Main Menu
Contact Us

Backdoor.Win32.Prosiak.070 Backdoor Information

Name: Backdoor.Win32.Prosiak.070
Category: Backdoor
Advice: Remove
Risk: High Risk High risk threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction. May open up communication ports, use polymorphic tactics, stealth installations, and/or anti-spy counter measures. May use a security flaw in the operating system to gain access to your computer.

Signatures: process: prosiak.exe: MD5 Hash: 8b07290977914b1899c..
Type: Backdoor - A Trojan software is any software on a user's computer that the user is not aware or intentionally installed. Most Trojan software is designed to perform some sort of actions that could jeopardize the user's security or privacy.

Top Backdoor Visited Pages:
Unicorn - 268 visits
Blue Eye IRC Bot V 2.0 - 208 visits
SkatanBot - Alias: Backdoor.VB.kl - 138 visits
Backdoor:Win32/Lamebot.A - 127 visits
Backdoor.Perl.AEI.16 - 107 visits
RBot.sysdat - Alias: Backdoor:Win32/Rbot!E89C - 107 visits
Trojan.Backdoor.Darkmoon - Alias: Backdoor:Win32/Darkmoon.AZ - 105 visits - Alias: RVP - 103 visits
Trojan.Fakespy.A - Alias: Trojan.Zlob.B - 101 visits
BackDoor.Galapop.A - Alias: Trojan.Abwiz.D (Symantec), Galapoper (Mcafee) - 100 visits

Random Backdoor Pages:
Wootbot.snapple - Alias: Backdoor:Win32/Wootbot.AC
RBot.Wind0wsSharing - Alias: Wind0ws Sharing
DSocks4 - Alias: Backdoor.Dsocks.10, Backdoor.Dsocks.10, Proxy-DSocks, Proxy-DSocks.cfg, DSocks4 1.0
Trojan.ntddetect - Alias: Troj/Agent-CU
Background Intelligent Transfer Service - Alias: Beat IT Security, BITS


2006-2008 - Privacy Policy