\"%WIN.SYS32%\msctupd.exe:*:Enabled:X:\WINDOWS\System32\msctupd.exe"
..\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Windows Media SP.2.7.7"\"%WIN.SYS32%\TROJAN-PSW.WIN32.LMIR.CJ.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"wininet"\"%WIN.SYS32%\wininet.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"artcom"\"%WIN.SYS32%\msctupd.exe"
..\Software\Microsoft\Windows\CurrentVersion\Explorer\shellexecutehooks\"{081FE200-A103-11D7-A46D-C770E4459F2F}"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"IPV6 NETWORK SUPPORT"\"%DAS.AU.LS%\TEMP\SVCHOST.EXE"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"SVCHOST GENERIC APPLICATION"\"%DAS.AU.LS%\TEMP\SVCHOST.EXE"
..\Software\Microsoft\MSERV\(Default)
..\Software\Classes\Clsid\{081FE200-A103-11D7-A46D-C770E4459F2F}\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware