Home / Spyware Encyclopedia / Proxy.Lager.dp << Back

Recommendation to Automatically remove Proxy.Lager.dp


Our products can remove Proxy.Lager.dp and thousands of other Virus and Spyware automatically and instantly.

Proxy.Lager.dp Details


  • Category Proxy
  • Discovered 8/3/2023 3:59:31 PM
  • Modified 8/3/2023 5:34:47 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
60fd89e39d5c0404e783a73136d11cc0ffa4cb88082dd301372913c7a6202b0f.exe 54403  0996a123cdbcba65c8400790f0aa9fef 
1490fe22d36a3fc9f5aee4499cd48a66.exe 54403  1490fe22d36a3fc9f5aee4499cd48a66 
0112dec883aadf2134e76a4590736a38.exe 32387  0112dec883aadf2134e76a4590736a38 
269ccea4de9388e6f517ab1cad3893918c6aca9a3d9dba12a4becb07a9d5e12d.exe 6275  20f2329bbca9b71a10c947a0b6887239 
144fc642cfa406a8284d7f052d5ed38b9178f827519aae87e5066b09a2b92df8.exe 6275  101484c05ee2e9667853a0c63b7e0937 
69e04591841eb2e8210f791483c9e6f46401100cf845a1ae03012b5bc80544ab.exe 48259  256662fa54ea6016947a24ab63a596ff 
698ca4e71c9bf1e7bc97e29f2a6283b4c204552b820da5ad1d93b5eb3688b66c_lnwin.exe.exe 6275  6672823ac8f76b21bd1cc6df5a0e532d 
bacc88ae4c3099193f534a8c4442bbf16fe27262cbfad2aa673d0e65381980e2.exe 6275  2e1cad0f29d773683508c6a45b32d27f 
d1932c85d1bee3907baa48fcb3911b030951e23bb07302b30d6e8e18bd3a3797.exe 48259  400abb5182eb623862323468e4827684 
e10c87cd25651b4a789c92cf45a6e864.exe 6275  e10c87cd25651b4a789c92cf45a6e864 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware