<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
>

<channel>
	<title>Malware Help. Org</title>
	<atom:link href="http://www.malwarehelp.org/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.malwarehelp.org</link>
	<description>PC security, privacy, anonymity and anti-malware Resource</description>
	<lastBuildDate>Mon, 16 Apr 2012 06:56:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.12</generator>
<site xmlns="com-wordpress:feed-additions:1">5963507</site>	<item>
		<title>WindowsRecovery Removal and Analysis</title>
		<link>http://www.malwarehelp.org/windowsrecovery-removal-2011.html</link>
		<comments>http://www.malwarehelp.org/windowsrecovery-removal-2011.html#comments</comments>
		<pubDate>Sat, 30 Apr 2011 05:25:08 +0000</pubDate>
		<dc:creator><![CDATA[Shanmuga]]></dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Rogue Security Software]]></category>
		<category><![CDATA[spyware removal]]></category>
		<category><![CDATA["rogue software"]]></category>
		<category><![CDATA[rogue optimizer]]></category>
		<category><![CDATA[WindowsRecovery]]></category>

		<guid isPermaLink="false">http://www.malwarehelp.org/?p=2857</guid>
		<description><![CDATA[<p>Windows Recovery is a scareware which masquerades as a system performance optimization tool. Belonging to the FakeSysdef trojan family, it comes in many names including HDD Defragmenter, Check Disk, Windows Repair, Windows Restore, Windows SafeMode, Windows Fix Disk and Windows Recovery. It uses a variety of fake warning alerts about non-existent errors in computer hard [...]</p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/windowsrecovery-removal-2011.html">WindowsRecovery Removal and Analysis</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a  class="post_image_link" href="http://www.malwarehelp.org/windowsrecovery-removal-2011.html" title="Permanent link to WindowsRecovery Removal and Analysis"><img class="post_image alignleft" src="https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/windows_recovery_scareware.png?resize=100%2C100" width="100" height="100" alt="Post image for WindowsRecovery Removal and Analysis" data-recalc-dims="1" /></a>
</p><p>Windows Recovery is a scareware which masquerades as a system performance optimization tool. Belonging to the FakeSysdef trojan family, it comes in many names including HDD Defragmenter, Check Disk, Windows Repair, Windows Restore, Windows SafeMode, Windows Fix Disk and Windows Recovery. It uses a variety of fake warning alerts about non-existent errors in computer hard drive, memory and Windows registry to try and cheat gullible users. This rogue optimization software disables Windows Task Manager and Quick launch bar. It also hides All Programs, My Documents and Administrative Tools menu items to confuse and scare the victims.</p>
<p>After continuous bogus error messages, the system is forcibly restarted every few minutes. On restart the rogue software runs a scan automatically and declares finding of multiple errors. The desktop background is blanked and the unclose-able Windows Recovery window hogs the focus. </p>
<div id="attachment_2859" class="wp-caption aligncenter" style="width: 590px">
	<a  href="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/desktop-hijacked-by-windows_recovery.png" class="thickbox no_icon" title="desktop hijacked by windows_recovery"><img data-attachment-id="2859" data-permalink="http://www.malwarehelp.org/windowsrecovery-removal-2011.html/desktop-hijacked-by-windows_recovery/" data-orig-file="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/desktop-hijacked-by-windows_recovery.png?fit=800%2C447" data-orig-size="800,447" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="desktop hijacked by windows_recovery" data-image-description="&lt;p&gt;Desktop hijacked by WindowsRecovery&lt;/p&gt;
" data-medium-file="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/desktop-hijacked-by-windows_recovery.png?fit=300%2C167" data-large-file="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/desktop-hijacked-by-windows_recovery.png?fit=590%2C329" src="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/desktop-hijacked-by-windows_recovery.png?resize=590%2C329" alt="Desktop hijacked by WindowsRecovery" title="desktop hijacked by windows_recovery" width="590" height="329" class="size-large wp-image-2859" srcset="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/desktop-hijacked-by-windows_recovery.png?resize=590%2C329 590w, https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/desktop-hijacked-by-windows_recovery.png?resize=300%2C167 300w, https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/desktop-hijacked-by-windows_recovery.png?w=800 800w" sizes="(max-width: 590px) 100vw, 590px" data-recalc-dims="1" /></a>
	<p class="wp-caption-text">Desktop hijacked by WindowsRecovery</p>
</div>
<p>Scareware like WindowsRecovery are commonly installed when users are redirected to fake online scanner pages, fraudulent porn sites, illegal cracks/warez sites and fake &#8216;video codec required&#8217; pages distributed through out the Web by cyber criminals using blackhat SEO techniques, Spam and Malicious flash advertisements.</p>
<h2>WindowsRecovery Removal (How to remove WindowsRecovery)</h2>
<ol><LI>Boot in to <a  linkindex="63" href="http://www.malwarehelp.org/restart-into-safe-mode-how-to-2010.html">Windows Safe Mode</a> with networking</LI> </p>
<p><LI>Download or from a clean computer download and copy to a removable drive like CD, DVD or USB flash drive. <a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">MalwareBytes&#8217;s Anti-Malware Free edition</a> (mbam-setup.exe) and <a  href="http://support.kaspersky.com/downloads/utils/tdsskiller.exe">TDSSKiller</a> &#8211; often this family of scareware comes bundled with the TDSS rootkit</LI></p>
<p><LI>Right click and save the file <a  href="http://www.malwarehelp.org/downloads/Fakesysdef_unhide.txt">Fakesysdef_unhide.txt</a> to your desktop. <strong>Rename the file from Fakesysdef_unhide.txt to Fakesysdef_unhide.cmd.</strong> This file will help to reveal the files and folders hidden by this rogue optimizer.</LI></p>
<p><LI>Run the TDSSKiller utility to check for the rootkit.</LI></p>
<p><LI>Double-click<b> mbam-setup.exe</b> to start the installation. Proceed with installation following the prompts. Make sure that the following option is checked when you finish the installation: <strong>Update Malwarebytes&#8217; Anti-Malware</strong>.</LI></p>
<p><LI>Once the update is completed, <strong>Launch Malwarebytes&#8217; Anti-Malware</strong> and select <b>Perform full scan</b> in the Scanner tab. When the scan is completed, click &#8220;<b>Show results</b>&#8220;, confirm that all instances of the rogue security software are check-marked and then click &#8220;<b>Remove Selected</b>&#8221; to delete them. If prompted restart immediately to complete the removal process.</LI></p>
<p><LI>To unhide files and folders hidden by this rogue optimizer, double-click and run Fakesysdef_unhide.cmd.</LI></ol>
<p>You should now be clean of this rogue.</p>
<p>The full version of Malwarebytes&#8217; Anti-Malware performs brilliantly against scareware such as WindowsRecovery. The real-time component of the paid version includes dynamic blocking of malicious websites, servers and prevents execution of malware. It would caution you before most rogue security software could install itself. Please consider purchasing the <a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">Malwarebytes&#8217; Anti-Malware Full version</a> for additional protection.</p>
<h2>WindowsRecovery Analysis</h2>
<p>A rogue security software such as WindowsRecovery belongs to a family of software products that call themselves as antivirus, antispyware or registry cleaners and often use deceptive or high pressure sales tactics and deliberate false positives to convince users into buying a license/subscription. They are often repackaged and renamed. They do not actually remove malware instead many of them add more malware of their own. They need to be removed immediately from your system.</p>
<p>This fake software hides the All Programs menu item in the Start menu and My Documents folder by running the following commands in the background:</p>
<ul>
<li>attrib +h &#8220;C:\Documents and Settings\malwarehelp.org\*.*</li>
<li>attrib +h &#8220;C:\Documents and Settings\All Users\Start Menu\*.* &#8221; /s /d</li>
</ul>
<p>The trojan installer was about 552960 bytes in size. This scareware is detected by 27/ 42 (64.3%) of the antivirus engines available at VirusTotal. It is identified as:</p>
<ul>
<li>Win32:FakeSysdef-EG</li>
<li>Trojan.Fakealert.20587</li>
<li>Win32/FakeAV.RQY</li>
<li>Generic FakeAlert.am</li>
<li>Trojan:Win32/FakeSysdef</li>
<li>Win32/Kryptik.MQP</li>
<li>RogueAntiSpyware.UltraDefraggerFraud!rem</li>
<li>TROJ_FAKEAV.SM10</li>
</ul>
<h2>Typical WindowsRecovery Scare Messages</h2>
<blockquote><p>The system has detected a problem with one or more installed IDE/SATA hard disks. It is recommended that your restart the system.</p></blockquote>
<blockquote><p>Critical Error<br />
hard drive critical error. Run a system diagnostic utility to check your hard disk drive for error. Windows can&#8217;t find hard disk space. Hard drive error.</p></blockquote>
<blockquote><p>System Error<br />
An error occurred while reading system files. Run a system diagnostic utility to check your hard disk drive for errors.</p></blockquote>
<blockquote><p>Windows &#8211; Delayed write filed<br />
Windows was unable to save all the data for the file \System32\496A8300. The data has been lost. This error may be caused by a failure of your computer hardware.</p></blockquote>
<blockquote><p>Critical Error<br />
Damaged hard drive clusters detected. Private data is at risk.</p></blockquote>
<blockquote><p>Critical Error<br />
RAM memory usage is critically high. RAM memory failure.</p></blockquote>
<p>Users should not fall for the false alerts of system infection and buy the scareware to &#8216;clean&#8217; the system. If you purchased one by entering your credit card number at a rogue software website, it would be prudent to:</p>
<ul>
<li>Immediately contact the bank that issued the card and dispute the charges.</li>
<li>Request them to not allow any further transaction and cancel the card. You may also request them to issue a new card with a different number.</li>
</ul>
<h2>WindowsRecovery Associated Files and Folders</h2>
<ul>
<li>C:\Documents and Settings\All Users\Application Data\17358644</li>
<li>C:\Documents and Settings\All Users\Application Data\17358644.exe</li>
<li>C:\Documents and Settings\All Users\Application Data\YbUyNeWOvrpYj.exe</li>
<li>C:\Documents and Settings\malwarehelp.org\Desktop\Windows Recovery.lnk</li>
<li>C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\~DF6CF1.tmp</li>
<li>C:\Documents and Settings\malwarehelp.org\Start Menu\Programs\Windows Recovery\Uninstall Windows Recovery.lnk</li>
<li>C:\Documents and Settings\malwarehelp.org\Start Menu\Programs\Windows Recovery\Windows Recovery.lnk</li>
<li>C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\tmp3.tmp</li>
</ul>
<p><i>Some of the file names may be randomly generated. The term malwarehelp.org or malwarehelp in the above entries denotes the name of the Windows user account in the test machine.</i></p>
<h2>WindowsRecovery Associated Registry Values and Keys</h2>
<ul>
<li>HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable=0</li>
<li>HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Hardware Profiles\Current\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable=0</li>
<li>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable=0</li>
<li>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Hardware Profiles\Current\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable=0</li>
</ul>
<ul>
<li>HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\GeneralFlags=0</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures=no</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable=0</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\WarnonBadCertRecving=0</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\CertificateRevocation=0</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallPaper=1</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations\LowRiskFileTypes=/{hq:/s`s:/ogn:/uyu:/dyd:/c`u:/bnl:/ble:/sdf:/lrh:/iul:/iulm:/fhg:/clq:/kqf:/`wh:/lqf:/lqdf:/lnw:/lq2:/l2t:/v`w:/rbs:</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments\SaveZoneInformation=1</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr=1</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\YbUyNeWOvrpYj=C:\Documents and Settings\All Users\Application Data\YbUyNeWOvrpYj.exe</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden</li>
</ul>
<p><i>The term malwarehelp.org or malwarehelp in the above entries denotes the name of the Windows user account in the test machine. Manually editing the registry is NOT recommended.</i></p>
<h2>WindowsRecovery Associated Domains</h2>
<p>This scareware was observed accessing the following domains during installation and operation:</p>
<ul>
<li>findchalk .org</li>
<li>searchfew .org</li>
<li>searchbite .org</li>
<li>indexperie .org</li>
<li>searchmoaning .org</li>
<li>findadvertisem .org</li>
</ul>
<p><u>Note: Visiting the domains mentioned above may harm your computer system.</u></p>
<p>If you are unable to get rid of this scareware, please visit one of the <a  linkindex="65" href="http://www.malwarehelp.org/recommended-online-forums-for-malware.html">recommended forums for malware help</a> and post about your problem.</p>
<h2>WindowsRecovery Scareware — Screenshots</h2>
 [<a href="http://www.malwarehelp.org/windowsrecovery-removal-2011.html">See image gallery at www.malwarehelp.org</a>] 
<p><i>Note: The WindowsRecovery installation and removal was tested on a default installation of  Windows XP SP3. The content provided in this article is not warranted or guaranteed by Malware Help. Org. The content provided is intended for entertainment and/or educational purposes. I am not liable for any negative consequences that may result from implementing any information covered in this article. The above information is correct at the time of my testing, it might change with time and or under different testing conditions.</i></p>
<p><p>Advt<br />
Limited period offer!<br />
<a  href="http://www.malwarehelp.org/security_software_coupons.html" target="_blank" title="Click to find more offers on Security Software!!!'">Genuine Security software at discounted rates!</a></p>
<p><small>Author: Shanmuga<br /> <br />
Copyright &copy; 2005 &#8211; 2012, malwarehelp.org</small></p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/windowsrecovery-removal-2011.html">WindowsRecovery Removal and Analysis</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.malwarehelp.org/windowsrecovery-removal-2011.html/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">2857</post-id>	</item>
		<item>
		<title>Antivirus Protection Removal and Analysis</title>
		<link>http://www.malwarehelp.org/antivirus-protection-removal-2011.html</link>
		<comments>http://www.malwarehelp.org/antivirus-protection-removal-2011.html#comments</comments>
		<pubDate>Tue, 26 Apr 2011 07:56:06 +0000</pubDate>
		<dc:creator><![CDATA[Shanmuga]]></dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Rogue Security Software]]></category>
		<category><![CDATA[spyware removal]]></category>
		<category><![CDATA[Antivirus Protection Trial]]></category>
		<category><![CDATA[rogue security software]]></category>

		<guid isPermaLink="false">http://www.malwarehelp.org/?p=2851</guid>
		<description><![CDATA[<p>Similar in design and behavior to Antivirus soft and Antivirus Live rogues, this scareware aggressively displays a number of fake security alerts about network infiltration attempts and non-existent malware. Hijacks Internet Explorer by modifying the proxy settings and automatically opens porn websites every now and then. IE is allowed to visit only the sites related [...]</p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/antivirus-protection-removal-2011.html">Antivirus Protection Removal and Analysis</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a  class="post_image_link" href="http://www.malwarehelp.org/antivirus-protection-removal-2011.html" title="Permanent link to Antivirus Protection Removal and Analysis"><img class="post_image alignleft" src="https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus_protection_trial04.png?resize=100%2C100" width="100" height="100" alt="Post image for Antivirus Protection Removal and Analysis" data-recalc-dims="1" /></a>
</p><p>Similar in design and behavior to Antivirus soft and Antivirus Live rogues, this scareware aggressively displays a number of fake security alerts about network infiltration attempts and non-existent malware. Hijacks Internet Explorer by modifying the proxy settings and automatically opens porn websites every now and then. IE is allowed to visit only the sites related to this rogue.</p>
<p>Scareware like Antivirus Protection are commonly installed when users are redirected to fake online scanner pages, fraudulent porn sites, illegal cracks/warez sites and fake &#8216;video codec required&#8217; pages distributed through out the Web by cyber criminals using blackhat SEO techniques, Spam and Malicious flash advertisements.</p>
<div id="attachment_2854" class="wp-caption aligncenter" style="width: 590px">
	<a  href="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus_protection_trial05.png" class="thickbox no_icon" title="antivirus_protection_trial"><img data-attachment-id="2854" data-permalink="http://www.malwarehelp.org/antivirus-protection-removal-2011.html/antivirus_protection_trial05/" data-orig-file="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus_protection_trial05.png?fit=800%2C451" data-orig-size="800,451" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="antivirus_protection_trial" data-image-description="" data-medium-file="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus_protection_trial05.png?fit=300%2C169" data-large-file="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus_protection_trial05.png?fit=590%2C332" src="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus_protection_trial05.png?resize=590%2C332" alt="antivirus_protection_trial" title="antivirus_protection_trial" width="590" height="332" class="size-large wp-image-2854" srcset="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus_protection_trial05.png?resize=590%2C332 590w, https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus_protection_trial05.png?resize=300%2C169 300w, https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus_protection_trial05.png?w=800 800w" sizes="(max-width: 590px) 100vw, 590px" data-recalc-dims="1" /></a>
	<p class="wp-caption-text">Desktop hijacked by Antivirus Protection Trial</p>
</div>
<h2>Antivirus Protection Removal (How to remove Antivirus Protection)</h2>
<p><a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">MalwareBytes&#8217;s Anti-Malware Free edition</a> (mbam-setup.exe) was able to remove this infection.</p>
<ol><LI>Boot in to <a  linkindex="63" href="http://www.malwarehelp.org/restart-into-safe-mode-how-to-2010.html">Windows Safe Mode</a> with networking</LI> </p>
<p><LI>Download <a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">MalwareBytes&#8217;s Anti-Malware Free edition</a> (mbam-setup.exe) or from a clean computer download and copy to a removable drive like CD, DVD or USB flash drive.</LI></p>
<p><LI>Double-click<b> mbam-setup.exe</b> to start the installation. Proceed with installation following the prompts. Make sure that the following option is checked when you finish the installation: <strong>Update Malwarebytes&#8217; Anti-Malware</strong>.</LI></p>
<p><LI>Once the update is completed, <strong>Launch Malwarebytes&#8217; Anti-Malware</strong> and select <b>Perform full scan</b> in the Scanner tab. When the scan is completed, click &#8220;<b>Show results</b>&#8220;, confirm that all instances of the rogue security software are check-marked and then click &#8220;<b>Remove Selected</b>&#8221; to delete them. If prompted restart immediately to complete the removal process.</LI></p>
<p><LI><a  linkindex="64" href="http://www.malwarehelp.org/how-to-disable-enable-system-restore-turn-system-restore-on-or-off.html">Turn System Restore off and on</a>.</LI></ol>
<p>If you find the Internet Explorer is still being re-directed to the scareware website, remove the proxy settings as follows:</p>
<p>Open Internet Explorer, Click <b>Tools</b> menu and then click <b>Internet options</b> or open Internet options via control panel. In the Internet Options window, select the <b>Connections</b> tab. In the Connections tab, click on <b>LAN settings</b>.</p>
<table border="0" width="100%">
<tbody>
<tr>
<td><a  href="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/IE-connections-proxy.gif" class="thickbox no_icon" rel="gallery-1926" title="IE-connections-proxy"><img data-attachment-id="1929" data-permalink="http://www.malwarehelp.org/antivirus-soft-analysis-and-removal-2010.html/ie-connections-proxy/" data-orig-file="https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2010/02/IE-connections-proxy.gif?fit=395%2C389" data-orig-size="395,389" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="IE-connections-proxy" data-image-description="" data-medium-file="https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2010/02/IE-connections-proxy.gif?fit=253%2C250" data-large-file="https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2010/02/IE-connections-proxy.gif?fit=395%2C389" src="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/IE-connections-proxy.gif?resize=280%2C276" alt="IE connections proxy Antivirus Soft Analysis and Removal" title="IE-connections-proxy" class="aligncenter size-full wp-image-1929" height="276" width="280" data-recalc-dims="1" /></a></td>
<td><a  href="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/IE-remove-proxy.gif" class="thickbox no_icon" rel="gallery-1926" title="IE-remove-proxy"><img data-attachment-id="1930" data-permalink="http://www.malwarehelp.org/antivirus-soft-analysis-and-removal-2010.html/ie-remove-proxy/" data-orig-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2010/02/IE-remove-proxy.gif?fit=423%2C451" data-orig-size="423,451" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="IE-remove-proxy" data-image-description="" data-medium-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2010/02/IE-remove-proxy.gif?fit=234%2C250" data-large-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2010/02/IE-remove-proxy.gif?fit=423%2C451" src="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/IE-remove-proxy.gif?resize=280%2C276" alt="IE remove proxy Antivirus Soft Analysis and Removal" title="IE-remove-proxy" class="aligncenter size-full wp-image-1930" height="276" width="280" data-recalc-dims="1" /></a></td>
</tr>
</tbody>
</table>
<div style="clear: both;"></div>
<p>In the <b>Local Area Network (LAN) Settings</b> window, click <b>Advanced</b> and clear the proxy address 127.0.0.1 and any number in the port box. It was 47392 in my case. Click <b>Yes</b> and <b>OK</b> your way out.</p>
<p>You should now be clean of this rogue.</p>
<p>The full version of Malwarebytes&#8217; Anti-Malware performs brilliantly against scareware such as Antivirus Protection. The real-time component of the paid version includes dynamic blocking of malicious websites, servers and prevents execution of malware. It would caution you before most rogue security software could install itself. Please consider purchasing the <a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">Malwarebytes&#8217; Anti-Malware Full version</a> for additional protection.</p>
<h2>Antivirus Protection Analysis</h2>
<p>Antivirus Protection scareware blocks execution of most programs and Windows administrative tasks like Task manager, command prompt and Registry editor. It blocks execution of Chrome browser, Firefox was able to function normally.</p>
<p>A rogue security software such as Antivirus Protection belongs to a family of software products that call themselves as antivirus, antispyware or registry cleaners and often use deceptive or high pressure sales tactics and deliberate false positives to convince users into buying a license/subscription. They are often repackaged and renamed. They do not actually remove malware instead many of them add more malware of their own. They need to be removed immediately from your system.</p>
<p>The trojan installer was about 410112 bytes in size. This scareware is detected by 30/ 41 (73.2%) of the antivirus engines available at VirusTotal. It is identified as:</p>
<ul>
<li>Trojan/Win32.FakeAV</li>
<li>TR/Fake.Spypro.137</li>
<li>Win32.FakeAlert.Spyp</li>
<li>Rogue:Win32/FakeSpypro</li>
<li>Win32/Adware.SpywareProtect2009</li>
<li>W32/FakeAlert.CJZL</li>
</ul>
<h2>Typical Antivirus Protection Scare Messages</h2>
<blockquote><p>Windows Security Alert<br />
Windows reports that computer is infected. Antivirus software helps to protect your computer against viruses and other security threats. /click here for the scan your computer. Your system might be at risk now.</p></blockquote>
<blockquote><p>Spyware alert<br />
There are serious threats detected on your comupter. Your privacy and personal data may not be safe.</p></blockquote>
<blockquote><p>Antivirus software alert<br />
INFILTRATION ALERT<br />
Virus attack<br />
Your computer is being attacked by an internet virus. It culd be a pasword-stealing attack, a trojan-dropper or similar.</p></blockquote>
<blockquote><p>Security alert<br />
Virus alert!<br />
Application can&#8217;t be started!<br />
The file taskmgr.exe is damaged.<br />
Do you want to activate your antivirus software now?</p></blockquote>
<blockquote><p>ATTENTION! SPYWARE ALERT<br />
Vulnerabilities found.<br />
your computer is infected by spyware &#8211; 34 serious threats have been found while scanning your files and registry. It is strongly recommended that your disinfect your computer and activate realtime secure protection against future intrusions.</p></blockquote>
<blockquote><p>Internet Explorer Waring &#8211; visiting this web site may harm your computer!<br />
Most likely causes:<br />
The website contains exploits that can launch a malicious code on your computer<br />
Suspicious network activity detected<br />
There might be an active spyware running on your computer</p></blockquote>
<p>Users should not fall for the false alerts of system infection and buy the scareware to &#8216;clean&#8217; the system. If you purchased one by entering your credit card number at a rogue software website, it would be prudent to:</p>
<ul>
<li>Immediately contact the bank that issued the card and dispute the charges.</li>
<li>Request them to not allow any further transaction and cancel the card. You may also request them to issue a new card with a different number.</li>
</ul>
<h2>Antivirus Protection Associated Files and Folders</h2>
<ul>
<li>C:Documents and Settingsmalwarehelp.orgDesktopAntivirusProtectionTrial.exe</li>
<li>C:Documents and Settingsmalwarehelp.orgLocal SettingsTemprfcsyghvuxlkdpuhxsik.exe</li>
<li>C:WINDOWSPrefetchANTIVIRUSPROTECTIONTRIAL.EXE-2B2A38AC.pf</li>
<li>C:WINDOWSPrefetchXLKDPUHXSIK.EXE-139348BD.pf</li>
</ul>
<p><i>Some of the file names may be randomly generated. The term malwarehelp.org or malwarehelp in the above entries denotes the name of the Windows user account in the test machine.</i></p>
<h2>Antivirus Protection Associated Registry Values and Keys</h2>
<ul>
<li>HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerDownloadCheckExeSignatures=no</li>
<li>HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerDownloadRunInvalidSignatures=1</li>
<li>HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerPhishingFilterEnabledV8=0</li>
<li>HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerPhishingFilterEnabled=0</li>
<li>HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet SettingsProxyServer=http=127.0.0.1:47392</li>
<li>HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet SettingsProxyOverride=<local></li>
<li>HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesAssociations</li>
<li>HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesAssociationsLowRiskFileTypes=.exe</li>
<li>HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesAttachments</li>
<li>HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesAttachmentsSaveZoneInformation=1</li>
<li>HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRungoygivxn=C:DOCUME~1MALWAR~1.ORGLOCALS~1Temprfcsyghvuxlkdpuhxsik.exe</li>
</ul>
<p><i>The term malwarehelp.org or malwarehelp in the above entries denotes the name of the Windows user account in the test machine. Manually editing the registry is NOT recommended.</i></p>
<h2>Antivirus Protection Associated Domains</h2>
<p>This scareware was observed accessing the following domains during installation and operation:</p>
<ul>
<li>antiviria .com</li>
<li>antispydrome .net</li>
</ul>
<p><u>Note: Visiting the domains mentioned above may harm your computer system.</u></p>
<p>If you are unable to get rid of this scareware, please visit one of the <a  linkindex="65" href="http://www.malwarehelp.org/recommended-online-forums-for-malware.html">recommended forums for malware help</a> and post about your problem.</p>
<h2>Antivirus Protection Scareware — Screenshots</h2>
 [<a href="http://www.malwarehelp.org/antivirus-protection-removal-2011.html">See image gallery at www.malwarehelp.org</a>] 
<p><i>Note: The Antivirus Protection installation and removal was tested on a default installation of  Windows XP SP3. The content provided in this article is not warranted or guaranteed by Malware Help. Org. The content provided is intended for entertainment and/or educational purposes. I am not liable for any negative consequences that may result from implementing any information covered in this article. The above information is correct at the time of my testing, it might change with time and or under different testing conditions.</i></p>
<p><p>Advt<br />
Limited period offer!<br />
<a  href="http://www.malwarehelp.org/security_software_coupons.html" target="_blank" title="Click to find more offers on Security Software!!!'">Genuine Security software at discounted rates!</a></p>
<p><small>Author: Shanmuga<br /> <br />
Copyright &copy; 2005 &#8211; 2012, malwarehelp.org</small></p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/antivirus-protection-removal-2011.html">Antivirus Protection Removal and Analysis</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.malwarehelp.org/antivirus-protection-removal-2011.html/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">2851</post-id>	</item>
		<item>
		<title>BitDefender 2011 Removal and Analysis</title>
		<link>http://www.malwarehelp.org/bitdefender-2011-removal-2011.html</link>
		<comments>http://www.malwarehelp.org/bitdefender-2011-removal-2011.html#respond</comments>
		<pubDate>Tue, 26 Apr 2011 04:33:44 +0000</pubDate>
		<dc:creator><![CDATA[Shanmuga]]></dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Rogue Security Software]]></category>
		<category><![CDATA[spyware removal]]></category>
		<category><![CDATA[bitdefender 2011]]></category>
		<category><![CDATA[rogue security software]]></category>

		<guid isPermaLink="false">http://www.malwarehelp.org/?p=2845</guid>
		<description><![CDATA[<p>This scareware uses the name of a legitimate security application to ply its trade upon unwary users. BitDefender 2011 scareware copies the logo and design elements of the well known bitdefender range of security products. Once installed, this rogue software blocks execution of legitimate programs with fake security alerts. These fake warning messages are very [...]</p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/bitdefender-2011-removal-2011.html">BitDefender 2011 Removal and Analysis</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a  class="post_image_link" href="http://www.malwarehelp.org/bitdefender-2011-removal-2011.html" title="Permanent link to BitDefender 2011 Removal and Analysis"><img class="post_image alignleft" src="https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/bitdefender_2011_-16.png?resize=100%2C100" width="100" height="100" alt="Post image for BitDefender 2011 Removal and Analysis" data-recalc-dims="1" /></a>
</p><p>This scareware uses the name of a legitimate security application to ply its trade upon unwary users. BitDefender 2011 scareware copies the logo and design elements of the well known bitdefender range of security products. Once installed, this rogue software blocks execution of legitimate programs with fake security alerts. These fake warning messages are very frequent making the desktop unusable. </p>
<p>BitDefender 2011 scareware adds a column to the Windows Task Manager, fraudulently marking legitimate processes as “Infected”. This rogue security software also hijacks the major browsers like Internet Explorer, Firefox, Chrome, Opera and Safari so that they are allowed to open in a fraudulent <b>Internet Explorer Emergency Mode</b>. It also blocks installation of security software to protect itself. </p>
<p><a  href="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/bitdefender_2011_-13.png" class="thickbox no_icon" title="bitdefender_2011"><img data-attachment-id="2847" data-permalink="http://www.malwarehelp.org/bitdefender-2011-removal-2011.html/bitdefender_2011_-13/" data-orig-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/bitdefender_2011_-13.png?fit=770%2C505" data-orig-size="770,505" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="bitdefender_2011" data-image-description="&lt;p&gt;bitdefender_2011&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/bitdefender_2011_-13.png?fit=300%2C196" data-large-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/bitdefender_2011_-13.png?fit=590%2C386" src="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/bitdefender_2011_-13.png?resize=590%2C386" alt="bitdefender_2011" title="bitdefender_2011" width="590" height="386" class="aligncenter size-large wp-image-2847" srcset="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/bitdefender_2011_-13.png?resize=590%2C386 590w, https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/bitdefender_2011_-13.png?resize=300%2C196 300w, https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/bitdefender_2011_-13.png?w=770 770w" sizes="(max-width: 590px) 100vw, 590px" data-recalc-dims="1" /></a></p>
