Home / Spyware Encyclopedia / Proxy.CCProxy.x << Back

Recommendation to Automatically remove Proxy.CCProxy.x


Our products can remove Proxy.CCProxy.x and thousands of other Virus and Spyware automatically and instantly.

Proxy.CCProxy.x Details


  • Category Proxy
  • Discovered 7/3/2015 3:28:18 AM
  • Modified 10/17/2023 11:35:54 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
58d501206b76a0d0c57698d8973e800f.vxe.exe 412053Microsoft Corporation5.2.3790.395958d501206b76a0d0c57698d8973e800f 
45faa9342a7ba44daeecbd3aaaa998a6.vXE.exe 780295 6, 3, 0, 145faa9342a7ba44daeecbd3aaaa998a6 
e20fc87d8499e8034a0ebd8e9b02db3d.exe 301056  e20fc87d8499e8034a0ebd8e9b02db3d 
8dc6a2204dc3aeb659791435071c79a5.exe 299008  8dc6a2204dc3aeb659791435071c79a5 
902d13ca00c7d85031d9248c3b02e4c375994fbbd50343db2879488a761ec60817392f6f915e974d2dc508a812c34b7ee4e.exe 1827328 6, 3, 0, 10fd3f665b8d8bf332889249dd4fa9a90 
e7fb44536b8b115ad348e21b74dcf1bcab41cdc6.bin.exe 2319982TENCENT1.0.256.30cdf67993a86a6ddb3812d0708bea6e9 
25dc3b748e9dd6d6e5939917fe70038cdbf48bf9.bin.exe 2294058TENCENT1.0.256.12079da6a4304b1a4ba8f845e7535864bc0 
04b6764821751f75183117d21e18fde4.exe 456476 6, 3, 0, 104b6764821751f75183117d21e18fde4 
a10a05c52839c2e56d796f526da9da552dfd7b57.bin.exe 2319696TENCENT1.0.256.334f3e5c72293894b4d86120a9942d5ed 
d80b0405e3727452a250d98bd3cd6c962387bb58.bin.exe 1590028TENCENT1.0.256.120501c2758312dee82bc4da07d1326c7fc 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware