Backdoor.Protos

Backdoor.Protos Description

Backdoor.Protos stands for a backdoor trojan named Protos that is deployed in spam emails, low-quality software centers and PC gaming forums. The Protos backdoor trojan can record the hard disk unique ID, account details and open a backdoor to your system for attackers to use. The operators of the Protos backdoor trojan can use it to introduce other malware on your PC such as CashU, Craagle and Bizex. Computer users that are infected with the Protos backdoor trojan may experience slower performance and system errors. Security experts note that the Protos backdoor trojan creates a mutex named CWSPROT20 on the machine to prevent other copies of itself running. Also, the Protos malware attaches code to the Internet Explorer to execute its operations. Therefore, your Internet bandwidth could be limited, and you have troubles loading videos on websites like YouTube. The Protos backdoor trojan might host its executables in the ApplicationData folder and insert malicious DLLs in the system32 folder under the Windows directory. Needless to say, the Protos backdoor trojan may grant attackers full control over your computer. Your programs could be corrupted and altered to send your input to third parties. The operators of the Protos malware may choose to install ransomware like CryptoLocker and KRIPTOVOR to earn affiliate revenue. Computer users infected with the Protos backdoor trojan may want to install a reliable anti-malware solution to secure and clean their PC.

Technical Information

File System Details

Backdoor.Protos creates the following file(s):
# File Name Size MD5 Detection Count
1 C:\Users\user\Desktop\file.exe 515,744 ff4f72316388ad2f52fe6f0b2df6e5a4 1

Registry Details

Backdoor.Protos creates the following registry entry or registry entries:
Regexp file mask
%APPDATA%\Microsoft\Windows\Templates\side.exe

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.


HTML is not allowed.