Home / Spyware Encyclopedia / Proxy.CCProxy.nv << Back

Recommendation to Automatically remove Proxy.CCProxy.nv


Our products can remove Proxy.CCProxy.nv and thousands of other Virus and Spyware automatically and instantly.

Proxy.CCProxy.nv Details


  • Category Proxy
  • Discovered 9/3/2016 11:48:22 PM
  • Modified 9/7/2016 6:07:10 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e3027ac2e150d49c162640a81dbeb2e60501da01.bin.exe 1146751  b11c6c30ff8888450cd39c38fa6b9951 
193734090666891d1c34b712f98ccefefdb2389d8ddfb053f5ba070b742be82e4fb679cb73c8b374ea31bbe907644.exe 1145581  69ae85be1c5e980f1e68ba1d2f526aff 
7cd688031dfd7796405d420588fb58d0.exe 1146684  7cd688031dfd7796405d420588fb58d0 
c58aaf1bd688aa18409fb069f734043310ff5343a487ef527bdfd7a2bd2a5b85.exe 1145624  ec4843b428b007dd602ecfa3f8f6cdac 
aa337a03e14be3821e76b930435d23dc.exe 1145679  aa337a03e14be3821e76b930435d23dc 
121811078107fa40e542bb16b728a414919b46cea6898123b0ed2205ea4b629342e97c08cae96455383f314303e50.exe 1147102  bf6ddf57f841c32aa4ddd860167a2fcc 
135909057803ba20651a8a9586fc173f0af269e065c84983cc9dedfc65698fdcad7d60ddf3f080a2ce9409a8ca1c2.exe 1147298  f732dea9d537512ef9b71aa89faaffcd 
c79749ef380d557d9d165d0f23be1219.exe 1147242  c79749ef380d557d9d165d0f23be1219 
19001006711c55383f7f3669473024b1b37a0094382e826c17e8cb0d6e6ede0b99afdf54c292d3131b7d4264dc59d.exe 1145682  fafa2c34eebd08ece760a727345fb794 
449a7f2ae385e3a74ef641caba8d55f6.exe 1145636  449a7f2ae385e3a74ef641caba8d55f6 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware