Home Malware Programs Backdoors Backdoor.Proxyier


Posted: March 14, 2012

Threat Metric

Threat Level: 6/10
Infected PCs: 84
First Seen: December 21, 2011
OS(es) Affected: Windows

Backdoor.Proxyier is a family of backdoor Trojans that use advanced techniques to install other PC threats and allow criminals to have a restrained amount of control over your computer. Backdoor.Proxyier Trojans are specific to Windows, but may attack either 32-bit or 64-bit environments, and can inject their code into innocent processes to avoid detection. SpywareRemove.com malware researchers consider the most likely Backdoor.Proxyier payloads to consist of rootkit installations and browser hijacks, but Backdoor.Proxyier Trojans may also be reconfigured for other purposes. Since Backdoor.Proxyier is distributed via compromised and malicious music sites, you may want to be cautious around such sites that recommend that you install unusual security software, which is a confirmed method of Backdoor.Proxyier distribution.

Why Checking That Tune Before You Click It Might Save Your PC from Backdoor.Proxyier

Backdoor.Proxyier, as a family of diverse backdoor Trojans, can be distributed in many ways, but the most widely reported propagation method for Backdoor.Proxyier uses compromised music sites like hamara-sangeet.com, a domain that's devoted to Indian e-radio. Typical Backdoor.Proxyier attacks then redirect you to an unrelated site that uses fake warning messages about infections on your PC as encouragement for installing a vaguely-described security program. SpywareRemove.com malware analysts also note that this method of propagation is common for scamware and PC threats that install rogue anti-malware products, in addition to Backdoor.Proxyier distribution.

Backdoor.Proxyier can be difficult to detect, since Backdoor.Proxyier variants have been known to inject their code into Windows processes or use other techniques to avoid being seen. Accordingly, SpywareRemove.com malware research team recommends that you use any available anti-malware program to analyze your PC if you suspect the presence of a Backdoor.Proxyier infection. However, you may also be able to note minor discrepancies in memory usage (via Task Manager and similar memory-monitoring applications) to help confirm your suspicion of a possible Backdoor.Proxyier threat.

All the Woe That Backdoor.Proxyier's Climax Can Wreak

The consequences of a Backdoor.Proxyier attack can vary, both due to the variant of Backdoor.Proxyier that's installed as well as any instructions that Backdoor.Proxyier may receive from its command server. However, Backdoor.Proxyier always has the capability to allow criminals to access your PC, and common details of such attacks can often include the following:

  • Some variants, such as Trojan.Win32.Proxyier.qk, may use DNS changes to redirect your browser to hostile websites.
  • Others, like Backdoor.Win32.Proxyier.ain, are able to hook themselves into .dll files to replace normal links with links to undesirable sites. This can include falsifying Google Analytics data or changing advertisement links.
  • All types of Backdoor.Proxyier Trojans are also able to install additional PC threats, including spyware, fake security programs, rootkits and other Trojans.

As a serious and sophisticated danger to your PC, Backdoor.Proxyier should always be deleted as soon as you detect its existence on your computer. SpywareRemove.com malware experts strongly encourage the usage of competent anti-malware products for removing Backdoor.Proxyier, since both Backdoor.Proxyier and PC threats that Backdoor.Proxyier installs have been known to evade mundane detection and removal methods.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Backdoor.Proxyier may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria .

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:

_ex-08.exe File name: _ex-08.exe
Size: 646.14 KB (646144 bytes)
MD5: e5ba68e3ea1e15b7952e8ff8ea6f8e04
Detection count: 66
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2012
file.exe File name: file.exe
Size: 463.87 KB (463877 bytes)
MD5: 43a6067f34419267d3086206683ada7a
Detection count: 64
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2012

More files