Home / Spyware Encyclopedia / Proxy.CCProxy.x << Back

Recommendation to Automatically remove Proxy.CCProxy.x


Our products can remove Proxy.CCProxy.x and thousands of other Virus and Spyware automatically and instantly.

Proxy.CCProxy.x Details


  • Category Proxy
  • Discovered 7/3/2015 3:28:18 AM
  • Modified 10/17/2023 11:35:54 AM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
902d13ca00c7d85031d9248c3b02e4c375994fbbd50343db2879488a761ec60817392f6f915e974d2dc508a812c34b7ee4e.exe 1827328 6, 3, 0, 10fd3f665b8d8bf332889249dd4fa9a90 
04b6764821751f75183117d21e18fde4.exe 456476 6, 3, 0, 104b6764821751f75183117d21e18fde4 
aed05902d7a65f345926576ba278b345e2823d38.bin.exe 2320021TENCENT1.0.256.3e985c771723634aee0bbb6a99a02fb2e 
a10a05c52839c2e56d796f526da9da552dfd7b57.bin.exe 2319696TENCENT1.0.256.334f3e5c72293894b4d86120a9942d5ed 
7a7923bb71afd6f8a805b332700fcfcb60ddaae12b0aecce91f4119b8f969ffb84ae5b5a029620423370a01d8c78d9bac68.exe 1555858TENCENT1.0.255.1207613b23404eb2da35698185e71cc5970 
ae760e7d289ba9ee82a84023a0dbf996f8a3b008.bin.exe 1590100TENCENT1.0.256.120b3a82c42c8905ca419e1b291c0349ce3 
88332d5194f09312a2b9fd94e6dc1c7efa6806b2.bin.exe 1543927TENCENT1.0.256.1205615ddeea491cd8f8ffb2ab010b4ca94 
7205c98c7c53c58e8763995ff2abc50cf3d07228.bin.exe 1544080TENCENT1.0.256.1204fc5be0ba6b15c3ddcac7f48c41ee392 
a8f2024c442978f4f788ef7ef442e681.exe 1544040TENCENT1.0.256.120a8f2024c442978f4f788ef7ef442e681 
cf1e07db577dd7b93398c3a0e6a8064ec00211156cb8ce3905d04f7ca886f082be2768be3c5cf60c2b6e37a2e4c3ce0473c.exe 1544057TENCENT1.0.256.120f06c03cc339453781999f5a7f0f1370f 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware