Home / Spyware Encyclopedia / Proxy.Puma.ats << Back

Recommendation to Automatically remove Proxy.Puma.ats


Our products can remove Proxy.Puma.ats and thousands of other Virus and Spyware automatically and instantly.

Proxy.Puma.ats Details


  • Category Proxy
  • Discovered 5/2/2012 2:25:47 AM
  • Modified 1/10/2023 2:44:17 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
559164a8d5c2462e4c06843a164eb8f886ef558c5fe7e460edcb38c27547e963.exe 15872  030fa755ff11b0fe8664baa18d5b0bf0 
17b7d402b528b4a05db58fd7f9072431.exe 17408  17b7d402b528b4a05db58fd7f9072431 
77ec9255dfd684eb23bac923c6a2da45.exe 919844LeapWare2.7.6.61377ec9255dfd684eb23bac923c6a2da45 
1526140158215c1f25b007b5fb489cb65d622359335c264513733a3a02b4ada78f3938f690e5556cc19fd3ad6366c.exe 19456  46daed53fd8765fd6f1fedd51e2f850c 
0655285_000979541-99C1EA03_46eaeadf73624cdfc83af0ca07701a49.EXE_Pandrv.sys.SBOX.exe 5120  5224279592ea5294d4381db205898ff916/10/2020
2b52a79dcb5fb59d11f1b528f047e818.vir.exe 17408  2b52a79dcb5fb59d11f1b528f047e818 
b657a952a7c450befb6e718abadbc9d5.vir.exe 17920  b657a952a7c450befb6e718abadbc9d5 
d0ebd3f8a9175c17bbd7d84ade848239.exe 18212  d0ebd3f8a9175c17bbd7d84ade848239 
d77ca7326803846662410833fdfba2b73380b51aec4fdd86e9b21d34030cccc5_003.exe.exe 17408  17ac224b1c9f77b1b99321e7faab92ee 
d77ca7326803846662410833fdfba2b73380b51aec4fdd86e9b21d34030cccc5_003.exe.exe_pandrv.sys.sbox.exe 5120  f8cf0e706b5c9cda65087b384af24ce7 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware