Home / Spyware Encyclopedia / Proxy.CCProxy.ka << Back

Recommendation to Automatically remove Proxy.CCProxy.ka


Our products can remove Proxy.CCProxy.ka and thousands of other Virus and Spyware automatically and instantly.

Proxy.CCProxy.ka Details


  • Category Proxy
  • Discovered 5/23/2012 1:46:58 PM
  • Modified 5/14/2022 1:36:59 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
b9e8713f2b5473119412106551428d09.exe 613009microsoft corp1.00b9e8713f2b5473119412106551428d09 
7c50afab422e1dd9e45ff17e179924c8.exe 613105Microsoft Corporation Software1.007c50afab422e1dd9e45ff17e179924c8 
023331ab9c004c1532214c9cfe2246c2.vxe.exe 469865  023331ab9c004c1532214c9cfe2246c2 
cb6cff4bd3b7c24f4b634c251f8dcb0969093e914813afb95748d873f51285b884a5110dc4f610332ae_ccproxy.dll.exe.dll 434176  1e4d46696da68c73447bd6ef65b41ab7 
c60aab310a961f1ac533d9276b116ef6185e6692b3e5b22bc8f837bdb44f457255a1aae788dd19cd611bdb3c6b371ef7344.exe 635234  1f861458db0210b0bf3ad67e713b5ee7 
1445ce31537374cd0350f3bcd6080f2e.vir.exe 607191WOTLauncher Cheats1.001445ce31537374cd0350f3bcd6080f2e 
814e78912143216f7b01198c0abe9237.vir.dll 434176  814e78912143216f7b01198c0abe9237 
09a316f643659f6e06abfece344bf935.vir.dll 495616  09a316f643659f6e06abfece344bf935 
0c6628c289f4ac86f4919799f250a125.vir.exe 752073  0c6628c289f4ac86f4919799f250a125 
cb6cff4bd3b7c24f4b634c251f8dcb0969093e914813afb95748d873f51285b884a5110dc4f610332ae_ccproxy.dll.exe.dll 434176  1e4d46696da68c73447bd6ef65b41ab714/05/2022

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware