Home / Spyware Encyclopedia / Proxy.CCProxy.ii << Back

Recommendation to Automatically remove Proxy.CCProxy.ii


Our products can remove Proxy.CCProxy.ii and thousands of other Virus and Spyware automatically and instantly.

Proxy.CCProxy.ii Details


  • Category Proxy
  • Discovered 11/9/2013 8:05:46 PM
  • Modified 8/28/2023 4:08:16 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
36b6c771ba0432329e5ea45f37fefce7.exe 651264  36b6c771ba0432329e5ea45f37fefce7 
f7c3dc7fbaf64bda2fb9ac816d205389.vir.exe 1044480Youngzsoft6, 6, 4, 0070faad50b995e076555c9e0c5c4e2fb 
13c4cd774fa9f29a09ebb9b88443f4e1.vir.exe 1048576Youngzsoft6, 6, 4, 013c4cd774fa9f29a09ebb9b88443f4e104/08/2023
ac1901d78a22c09a39fb79c32f19a3d2.exe 843776Youngzsoft6, 6, 4, 0ac1901d78a22c09a39fb79c32f19a3d210/11/2022
2b6cad463024dd0e2fe3bbf0d198083d.vir.exe 1089536Youngzsoft6, 6, 4, 02b6cad463024dd0e2fe3bbf0d198083d 
13c4cd774fa9f29a09ebb9b88443f4e1.vir.exe 1048576Youngzsoft6, 6, 4, 013c4cd774fa9f29a09ebb9b88443f4e1 
cf0dce3159e281563358d1f919bff2d7.vir.exe 1048576Youngzsoft6, 6, 4, 0cf0dce3159e281563358d1f919bff2d7 
81472900dbd7067a4d20364786967b21.vir.exe 1048576Youngzsoft6, 6, 4, 048df9dac4c7597ea293508a53d11d7d1 
16ce88444f6fdc2bf6c661750fe1cf77.vir.exe 1089536Youngzsoft6, 6, 4, 016ce88444f6fdc2bf6c661750fe1cf77 
27eeae7a252436066aa575d888b06f10.vir.exe 1048576Youngzsoft6, 6, 4, 0c16a1f735c0436463aeaa7bf43c6f4b0 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware