Home / Spyware Encyclopedia / Proxy.Puma.oa << Back

Recommendation to Automatically remove Proxy.Puma.oa


Our products can remove Proxy.Puma.oa and thousands of other Virus and Spyware automatically and instantly.

Proxy.Puma.oa Details


  • Category Proxy
  • Discovered 12/20/2012 3:34:06 AM
  • Modified 7/27/2023 4:45:45 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2dd9bd7afd521fff037b1d0a39ece0f7.exe 25088  2dd9bd7afd521fff037b1d0a39ece0f7 
91ba846514a5207ee03bd3fd471fa907012ee1b5458f9de453ad18d18e379708.exe 25088  5bc20f738dc0dd08152af45c15f7fcd4 
9382cf92b509515138f27ba9e5087440.vir.exe 25098  9382cf92b509515138f27ba9e5087440 
trojan-proxy.win32.puma.oa-44a2a12037d5df1791968e244bb02c1eb4e956e4.exe 24064  e6feddf8583b9cf6aa84ab4da738c5a814/07/2023
trojan-proxy.win32.puma.oa-fff505298a644dafa892e64d42f5e14834cb449ff842e2997a2f1d91e35a0443.exe 25088  437264eb8835ed360900d8661deb1ccc27/07/2023
2a30f36b58057788578e1b409a09d736e9c4c43d212240256a8acfd0181299bd.exe 23552  5c964d56227141fd61e25a441f1029dc27/07/2023
fc2963109290f456aa8ade51e69357eb001f2db94a23e0246eed3d5fd2abeeff.exe 25088  2a57e55365047b69faa589b95952665a 
2a30f36b58057788578e1b409a09d736e9c4c43d212240256a8acfd0181299bd.exe 23552  5c964d56227141fd61e25a441f1029dc 
2a2d9143abd1174a0a6eaa566f044f429ff9658e014d300399b0a5aa6ecf72f9.exe 114463  4fe9049cb518c1111b31b7d3666c1fd0 
208cd63a9cfb074eff77fce6c4ba334d44d985265cc04fa11b0c9918b49953c2.exe 24064  040c4f6e76aa22e75e2b00c13881c5ad 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware