Backdoor.Win32.Poison.aec
Posted: September 12, 2011
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 6/10 |
---|---|
Infected PCs: | 52 |
First Seen: | September 12, 2011 |
---|---|
OS(es) Affected: | Windows |
Just as this malicious security threat's name infers, Backdoor.Win32.Poison.aec poses a serious, high-risk security threat that is, literally, POISON to any computer system Backdoor.Win32.Poison.aec comes across.
Backdoor.Win32.Poison.aec has been identified and classified by SpywareRemove.com security analysts, as a malicious Trojan horse that seeks to secretively and deceptively infiltrate and infect targeted computer systems, without first receiving any kind of user authorization.
Backdoor.Win32.Poison.aec is a horrible PC infection that is most known for Backdoor.Win32.Poison.aec's expertise in opening up serious and harmful security vulnerabilities, normally referred to as backdoors, on the computer systems that this malicious threat successfully manages to infect. By possessing a particular penchant for severely compromising the integrity of infected computer systems' security environment, by opening up vulnerable backdoors, Backdoor.Win32.Poison.aec is able to easily enable Backdoor.Win32.Poison.aec's hacker creator remote access to the systems Backdoor.Win32.Poison.aec compromises.
By opening up malignant, evil backdoors that allow seditious hackers remote access to compromised systems, Backdoor.Win32.Poison.aec works as a remote administration tool that will attempt to take over control of compromised computer systems.
Additionally, by being intentionally created and designed to be a malevolent backdoor Trojan, Backdoor.Win32.Poison.aec is able to drop all kinds of malicious, corrupt files onto infected computer systems. Even worse, many times, the infected files that these particular types of corrupt programs are notorious for injecting onto compromised computer systems are actually other vicious computer security threats; for instance, Backdoor.Win32.Poison.aec may work to spread additional malware, adware, spyware, worms, Trojans, and etc. onto the computer systems Backdoor.Win32.Poison.aec successfully infects.
This particular Trojan is known to operate and propagate Backdoor.Win32.Poison.aec's nasty security threat under a variety of alternate aliases; a few of the more common and well-known of Backdoor.Win32.Poison.aec are:
– Backdoor:Win32.Poison.M [Microsoft]
– Mal/Poison-A [Sophos]
– BackDoor-DKI.gen.e [McAfee]
– Backdoor.Win32.Poison.aec [Kaspersky Lab]
– Spyware.Ardakey [Symantec]
– Spyware.Ardakey!rem [PCTools]
– Virus.Win32.Poison [Ikarus]
– Win-Trojan/Poison.14080 [AhnLab]
Characteristics of this Nasty Trojan
Once this nasty Trojan horse has successfully breached a targeted computer system's security defenses in order to latch itself to the infiltrated system, Backdoor.Win32.Poison.aec will be able to begin initiating all kinds of terrible, worry-inducing, malicious operations and processes on infected computer systems. If your system has been infected by Backdoor.Win32.Poison.aec, SpywareRemove.com security analysts have reported that Backdoor.Win32.Poison.aec will work to change a variety of things on your computer system, without your authorization.
In other words, Backdoor.Win32.Poison.aec will work to change quietely a variety of system settings, web browser settings and etc. on your system, without ever even requesting your permission to do so. Just like Backdoor.Win32.Poison.aec's process of infecting targeted computer systems is done in absolute secret, Backdoor.Win32.Poison.aec's penchant for altering a myriad of system settings on compromised systems – is completed in utter silence.
Furthermore, Backdoor.Win32.Poison.aec is capable of continuously running in the background of infected computer systems,for long periods of time, without ever giving away Backdoor.Win32.Poison.aec's malicious presence to the compromised systems' users. This means that your system can be infected by Backdoor.Win32.Poison.aec for a long period of time, without you ever being aware of Backdoor.Win32.Poison.aec's presence on your system, which makes successfully detecting and completely removing this particular Trojan a difficult feat.
SpywareRemove.com security analysts strongly recommend that you procure a good, safe and reliable complex-malware removal tool, to rid your system completely of Backdoor.Win32.Poison.aec, before Backdoor.Win32.Poison.aec is able to wreck serious, irreversible damage on your system.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%Documents and Settings%\[UserName]\Start Menu\Update.lnk
File name: %Documents and Settings%\[UserName]\Start Menu\Update.lnkFile type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%PROGRAM_FILES%\ backdoor.win32.poison.aec\backdoor.win32.poison.aec
File name: %PROGRAM_FILES%\ backdoor.win32.poison.aec\backdoor.win32.poison.aecMime Type: unknown/aec
Group: Malware file
%UserProfile%\Application Data\PAV
File name: %UserProfile%\Application Data\PAVGroup: Malware file
Registry Modifications
HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SOFTWARE\Paladin AntivirusHKEY_CURRENT_USER\Software\Paladin AntivirusHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System 'DisableTaskMgr' = '1'HKEY_LOCAL_MACHINE\Software\ backdoor.win32.poison.aecHKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon 'Shell' = '%UserProfile%\Application Data\antispy.exe'HKEY_LOCAL_MACHINE \Software \Microsoft \Windows \CurrentVersion \RunServicesOnceHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnceHKEY_CURRENT_USER\ Software\ Microsoft \Windows\ CurrentVersion
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.