Home / Spyware Encyclopedia / Proxy.Lager.bu << Back

Recommendation to Automatically remove Proxy.Lager.bu


Our products can remove Proxy.Lager.bu and thousands of other Virus and Spyware automatically and instantly.

Proxy.Lager.bu Details


  • Category Proxy
  • Discovered 3/31/2011 7:24:01 PM
  • Modified 8/11/2023 3:36:02 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
trojan-proxy.win32.lager.bu.exe 51113  8de8bf7a1408441db4a48b47608fcd86 
5f12c353e6d521647e95684bee847fa9997ce96546d7f2a80750faa54794b0d0.exe 65536  231ca67cfacfe418ab0da337aa9deafa 
3241bffe296c7bcd69300575fb6ba06f.exe 51094  3241bffe296c7bcd69300575fb6ba06f 
5bc2981d888658d4336d01b909d815ec.exe 63971  5bc2981d888658d4336d01b909d815ec 
06dc0fb9596883635bbccf56a2cc2e6e.vir.exe 51108  06dc0fb9596883635bbccf56a2cc2e6e 
5d48e729f0487c0a59469bd438259927.vir.exe 51079  5d48e729f0487c0a59469bd438259927 
trojan-proxy.win32.lager.bu-30cb99b766b906909f54e3711d7d976b0153f6cd.exe 50688  6cdf441d136cee630b3808be73ad024d14/07/2023
trojan-proxy.win32.lager.bu-4fca4ddcd278ddb769e2ec04c9fb4eedbc818001.exe 63966  bae51a10f438976cb029cefc2a5d4d7214/07/2023
trojan-proxy.win32.lager.bu-58b42e12e24fb636da2f4f3167c9337070a27bbf.exe 51625  690e2ede480f2c2c50c43df165ca4d7c14/07/2023
trojan-proxy.win32.lager.bu-dc795225064df38f82a623f4844a1e3d630a2357.exe 49184  f5103dc26f7b943453fcf8b8d003cedc14/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware