Home / Spyware Encyclopedia / Proxy.CCProxy.g << Back

Recommendation to Automatically remove Proxy.CCProxy.g


Our products can remove Proxy.CCProxy.g and thousands of other Virus and Spyware automatically and instantly.

Proxy.CCProxy.g Details


  • Category Proxy
  • Discovered 5/14/2010 8:35:23 AM
  • Modified 3/1/2021 10:00:00 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
14e91479.exe 1049665Youngzsoft, Inc.0.0.0.02ee794d29349cd650f5809fd46756821 
ccproxy.exe 1040384Youngzsoft6.6.2.0f8e2c504a42541980b81bc8d4960edc1 
4d8b31a6.exe 1040384Youngzsoft6.6.2.0f8e2c504a42541980b81bc8d4960edc1 
a3d25a3a0997b7efcb6cff4bd3b7c24f4b634c251f8dcb0969093e914813afb95748d873f51285b884a5110dc4f610332ae.exe 1074518  b7ed389a451030b6be3101d6f080a7d4 
e0f88fb76a28ce0970daa5fc784f83f81ec1b04aea75094df52dacbf87c0d107c80d465580e8ad2ba57a2a5647583366ec3.exe 1040384Youngzsoft6, 6, 2, 0867dbbeadbf0bf59456f11e396ae8ce5 
c455b474c2ccf61d4892ed528a25e555.exe 1049665Youngzsoft, Inc. 85e2aad4fc3d950c402dc20f6dff84ee 
b0fb171de7f04da6be96eb2e930eeda7.vir.exe 905216xjking0076, 6, 2, 0b0fb171de7f04da6be96eb2e930eeda7 
7f295187fd6ed6a3476d75d97ddbc06b.vir.exe 1040384Youngzsoft6, 6, 2, 07f295187fd6ed6a3476d75d97ddbc06b 
a3140ff0568be727cfd848d5d4fa3848.vir.exe 1290240Youngzsoft6, 6, 2, 0a3140ff0568be727cfd848d5d4fa3848 
94e822fa35f1b389335fea5496c058e0.vir.exe 1122304Youngzsoft6, 6, 2, 094e822fa35f1b389335fea5496c058e0 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware