Home / Spyware Encyclopedia / Proxy.Puma.fw << Back

Recommendation to Automatically remove Proxy.Puma.fw


Our products can remove Proxy.Puma.fw and thousands of other Virus and Spyware automatically and instantly.

Proxy.Puma.fw Details


  • Category Proxy
  • Discovered 4/9/2013 7:43:18 PM
  • Modified 7/18/2023 5:18:57 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
7708fa30c302403b5aa76cd71feb582516d802141e41c8e635dba95ec2024a9d.exe 23552  3a9d95d66bed7c34fc1f1b8a5fdfdedb 
8b5446ad8b72c621f960ac9efdb74358.vir.exe 23040  8b5446ad8b72c621f960ac9efdb74358 
470cfba9034a34c74b9c6b0abe584662131d2a7721b32a6ea879090e9e7b25a6.exe 24064  98f84fd55e7a013d6cb9278625c56e6811/12/2020
bd65768933a70492f3eed6667e23ae482e55173973c5650acc471d3cedb27297.exe 25088  41375e50f762f85ba001933b103a9bcc28/02/2023
46b0ee10a9db610b4037543843c02d72b5e54412.bin.exe 23552  0b8f69c1a893e45de80ce4f037ac25bc18/07/2023
bd65768933a70492f3eed6667e23ae482e55173973c5650acc471d3cedb27297.exe 25088  41375e50f762f85ba001933b103a9bcc 
2d0531fe3ae3a68024dce5d52de07723.vir.exe 23552  2d0531fe3ae3a68024dce5d52de07723 
46b0ee10a9db610b4037543843c02d72b5e54412.bin.exe 23552  0b8f69c1a893e45de80ce4f037ac25bc 
3f99dcef83da3abc58ef2fbdd44b8b2b.exe 24064  3f99dcef83da3abc58ef2fbdd44b8b2b 
470cfba9034a34c74b9c6b0abe584662131d2a7721b32a6ea879090e9e7b25a6.exe 24064  98f84fd55e7a013d6cb9278625c56e68 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware