Backdoor.Protos
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 60 % (Medium) |
Infected Computers: | 10 |
First Seen: | April 10, 2015 |
Last Seen: | July 10, 2018 |
OS(es) Affected: | Windows |
Backdoor.Protos stands for a backdoor trojan named Protos that is deployed in spam emails, low-quality software centers and PC gaming forums. The Protos backdoor trojan can record the hard disk unique ID, account details and open a backdoor to your system for attackers to use. The operators of the Protos backdoor trojan can use it to introduce other malware on your PC such as CashU, Craagle and Bizex. Computer users that are infected with the Protos backdoor trojan may experience slower performance and system errors. Security experts note that the Protos backdoor trojan creates a mutex named CWSPROT20 on the machine to prevent other copies of itself running. Also, the Protos malware attaches code to the Internet Explorer to execute its operations. Therefore, your Internet bandwidth could be limited, and you have troubles loading videos on websites like YouTube. The Protos backdoor trojan might host its executables in the ApplicationData folder and insert malicious DLLs in the system32 folder under the Windows directory. Needless to say, the Protos backdoor trojan may grant attackers full control over your computer. Your programs could be corrupted and altered to send your input to third parties. The operators of the Protos malware may choose to install ransomware like CryptoLocker and KRIPTOVOR to earn affiliate revenue. Computer users infected with the Protos backdoor trojan may want to install a reliable anti-malware solution to secure and clean their PC.
Table of Contents
SpyHunter Detects & Remove Backdoor.Protos
File System Details
# | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|---|
1. | file.exe | ff4f72316388ad2f52fe6f0b2df6e5a4 | 1 |
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.