Home / Spyware Encyclopedia / Proxy.Puma.ht << Back

Recommendation to Automatically remove Proxy.Puma.ht


Our products can remove Proxy.Puma.ht and thousands of other Virus and Spyware automatically and instantly.

Proxy.Puma.ht Details


  • Category Proxy
  • Discovered 6/21/2018 11:26:30 AM
  • Modified 8/6/2023 12:44:10 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2ec78e93800bedd9d71ba961645726064256ed497503824f091da8c3b99f347f.exe 35328  43efd3ee1456d3f8e290d29b8398f8f0 
30ff0ec0b4c16ca7c886e7b0173e97c4.exe 34816  30ff0ec0b4c16ca7c886e7b0173e97c4 
7724ae376a3bfbea365c82c4b378a8d5.vir.exe 35328  7724ae376a3bfbea365c82c4b378a8d5 
9bcebae38b5e84f142d72009f5cd44f8.vir.exe 395776  9bcebae38b5e84f142d72009f5cd44f8 
c2412449664cddb1f28a51c6e11a7816.vir.dll 22528  c2412449664cddb1f28a51c6e11a7816 
66fc125875151146f7228217f63705b3.dll 22528  66fc125875151146f7228217f63705b3 
virusshare_32dd83c5281e968fc851f4365bd23d84.exe 34816  32dd83c5281e968fc851f4365bd23d8406/08/2023
trojan-proxy.win32.puma.ht-f6c5f24458b323837b3438c612642d56e2bdfc153cc20cac49eca8c5493dadd6.exe 303104  00926ab91c95b956c9c20652b87fc46505/08/2023
a23d53b43e1cd6b2b657ebeb206d25b61521dcb9cd88bb333c2b2f205903cd12.dll 27136  b1fdcadcdda25e4c305bd642b8b5fca0 
5b113fbcd54c094a622fa4966c85c83479cd22a815851200ba2cf66d40dd2b4d.dll 22528  d3b436ec26573898f5952e3009ee8fb8 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware