Home / Spyware Encyclopedia / Proxy.Puma << Back

Recommendation to Automatically remove Proxy.Puma


Our products can remove Proxy.Puma and thousands of other Virus and Spyware automatically and instantly.

Proxy.Puma Details


  • Category Proxy
  • Discovered 8/17/2009 10:23:33 AM
  • Modified 8/5/2023 2:43:58 PM
  • Threat Level High
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2222.exe 19456  fec16c607a816fe842cbe4050cf52129 
5D70EDCF.EXE 196608  eafdbc7ad26e60fbde6f40f09ec638e7 
BF850AAD.DLL 5632  da80b9353c0a59f6e48f5e4b5a53f3b4 
4ecc3b85.dll 19456  cff0609bfb7b7ce4363e544abbc57211 
3B882D9F.DLL 18944  349a32a3b097625bb606e3770dfba592 
06A65614.DLL 18944  1d5ff2a870d931ed49f9a4102b833d51 
EF9FC7D8.DLL 19456  1bafc7fb42369f8d1acbfcc02b368794 
CE61B4E6.DLL 20992  0fd097aa9e0ea7a1b25d40e237a3c7c1 
02626315.EXE 11776  09e451be6cc282a493dc670e6bb5490b 
Trojan-PSW.Win32.Nilage.as.exe 5120  01eefb848571a89fd282f80c12cd1159 

The following Registry Entries were created:
..\System\CurrentControlSet\Enum\root\legacy_vrdnap\(Default)
..\System\CurrentControlSet\Enum\root\legacy_ctlsec\(Default)
..\System\CurrentControlSet\Services\vrdnap\(Default)
..\System\CurrentControlSet\Services\ctlsec\(Default)
..\System\CurrentControlSet\Services\ctl2sec\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Run\\"system configure"\"%DAS.AU%\svchost.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"exploret.exe"\"%WIN.SYS32%\exploret.exe"
..\System\CurrentControlSet\Services\sectolr\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Run\\"_rx"\"%WIN%\rundll32.exe"
..\System\CurrentControlSet\Services\king001\(Default)

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware