Home / Spyware Encyclopedia / Proxy.Cimuz.al << Back

Recommendation to Automatically remove Proxy.Cimuz.al


Our products can remove Proxy.Cimuz.al and thousands of other Virus and Spyware automatically and instantly.

Proxy.Cimuz.al Details


  • Category Proxy
  • Discovered 12/28/2010 12:52:33 PM
  • Modified 2/22/2019 12:31:33 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
mdms.exe 115995Microsoft Corporation5.1.2600.2180b2b96e7760d7e249ae334f35b105acdb 
b2b96e7760d7e249ae334f35b105acdb.exe 115995Microsoft Corporation5.1.2600.2180b2b96e7760d7e249ae334f35b105acdb 
69510c75e199c901104ad006d8e4f292.vXE.exe 135168Microsoft Corporation5.1.2600.218069510c75e199c901104ad006d8e4f292 
8ac3fb3ae53e84a1777d9935e6c0473a.vXE.exe 135168Microsoft Corporation5.1.2600.21808ac3fb3ae53e84a1777d9935e6c0473a 
8da48bf0ff1271a80246ad0af281ac011ef07f681dd1d734f8692e6b26dcfcc102fc2989126dc59b5e25a673a84125bac2a.exe 135168Microsoft Corporation5.1.2600.21803cfb4537efbead56479881e31af2d98d 
d8228f5508e2e33f8f214a99f644d90f.vXE.exe 135168Microsoft Corporation5.1.2600.2180d8228f5508e2e33f8f214a99f644d90f 
247130a7c80b8fb7fbb70b9864a69e4ef41f662fc0cda5fe07f0135c81a6df9a.exe 22597Microsoft Corporation5.1.2600.2180626e3510f3c1ad06b057687c24ec1e33 
12327b8fbd8c2432ea0a2ed0c7c49a53.vir.exe 135168Microsoft Corporation5.1.2600.218012327b8fbd8c2432ea0a2ed0c7c49a53 
trojan-proxy.win32.cimuz.al-e6d06b0d52357b3b2a9ff27caa1ed7ab1f98c194.exe 114688  e9bee21d7b84f61b54170e220c57a0b508/08/2023
04c4cc098ac1b673dd6ae17e32aad183.vir.exe 151552Microsoft Corporation5.1.2600.218004c4cc098ac1b673dd6ae17e32aad183 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware