Backdoor.Proxyier
Posted: March 14, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 6/10 |
---|---|
Infected PCs: | 84 |
First Seen: | December 21, 2011 |
---|---|
OS(es) Affected: | Windows |
Backdoor.Proxyier is a family of backdoor Trojans that use advanced techniques to install other PC threats and allow criminals to have a restrained amount of control over your computer. Backdoor.Proxyier Trojans are specific to Windows, but may attack either 32-bit or 64-bit environments, and can inject their code into innocent processes to avoid detection. SpywareRemove.com malware researchers consider the most likely Backdoor.Proxyier payloads to consist of rootkit installations and browser hijacks, but Backdoor.Proxyier Trojans may also be reconfigured for other purposes. Since Backdoor.Proxyier is distributed via compromised and malicious music sites, you may want to be cautious around such sites that recommend that you install unusual security software, which is a confirmed method of Backdoor.Proxyier distribution.
Why Checking That Tune Before You Click It Might Save Your PC from Backdoor.Proxyier
Backdoor.Proxyier, as a family of diverse backdoor Trojans, can be distributed in many ways, but the most widely reported propagation method for Backdoor.Proxyier uses compromised music sites like hamara-sangeet.com, a domain that's devoted to Indian e-radio. Typical Backdoor.Proxyier attacks then redirect you to an unrelated site that uses fake warning messages about infections on your PC as encouragement for installing a vaguely-described security program. SpywareRemove.com malware analysts also note that this method of propagation is common for scamware and PC threats that install rogue anti-malware products, in addition to Backdoor.Proxyier distribution.
Backdoor.Proxyier can be difficult to detect, since Backdoor.Proxyier variants have been known to inject their code into Windows processes or use other techniques to avoid being seen. Accordingly, SpywareRemove.com malware research team recommends that you use any available anti-malware program to analyze your PC if you suspect the presence of a Backdoor.Proxyier infection. However, you may also be able to note minor discrepancies in memory usage (via Task Manager and similar memory-monitoring applications) to help confirm your suspicion of a possible Backdoor.Proxyier threat.
All the Woe That Backdoor.Proxyier's Climax Can Wreak
The consequences of a Backdoor.Proxyier attack can vary, both due to the variant of Backdoor.Proxyier that's installed as well as any instructions that Backdoor.Proxyier may receive from its command server. However, Backdoor.Proxyier always has the capability to allow criminals to access your PC, and common details of such attacks can often include the following:
- Some variants, such as Trojan.Win32.Proxyier.qk, may use DNS changes to redirect your browser to hostile websites.
- Others, like Backdoor.Win32.Proxyier.ain, are able to hook themselves into .dll files to replace normal links with links to undesirable sites. This can include falsifying Google Analytics data or changing advertisement links.
- All types of Backdoor.Proxyier Trojans are also able to install additional PC threats, including spyware, fake security programs, rootkits and other Trojans.
As a serious and sophisticated danger to your PC, Backdoor.Proxyier should always be deleted as soon as you detect its existence on your computer. SpywareRemove.com malware experts strongly encourage the usage of competent anti-malware products for removing Backdoor.Proxyier, since both Backdoor.Proxyier and PC threats that Backdoor.Proxyier installs have been known to evade mundane detection and removal methods.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:_ex-08.exe
File name: _ex-08.exeSize: 449.53 KB (449536 bytes)
MD5: 93a9be3b2b01a0b16a240ce28c508be7
Detection count: 68
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2012
_ex-08.exe
File name: _ex-08.exeSize: 456.7 KB (456704 bytes)
MD5: d6a48d531d8b4a23f4f95d724be561c7
Detection count: 67
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2012
_ex-08.exe
File name: _ex-08.exeSize: 646.14 KB (646144 bytes)
MD5: e5ba68e3ea1e15b7952e8ff8ea6f8e04
Detection count: 66
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2012
file.exe
File name: file.exeSize: 463.87 KB (463877 bytes)
MD5: 43a6067f34419267d3086206683ada7a
Detection count: 64
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2012
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.