Home / Spyware Encyclopedia / Proxy.Puma.gd << Back

Recommendation to Automatically remove Proxy.Puma.gd


Our products can remove Proxy.Puma.gd and thousands of other Virus and Spyware automatically and instantly.

Proxy.Puma.gd Details


  • Category Proxy
  • Discovered 5/4/2011 3:00:30 PM
  • Modified 1/23/2020 5:19:09 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
283559837e28c278c3c9902099fa98f6.exe 25088  283559837e28c278c3c9902099fa98f6 
c717a08a23082676599037b0f02384ba3253531231c48970eed41b080bd1b1d0.exe 23040  354bfcba022d3df184ec1b6ff554f230 
d357d87a4b8c0b875b664586c48ac786.vir.exe 116736  d357d87a4b8c0b875b664586c48ac786 
1857590781179e08616f46bd5c3edc893560acddf2d0b15d7c40eca88e6f4e42275190639532b9267146fd677cda1.exe 22528  14616b1444fd060267a9c2783d52bfd3 
1213d2f3db284623b8e5f45cebe422fe.exe 23552  1213d2f3db284623b8e5f45cebe422fe 
33cf168ad94f9d418c9683d9a04dfe36.exe 25088  33cf168ad94f9d418c9683d9a04dfe36 
39cf8222775a38ae66bbedde63b3573b.exe 22528  39cf8222775a38ae66bbedde63b3573b 
27728b2f8c1359405f23d2ff63125aa6f053ad40171ef2c82f30dc62c2d76e63.exe 23552  2bff569bb89b07122696c7105f65b88b 
7fe11ba65145c3d616135f23f4f76d6cab234317de6e1b2d04ecef59bcff9466.exe 25088  1bbc843189e1b55b465d415d358ef9b1 
0c24ef26.exe 21734  c38487a8b990e9d1f45ebb08d0188b5f 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware