Home / Spyware Encyclopedia / Proxy.Puma.ail << Back

Recommendation to Automatically remove Proxy.Puma.ail


Our products can remove Proxy.Puma.ail and thousands of other Virus and Spyware automatically and instantly.

Proxy.Puma.ail Details


  • Category Proxy
  • Discovered 10/20/2012 12:20:15 AM
  • Modified 7/31/2023 5:22:23 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
42774e193c4ea90e3881c60add31fb3887868a99cc0f2dd4a2f060caee3d75c1.dll 41988  aa5bc20ca3dcc4251f8fda4889cff05e 
4258c91d62f309fb4313e0b68a2c50d1.vir.dll 41984  4258c91d62f309fb4313e0b68a2c50d114/07/2023
p002005_000047616-4661A17D_16ee038313db58c6631344eedc6889f0.DLL 0  16ee038313db58c6631344eedc6889f014/07/2023
61cc82c170079da072bb3317c7b5ed55.vir.dll 122882  61cc82c170079da072bb3317c7b5ed55 
4258c91d62f309fb4313e0b68a2c50d1.vir.dll 41984  4258c91d62f309fb4313e0b68a2c50d1 
1035110656065b45a71a5ef2c0c0fb943151ddd17fb0594dcfa23459dd63f6ea37fca33caea54835051ad6c2a02d4.dll 41984  903456b1a3051d77e3e12d2ad623aca0 
14716372eef2f5dc88a2b86b8c4e63b9.dll 42384  14716372eef2f5dc88a2b86b8c4e63b9 
f0e4b112a6cf3f8506fdc751be392f1cd9439ad3a623ec3a669459d651922e4a.dll 41984  861325de48269b9ea6a9667902655b85 
861325de48269b9ea6a9667902655b85.dll 41984  861325de48269b9ea6a9667902655b85 
4f5263ffc666777a1219f974b15cd4a7.dll 41984  4f5263ffc666777a1219f974b15cd4a7 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware