Home / Spyware Encyclopedia / Proxy.Lager.bu << Back

Recommendation to Automatically remove Proxy.Lager.bu


Our products can remove Proxy.Lager.bu and thousands of other Virus and Spyware automatically and instantly.

Proxy.Lager.bu Details


  • Category Proxy
  • Discovered 3/31/2011 7:24:01 PM
  • Modified 8/11/2023 3:36:02 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
trojan-proxy.win32.lager.bu.exe 51113  8de8bf7a1408441db4a48b47608fcd86 
b84193b659c1485433ef9901512cd622bfa2a64ef832d479fbec0adc4691b09d.exe 51586  0f592675f426724368b1ad0874800958 
64cec3ad6611e19f4db8edc49cf3324a3622c3a944ab10dc26979fc8a41e5434.exe 51124  4e8452d5641908eaf4a979ac812c8bdf 
d3f98b0fc21e7ec00c16dfc91b40d709.exe 51601  d3f98b0fc21e7ec00c16dfc91b40d709 
82ad6476681d58ce25ad3375841fbb9f.exe 49184  82ad6476681d58ce25ad3375841fbb9f 
10065303435f6e10736cd28698db93117eb8be65bd24b8c6fd4b0da8cb8688e83cb00b20f59658f908efcc6aaf126.exe 48874  34958940320a509c10c9f02e2a70d8dd 
5f12c353e6d521647e95684bee847fa9997ce96546d7f2a80750faa54794b0d0.exe 65536  231ca67cfacfe418ab0da337aa9deafa 
8b31ccbf0f6f2fd8684afd916d5695c1.exe 51107  8b31ccbf0f6f2fd8684afd916d5695c1 
a7a5cc6e02b281b67d41bf0bd28dc700.vir.exe 51104  a7a5cc6e02b281b67d41bf0bd28dc700 
79157f6cd471ed2a7480cd2d5468b789.vir.exe 48640  79157f6cd471ed2a7480cd2d5468b789 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware