Home / Spyware Encyclopedia / Proxy.CCProxy.ii << Back

Recommendation to Automatically remove Proxy.CCProxy.ii


Our products can remove Proxy.CCProxy.ii and thousands of other Virus and Spyware automatically and instantly.

Proxy.CCProxy.ii Details


  • Category Proxy
  • Discovered 11/9/2013 8:05:46 PM
  • Modified 8/28/2023 4:08:16 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d12a0d16b9da40d636beac1d229e12d4.exe 1048576  d12a0d16b9da40d636beac1d229e12d4 
dd6ee5ace05996aa067998725bdd9c30.exe 1282048  dd6ee5ace05996aa067998725bdd9c30 
36b6c771ba0432329e5ea45f37fefce7.exe 651264  36b6c771ba0432329e5ea45f37fefce7 
010dad8e66e25a9e7e1799186079d5b8.exe 755920  010dad8e66e25a9e7e1799186079d5b8 
17463601185e70482f9ac289b1e7b5fe94a70a8e6bfd72bf795b368806e5bb2b693b0f80b8e233783692ae3c05535.exe 234496  f1d709455a895c937a519c1990eeb67f 
83b60a84c2b219aa7359486180aaf815.vir.exe 786432  83b60a84c2b219aa7359486180aaf815 
7a24557688099ea646a084b910fe1fda.vir.exe 1048576  7a24557688099ea646a084b910fe1fda 
ac1901d78a22c09a39fb79c32f19a3d2.exe 843776Youngzsoft6, 6, 4, 0ac1901d78a22c09a39fb79c32f19a3d210/11/2022
13c4cd774fa9f29a09ebb9b88443f4e1.vir.exe 1048576Youngzsoft6, 6, 4, 013c4cd774fa9f29a09ebb9b88443f4e104/08/2023
ae6bedd948a93d92de384f9f2f4f65bd.exe 2297544 5.9.4.10795ae6bedd948a93d92de384f9f2f4f65bd 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware