Home / Spyware Encyclopedia / Proxy.Puma.ats << Back

Recommendation to Automatically remove Proxy.Puma.ats


Our products can remove Proxy.Puma.ats and thousands of other Virus and Spyware automatically and instantly.

Proxy.Puma.ats Details


  • Category Proxy
  • Discovered 5/2/2012 2:25:47 AM
  • Modified 1/10/2023 2:44:17 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
fce71301.dll 5120  a8e652b34ac6adae43005359e5a8df37 
032bb20526701e6d0284eafd2409e699.dll.exe 5120  032bb20526701e6d0284eafd2409e699 
559164a8d5c2462e4c06843a164eb8f886ef558c5fe7e460edcb38c27547e963.exe 15872  030fa755ff11b0fe8664baa18d5b0bf0 
559164a8d5c2462e4c06843a164eb8f886ef558c5fe7e460edcb38c27547e963_pandrv.sys.exe 5120  032bb20526701e6d0284eafd2409e699 
91bf51f82fde4327db9e788f8d7db0c2902f04427c559e476603eac0938dc7c9.exe 19456  fce8467b8076279eb95aa9cfe503184a 
d77ca7326803846662410833fdfba2b73380b51aec4fdd86e9b21d34030cccc5_003.exe.exe_pandrv.sys.sbox.exe 5120  f8cf0e706b5c9cda65087b384af24ce7 
d77ca7326803846662410833fdfba2b73380b51aec4fdd86e9b21d34030cccc5_003.exe.exe 17408  17ac224b1c9f77b1b99321e7faab92ee 
17b7d402b528b4a05db58fd7f9072431.exe 17408  17b7d402b528b4a05db58fd7f9072431 
d0ebd3f8a9175c17bbd7d84ade848239.exe 18212  d0ebd3f8a9175c17bbd7d84ade848239 
77ec9255dfd684eb23bac923c6a2da45.exe 919844LeapWare2.7.6.61377ec9255dfd684eb23bac923c6a2da45 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware