Home / Spyware Encyclopedia / Proxy.Lager.bu << Back

Recommendation to Automatically remove Proxy.Lager.bu


Our products can remove Proxy.Lager.bu and thousands of other Virus and Spyware automatically and instantly.

Proxy.Lager.bu Details


  • Category Proxy
  • Discovered 3/31/2011 7:24:01 PM
  • Modified 8/11/2023 3:36:02 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
trojan-proxy.win32.lager.bu.exe 51113  8de8bf7a1408441db4a48b47608fcd86 
80a55671d4659d0b381568b5b1d07357.exe 51116  80a55671d4659d0b381568b5b1d07357 
64cec3ad6611e19f4db8edc49cf3324a3622c3a944ab10dc26979fc8a41e5434.exe 51124  4e8452d5641908eaf4a979ac812c8bdf 
82ad6476681d58ce25ad3375841fbb9f.exe 49184  82ad6476681d58ce25ad3375841fbb9f 
10065303435f6e10736cd28698db93117eb8be65bd24b8c6fd4b0da8cb8688e83cb00b20f59658f908efcc6aaf126.exe 48874  34958940320a509c10c9f02e2a70d8dd 
5bc2981d888658d4336d01b909d815ec.exe 63971  5bc2981d888658d4336d01b909d815ec 
a7a5cc6e02b281b67d41bf0bd28dc700.vir.exe 51104  a7a5cc6e02b281b67d41bf0bd28dc700 
96ae8ca56b7655b4bd97159278d042946b3ed458d31c2621ee348119be513b19.exe 48128  6bb141f1d84d17a4a19a1437809d8fe7 
trojan-proxy.win32.lager.bu-30cb99b766b906909f54e3711d7d976b0153f6cd.exe 50688  6cdf441d136cee630b3808be73ad024d14/07/2023
trojan-proxy.win32.lager.bu-4fca4ddcd278ddb769e2ec04c9fb4eedbc818001.exe 63966  bae51a10f438976cb029cefc2a5d4d7214/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware