Home / Spyware Encyclopedia / Proxy.Puma.oj << Back

Recommendation to Automatically remove Proxy.Puma.oj


Our products can remove Proxy.Puma.oj and thousands of other Virus and Spyware automatically and instantly.

Proxy.Puma.oj Details


  • Category Proxy
  • Discovered 3/27/2013 8:58:14 PM
  • Modified 7/18/2023 5:18:56 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
ef15a65f.exe 20066  029e07b5341b8321bfcd87967d3a5c56 
34a1dabf98db67255e3185ce12e93f58e1f83d03e2f54978661b3acad469fe79.exe 26624  7fe54fbc718736f529a3d239478db6d6 
037a3184bcc48c6b22f0384a7a7183de.exe 25088  037a3184bcc48c6b22f0384a7a7183de 
189329da40cd09d4987ce06f777e0899.exe 26624  189329da40cd09d4987ce06f777e0899 
563bbb1c3061f57b632c873255e341715a13822997adefa4d73eb96ce501cdd6.exe 25600  490d13d3b9ca3eaca723f4391da4218e 
0db81a720d69626099ab4e89bf3f13c82c5b351834adf3a551207ff644ab0081.exe 27648  0ad3f4b1d942a4cc300b3b2cf5bf7530 
3d3d3db78de66307af5f5ea8da3b6d5d.exe 26112  3d3d3db78de66307af5f5ea8da3b6d5d 
943bc3d303d53153022985a0c029e0566dcbc48484061b5ee59f657bd59ca6d7.exe 26624  06cbcc5ffce25f88dd0115f1ca86f366 
d2ba8175e0d75219be2bb821c2f11f7a.vir.exe 26112  d2ba8175e0d75219be2bb821c2f11f7a 
trojan-proxy.win32.puma.oj-4e2bf9f67a30be086b237b6791057dae5d1370a8.exe 26624  d51c165c38d418bf6506a69ac30c092b14/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware