Home / Spyware Encyclopedia / Proxy.Lager.dp << Back

Recommendation to Automatically remove Proxy.Lager.dp


Our products can remove Proxy.Lager.dp and thousands of other Virus and Spyware automatically and instantly.

Proxy.Lager.dp Details


  • Category Proxy
  • Discovered 8/3/2023 3:59:31 PM
  • Modified 8/3/2023 5:34:47 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
0196cd6a9f018bf33849bbbd9da0f4db.exe 6275  0196cd6a9f018bf33849bbbd9da0f4db 
a2b218927cb5a707495efecd99b5b06f66ee8d48880dde5067002408faebc7a9 51935  012c1be6ac3e35cf9112366028f0f5ac 
9b8720c2679748bf9a481b7f3d4315c846f145dbec49094be33acc46cd748203.exe 6275  15f3cdb61299d2090ccc13d6b1d035e9 
60fd89e39d5c0404e783a73136d11cc0ffa4cb88082dd301372913c7a6202b0f.exe 54403  0996a123cdbcba65c8400790f0aa9fef 
bab631b46dcdb8c5cd5df8e80d73cfe2.exe 48259  bab631b46dcdb8c5cd5df8e80d73cfe2 
1490fe22d36a3fc9f5aee4499cd48a66.exe 54403  1490fe22d36a3fc9f5aee4499cd48a66 
e97aeb27e7fde22818df82784c3fd0bad78bb898857fa87bac4c1be50d774f22.exe 6275  10603b910c123adef6cfb51e4d3681ad 
430f8c4cb0a704068c7127d4fef7195845376da2e9899b0e38ee4e1bc07d0949.exe 54403  46460c0ea170f3f81c82f93752666e43 
269ccea4de9388e6f517ab1cad3893918c6aca9a3d9dba12a4becb07a9d5e12d.exe 6275  20f2329bbca9b71a10c947a0b6887239 
144fc642cfa406a8284d7f052d5ed38b9178f827519aae87e5066b09a2b92df8.exe 6275  101484c05ee2e9667853a0c63b7e0937 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware