Click on screenshot to zoom
Danger level 8
Type: Trojans
Common infection symptoms:
  • Connects to the internet without permission
  • Installs itself without permissions
  • Slow Computer
  • Slow internet connection
  • System crashes


Where does it hide? How does it look? What does it do? These are the questions you may want to ask when Backdoor.Morix.B enters your computer and starts corrupting the operating Windows system. Also known as Backdoor:Win32/Morix.B, this backdoor Trojan has been developed to ease the infiltration of other malicious computer infections. If cyber criminals manage to detect a security loophole through which malignant files can be dropped onto the computer, you may be kept unaware about the existence of this PC infection. Regardless, once you notice disturbing symptoms, you should rush to delete Backdoor.Morix.B or any other infection running within the system.

Do you know what a backdoor Trojan is? This computer infection is mainly used to expose system vulnerabilities and invite secondary infections. It can be used to perform DDoS attacks and allow schemers to download malware dropping Trojans. Moreover, it can also connect your PC to remoter servers, through which schemers can manage the malicious program and its operations. If you do not remove Backdoor.Morix.B timely, it can delete authentic system files, reconfigure security systems, record keystrokes and drop files. These illegal actions can be performed by such components as V2011.exe, 1e1de022.dll (3.26M), found under %WINDIR%, or 2ab5854fc3cfe98b93ecafacb36d5c5f.exe, found under %APPDATA%.

Besides files with system generated names, you should also beware of the two which copy the names of original components. One of them is svchsot.exe and you can delete it from C:\Documents and Settings\User\Windows\84DA49DE\svchsot.exe. This file can steal your login data and use personal email accounts to send mass spam email, hijack the Windows Registry and use DNS to obtain IP address. The second malignant component is Boonty.exe (%COMMONPROGRAMFILES%), which originally is a product of Boonty Games. Regardless, the illegitimate version needs to be removed as it can hijack the virtual memory, record keystrokes and mouse-clicks or steal information from your phone book. So, how should you delete these malicious files?

Even if Backdoor.Morix.B is not a rootkit infection, it may be extremely difficult to have it removed; especially if more malicious programs have been downloaded already. Manual removal is a task for only highly experienced Windows users, and if you are not sure about your skills – you should entrust legal, automatic malware detection and removal software. SpyHunter is the right tool for you, as it can download all malignant infections and guard you and your Windows system against malware attacks. Click on the button below, download the program and malicious files will be deleted in minutes.

Download Spyware Removal Tool to Remove* Backdoor.Morix.B
  • Quick & tested solution for Backdoor.Morix.B removal.
  • 100% Free Scan for Windows

How to manually remove Backdoor.Morix.B

Files associated with Backdoor.Morix.B infection:


Backdoor.Morix.B DLL's to remove:


Backdoor.Morix.B processes to kill:


Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.