Home / Spyware Encyclopedia / Proxy.Lager.f << Back

Recommendation to Automatically remove Proxy.Lager.f


Our products can remove Proxy.Lager.f and thousands of other Virus and Spyware automatically and instantly.

Proxy.Lager.f Details


  • Category Proxy
  • Discovered 4/18/2011 6:22:21 AM
  • Modified 8/11/2023 3:36:00 PM
  • Threat Level Low
  • Category Description
    Proxy Trojan turns the victim's computer into a proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use system to launch malicious attacks against other networks.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
trojan-proxy.win32.lager.f-3cff04fa5f3b1a87005bad94ee41a0975c9c8622.exe 48640  441433464a81178a717c274eb3c76c1114/07/2023
trojan-proxy.win32.lager.f-8c038dca15fc7cea35740e3497e755e332926b70.exe 48640  a37c07e20892e717c893910cd7b8b97614/07/2023
080b3eb4a2816b34f02633d59db4139d.exe 113696  080b3eb4a2816b34f02633d59db4139d03/09/2020
b026719d46a60409e05f8904b8528d03b1c6c0486c9f2097d87409a9eb460925.exe 112672  723610f3b7c6bbca2fada4a878b15c8a 
sysvcs.exe 534398  07c8e7dcdeda91828545836bb9ceca7811/08/2023
trojan-proxy.win32.lager.f.exe 534398  07c8e7dcdeda91828545836bb9ceca7811/08/2023
trojan-proxy.win32.lager.f-0e420bd996c20f2e8e7023bf45bcccbde4fb3cb4.exe 112672  6c9c5980c3b375075a831d06d8dcbe4f08/08/2023
trojan-proxy.win32.lager.f-972bfb4d4091e95ee356503864cac0c41965a5d8.exe 113696  4a5da6af42706cb8482d3948a73eff5808/08/2023
1429d8ef7d38bf483838c326a48c16bb38530089.bin.exe 54386  378c53b013414ca1d5b055c8f954053a11/04/2023
f3254cc0f1b8db54a348b5570753a444.exe 48640  f3254cc0f1b8db54a348b5570753a44426/06/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware