Home / Spyware Encyclopedia / Proxy.Lager.bu << Back

Recommendation to Automatically remove Proxy.Lager.bu


Our products can remove Proxy.Lager.bu and thousands of other Virus and Spyware automatically and instantly.

Proxy.Lager.bu Details


  • Category Proxy
  • Discovered 3/31/2011 7:24:01 PM
  • Modified 8/11/2023 3:36:02 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
trojan-proxy.win32.lager.bu.exe 51113  8de8bf7a1408441db4a48b47608fcd86 
0273557_000051639-a69793d8_9c3a6f434ce1333062f985122f7c2a34.exe 51639  9c3a6f434ce1333062f985122f7c2a34 
64cec3ad6611e19f4db8edc49cf3324a3622c3a944ab10dc26979fc8a41e5434.exe 51124  4e8452d5641908eaf4a979ac812c8bdf 
d3f98b0fc21e7ec00c16dfc91b40d709.exe 51601  d3f98b0fc21e7ec00c16dfc91b40d709 
10065303435f6e10736cd28698db93117eb8be65bd24b8c6fd4b0da8cb8688e83cb00b20f59658f908efcc6aaf126.exe 48874  34958940320a509c10c9f02e2a70d8dd 
96ae8ca56b7655b4bd97159278d042946b3ed458d31c2621ee348119be513b19.exe 48128  6bb141f1d84d17a4a19a1437809d8fe7 
5d48e729f0487c0a59469bd438259927.vir.exe 51079  5d48e729f0487c0a59469bd438259927 
79157f6cd471ed2a7480cd2d5468b789.vir.exe 48640  79157f6cd471ed2a7480cd2d5468b789 
trojan-proxy.win32.lager.bu-30cb99b766b906909f54e3711d7d976b0153f6cd.exe 50688  6cdf441d136cee630b3808be73ad024d14/07/2023
trojan-proxy.win32.lager.bu-4fca4ddcd278ddb769e2ec04c9fb4eedbc818001.exe 63966  bae51a10f438976cb029cefc2a5d4d7214/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware