Home / Spyware Encyclopedia / Proxy.CCProxy.ii << Back

Recommendation to Automatically remove Proxy.CCProxy.ii


Our products can remove Proxy.CCProxy.ii and thousands of other Virus and Spyware automatically and instantly.

Proxy.CCProxy.ii Details


  • Category Proxy
  • Discovered 11/9/2013 8:05:46 PM
  • Modified 8/28/2023 4:08:16 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
d12a0d16b9da40d636beac1d229e12d4.exe 1048576  d12a0d16b9da40d636beac1d229e12d4 
dd6ee5ace05996aa067998725bdd9c30.exe 1282048  dd6ee5ace05996aa067998725bdd9c30 
36b6c771ba0432329e5ea45f37fefce7.exe 651264  36b6c771ba0432329e5ea45f37fefce7 
c2bf4cc0f9fc860dccafdc3e910dfdeb5682bf18.bin.exe 835584Youngzsoft6, 6, 4, 083449fa964b362ee704e108cfd1e8f27 
010dad8e66e25a9e7e1799186079d5b8.exe 755920  010dad8e66e25a9e7e1799186079d5b8 
49da9fe8a552fbdea080ec0eaa306641.exe 1413528Youngzsoft, Inc. 49da9fe8a552fbdea080ec0eaa306641 
18015200316c973d258cb4d6ec0c76be3f6a0453c207df3cc11f8d1cb465cefdcd77fee50116d3d2c8820794f33e9.exe 934912断魂数据0, 0, 8, 446dddc5b26ada5eb045adb474e7984c2 
17463601185e70482f9ac289b1e7b5fe94a70a8e6bfd72bf795b368806e5bb2b693b0f80b8e233783692ae3c05535.exe 234496  f1d709455a895c937a519c1990eeb67f 
1d294e957d5f2df9e928611ffc0dd834.vir.exe 828894  1d294e957d5f2df9e928611ffc0dd834 
3c24be23d6bb1f5a0f5c0dafcfb94d09.vir.exe 1048576  3c24be23d6bb1f5a0f5c0dafcfb94d09 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware