Home / Spyware Encyclopedia / Proxy.Puma.akd << Back

Recommendation to Automatically remove Proxy.Puma.akd


Our products can remove Proxy.Puma.akd and thousands of other Virus and Spyware automatically and instantly.

Proxy.Puma.akd Details


  • Category Proxy
  • Discovered 1/24/2014 10:22:36 AM
  • Modified 7/14/2023 12:17:06 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2a68574477738886c3e560abbb1bb128.exe 47104  2a68574477738886c3e560abbb1bb128 
0831d4e267191668ca5c41336e6f2d814a01d1e59a1bf4cc780f31d445d808f3.exe 47104  4265809f942bd9b215e07d4b4a9ed8cd23/01/2020
trojan-proxy.win32.puma.akd-c6101dc6034bcdb184149668562e05c841b1fdc9.exe 47616  605b7a5710c65c8920a1504bff58157514/07/2023
trojan-proxy.win32.puma.akd-cc772668db9f5a3b867ef40135268eb4f3dac7de.exe 48640  3149780d64299c1b4f789bfd500349f014/07/2023
ae3de2ea4780cd38d1cafbb2109a43f9.vir.exe 47104  ae3de2ea4780cd38d1cafbb2109a43f914/07/2023
trojan.win32.agent.abf.2beaabfb4770ba6c9f8cc62805e0c734.exe 33134  2beaabfb4770ba6c9f8cc62805e0c73422/07/2020
b1bce1a1cc2e1fc563ea1ee7e9cb15ec.vir.exe 47104  b1bce1a1cc2e1fc563ea1ee7e9cb15ec 
ae3de2ea4780cd38d1cafbb2109a43f9.vir.exe 47104  ae3de2ea4780cd38d1cafbb2109a43f9 
a7b432db1f8b60fe96bd2ea3327dca58b9cbed11.bin.exe 47104  113bcdf5616d375d30baefbca896f5d3 
531804f4c580aee31791a0d255fe5fdf449c7e6b.bin.exe 37694  bad58c580110118eebcec7a61fdf00c2 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware