Remove PUM.Bad.Proxy Quickly and Easily

By | January 8, 2015

Hi, I wonder how to remove a Trojan from my computer. Eset NOD32 detects it (its name is PUM.Bad.Proxy) but just fails to remove it completely. Now some of my files have been hidden and I can’t unhide them. I think thoroughly removing PUM.Bad.Proxy may help fix this problem. I’ve tried several ways to remove this threat but have no luck. Hope someone can help me with this problem.


 

What Is PUM.Bad.Proxy?

PUM.Bad.Proxy is a Trojan horse used by cybercriminals for online fraud and theft. It often masquerades itself as a harmless or even beneficial file or application in order to mislead you into installing it on your computer. When running in your computer, it will start carrying out a range of actions according to the commands set by its creators. This Trojan horse does not self-replicate in your computer like what a worm does; it will drop its malicious codes to your hard drives, which enables it to accomplish the successor tasks. Generally, this Trojan horse consists of two parts, the client part and the server part. The client part serves to perform various tasks on your computers, and the server part is responsible for data transmission, namely, connecting to the cyber hackers’ computers and transmitting the information or data collected by the client part.


 

Should You Remove PUM.Bad.Proxy?

The answer is yes. As we have mentioned above, this Trojan horse often disguises itself as a legitimate file or application, but in fact does something malicious in the infected computers. As soon as installed, it will inject its malicious code into the legitimate files executed by the operating system and then execute operations that you won’t want on your computer, typically causing data loss or information theft, and possible system harm. This Trojan horse is capable of stealing important information (credit card numbers, passwords, etc.). Then it sends the sensitive information using the network on the infected computers to its creators, who then would use the information for malicious purposes.

PUM.Bad.Proxy will also make destructive damage to your computer system. It will randomly delete files, including the system files and personal files. Therefore, you may encounter system crash or blue screen of death suddenly, and find that some important files are missing without reasons. What’s worse, this Trojan horse could bring more threats to the your infected computer, which may cause more and more problems. A considerable slowdown in computer performance is one of the problems caused by the infections. You may also be annoyed by many unexpected pop-ups while surfing on the Internet. It will not be a pleasant thing to use a computer with so many problems. And it is dangerous to ignore this Trojan horse, since it can generate some serious problems like data loss, identify theft and system damage.


 

Why Is It Hard to Remove PUM.Bad.Proxy?

You may find it hard to detect and remove a Trojan horse using your antivirus program. Why? First of all, it should be known that an antivirus program or anti-malware program can help protect your computer from malware just because that it is able to recognize that they’re actually malware. However, in these days more and more malware are created by cyber hackers for various purposes and not every type of malware can be easily recognized by an anti-malware program, especially one that hasn’t been updated for a long time. In addition, some cyber hackers know much about how anti-malware programs work and they can write a Trojan horse which has the ability to bypass most security tools.

PUM.Bad.Proxy is such a Trojan horse that can evade detection and removal by a general anti-malware program. When downloaded onto a computer, it will quickly load itself into the Windows registry, which allows it to be executed every time the computer starts up. Also, it will disguise itself as a part of the system file, attempting to evade detection by the antivirus program. Moreover, this Trojan horse will try to kill process of the antivirus program so as to disable it. All these can explain why it becomes a so difficult task to remove the Trojan horse from an infected computer.


 

How to Remove PUM.Bad.Proxy Thoroughly

You may have tried running the antivirus programs installed on your computer to remove PUM.Bad.Proxy, but sadly find that the Trojan horse just comes back after restarting the computer. We have mentioned above that, this Trojan horse can mask itself as a part of the system and it may disable your antivirus program to protect itself from being detected and removal. So, you may have no luck to remove it simply using a common antivirus program. In this case, you can try other methods to deal with this threat. Here are two effective methods for you:
 
Method 1: Manually Remove the Trojan Horse by Following the Guide.
 
Method 2: Automatically Remove the Trojan Horse by Using SpyHunter.
 

Note: The manual removal should only be attempted by advanced computer users. If you are a novice user, it is highly recommended that you download and use a powerful removal tool to remove the Trojan horse within clicks.
 
download spyhunter now


 

Method 1: Manually Remove the Trojan Horse by Following the Guide.

 

Step 1: Terminate process of PUM.Bad.Proxy.

a. Start the Task Manager by pressing the key combination “CTRL + Shift + ESC”.
b. Under the “Processes” tab, find out and terminate the Trojan horse related process (process of the Trojan horse may be named with random characters and it occupies extremely high CPU usage).
End process
Step 2: Remove all Trojan horse related programs.
a. Click the Start menu, and select “Control Panel”.
b. In the “Control Panel” window, click on “Uninstall a program”.
uninstall a_program_1
c. In the list of all currently installed programs, find out any programs related to the Trojan horse and click on “Uninstall” button.
d. Then, click “Yes” in the pop-up window which asks if you want to uninstall the program.
 
Step 3: Show all hidden files and folders.
a. Go to Start button and select “Control Panel” option.
b. In the “Control Panel” window, click on the “Appearance and Personalization” link.
c. Select “Folder Options” and click the “View” tab.
d. Under “Advanced settings”, tick “Show hidden files, folders and drives”, non-tick “Hide protected operating system files (Recommended)” and then click the “OK” button.
Folder Options-Win 7
 
Step 4: Remove all files relative to PUM.Bad.Proxy.
a. Navigate to the local disk C.
open local hard disk C
b. Find out and delete all malicious files created by the Trojan horse.
%Temp%\[random].bat
%AllUsersProfile%\Application Data\.dll
%UserProfile%\Desktop\[Trojan horse name].lnk
%UserProfile%\Start Menu\[Trojan horse name]\Help.lnk
%UserProfile%\Application Data\Microsoft\Internet Explorer\Quick Launch\[Trojan horse name].lnk
 
Step 5: Delete all registry entries associated with PUM.Bad.Proxy.
a. Open Registry Editor by pressing the Windows key + R key, typing “regedit” and clicking OK.
regedit223
b. Search for all the registry entries associated with the Trojan horse and remove them all.
registry-editor4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “random.exe”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\[Trojan horse name]
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\[Trojan horse name]\DisplayIcon %AppData%\[RANDOM CHARACTERS]\[RANDOM CHARACTERS].exe,0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\[Trojan horse name]\DisplayName [Trojan horse name]
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\[RANDOM CHARACTERS] %AppData%\[RANDOM CHARACTERS]\[RANDOM CHARACTERS].exe


 

Method 2: Automatically Remove the Trojan Horse by Using SpyHunter.

If you are not expert at computer, automatically removing PUM.Bad.Proxy will be a better option. SpyHunter is a reputable anti-malware program offering detection and protection against malware including Trojans, worms, viruses, rootkits, adware, spyware, ransomware, etc. You can follow the steps below to download and install this powerful removal tool on your computer, and then run it to detect and remove all found threats on your PC.

 

Step 1: Click SpyHunter Download Link and save the file in your hard drive. When a small window pops up, please click on the “Save File” button.
spyhunter-save file

Step 2: Once the file is downloaded, double click on it. And click on the “Run” button when a window appears and asks if you want to run this file.
spyhunter-run setup file

Step 3: After that, SpyHunter installer will be downloaded. You can see the downloading process as shown below.
spyhunter-download installer

Step 4: Once downloading finishes, select the language, accept the SpyHunter license agreement and click “Next”.
spyhunter-agreement

Step 5: Keep following the wizard during the setup process. When you are presented with the prompt saying that SpyHunter has been successfully installed, click the “Finish” button.
spyhunter-installation finish

Step 6: Then, launch SpyHunter by double-clicking on its icon, and then click on “Scan Computer Now” to scan your system for PUM.Bad.Proxy and other potential threats.
SpyHunter-scan-system

Step 7: The scanning process may take 20 minutes or more (depending on the number of files in your system). So, you need to wait for some time until the system scan is completed.
spyhunter-scan files process

Step 8: Once SpyHunter finishes scanning your computer, make sure that all malicious items are selected, and click on the “Fix Threats” button. Then, SpyHunter will begin remove all threats from your PC. Restart your computer, and PUM.Bad.Proxy should have been completely removed out of your PC.
spyhunter-fix threats


 

How to Protect Your PC from Malware Infection

Install a reliable anti-malware program and update it regularly.
Your first line of defense would be a powerful anti-malware program that provides real-time protection. SpyHunter is such a powerful anti-malware program which does not only detect and remove threats, but also stops any processes that attempt to let malware enter into your PC secretly to exploit Windows registry. Click here to download this excellent anti-malware program now.

Always update the software installed on your PC.
Software vendors constantly releases updates for programs whenever a flaw is discovered. Getting the updates makes the computer more secured and help prevents spyware, worms, viruses, and other malware similar to PUM.Bad.Proxy.

Keep your operating system up-to-date.

Malware tend to exploit system vulnerabilities to attack your computer. Keeping your operating system updated helps protect against the malware attacks. Besides, you should configure your system to perform automatic updates to ensure your system is operating with the latest patches.

Use caution when surfing on the Internet.
1) Be suspicious of any email attachments from unknown people or with offers that seem too good to be true.
2) Avoid clicking on suspicious links in emails or instant messages, or you may be linked to some malicious websites.
3) Don’t click on misleading pop-up windows in unsafe website, or you may download unknown malware onto your PC.
4) Don’t download and install software from unreliable sources. Some malware come bundled in software packages and once you install such software on your PC, you install malware as well.


 

Conclusion

PUM.Bad.Proxy is a dangerous Trojan horse which infects users’ computers for the purpose of stealing confidential information as well as valuable data. Once installed in your computer, this Trojan horse will change many types of settings in the system, randomly delete or overwrite system files, disable important programs or services, drop other malware to the infected computer, and also try to collect confidential information & data stored on the computer. To fix or avoid the problems caused by this Trojan horse, you need to remove this Trojan horse as soon as you find its existence on your computer. We have introduced two methods to remove PUM.Bad.Proxy above, and you can choose one of them to deal with this threat.


 

Tip: If don’t have much computer expertise, it is highly recommended that you download and install a professional removal tool to remove the nasty Trojan horse and enable it to safeguard your PC from future malicious attacks.
 
download spyhunter now

Share Button