<p>Scareware like BitDefender 2011 are commonly installed when users are redirected to fake online scanner pages, fraudulent porn sites, illegal cracks/warez sites and fake &#8216;video codec required&#8217; pages distributed through out the Web by cyber criminals using blackhat SEO techniques, Spam and Malicious flash advertisements.</p>
<h2>BitDefender 2011 Removal (How to remove BitDefender 2011)</h2>
<p><a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">MalwareBytes&#8217;s Anti-Malware Free edition</a> (mbam-setup.exe) was able to remove this infection.</p>
<ol><LI>Boot in to <a  linkindex="63" href="http://www.malwarehelp.org/restart-into-safe-mode-how-to-2010.html">Windows Safe Mode</a> with networking</LI> </p>
<p><LI>Download <a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">MalwareBytes&#8217;s Anti-Malware Free edition</a> (mbam-setup.exe) or from a clean computer download and copy to a removable drive like CD, DVD or USB flash drive.</LI></p>
<p><LI>Double-click<b> mbam-setup.exe</b> to start the installation. Proceed with installation following the prompts. Make sure that the following option is checked when you finish the installation: <strong>Update Malwarebytes&#8217; Anti-Malware</strong>.</LI></p>
<p><LI>Once the update is completed, <strong>Launch Malwarebytes&#8217; Anti-Malware</strong> and select <b>Perform full scan</b> in the Scanner tab. When the scan is completed, click &#8220;<b>Show results</b>&#8220;, confirm that all instances of the rogue security software are check-marked and then click &#8220;<b>Remove Selected</b>&#8221; to delete them. If prompted restart immediately to complete the removal process.</LI></p>
<p><LI><a  linkindex="64" href="http://www.malwarehelp.org/how-to-disable-enable-system-restore-turn-system-restore-on-or-off.html">Turn System Restore off and on</a>.</LI></ol>
<p>You should now be clean of this rogue.</p>
<p>The full version of Malwarebytes&#8217; Anti-Malware performs brilliantly against scareware such as BitDefender 2011. The real-time component of the paid version includes dynamic blocking of malicious websites, servers and prevents execution of malware. It would caution you before most rogue security software could install itself. Please consider purchasing the <a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">Malwarebytes&#8217; Anti-Malware Full version</a> for additional protection.</p>
<h2>BitDefender 2011 Analysis</h2>
<p>A rogue security software such as BitDefender 2011 belongs to a family of software products that call themselves as antivirus, antispyware or registry cleaners and often use deceptive or high pressure sales tactics and deliberate false positives to convince users into buying a license/subscription. They are often repackaged and renamed. They do not actually remove malware instead many of them add more malware of their own. They need to be removed immediately from your system.</p>
<p>BitDefender 2011 severely restricts browsing. Major browsers like Firefox, Chrome, Opera and Safari are allowed to open only in a fraudulent internet explorer emergency mode. This is done by tampering with the registry key <b>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options</b>. Many Websites are blocked and a fake security alert as below is displayed with a forged URL <b>http://microsoft.com/#blacklist</b></p>
<blockquote>
<p>This web site refused your connection as it was reported as malicious request. This can be caused by Viruses, Trojans or Malware found on your computer.</p>
</blockquote>
<p>The trojan dropper file was about 1242632 bytes in size. This scareware is detected by 19/ 41 (46.3%) of the antivirus engines available at VirusTotal. It is identified as:</p>
<ul>
<li>Trojan/Win32.FraudPack</li>
<li>Trojan.FakeAV.LNN</li>
<li>Trojan.Fakealert.20653</li>
<li>Trojan.Win32.FraudPack.cshp</li>
<li>Rogue:Win32/FakeXPA</li>
</ul>
<h2>Typical BitDefender 2011 Scare Messages</h2>
<blockquote><p>About Internet Explorer Emergency Mode<br />
Your PC is infected with malicious software and browse couldn&#8217;t be launched.<br />
You may use Internet Explorer in Emergency Mode &#8211; internal service browser of Microsoft Windows system with limited usability.<br />
Notice: some sites refuse connection with Internet Explorer in Emergency Mode. In such case system warning page will be showed to you.</p></blockquote>
<blockquote><p>Attention! Your web page request has been cancelled.<br />
This web site refused your connection as it was reported as a malicious request.<br />
This can be caused by Viruses, Trojans or Malware found on your computer.<br />
In ordr to resend your request to the website, press Resend request (please note, this action may cause a permanent block of your computer by the requested website)<br />
In order to activate your security software, please press Fix Now ( recommended)</p></blockquote>
<blockquote><p>Google Redirect Virus activity detected<br />
Google Redirect Virus is an application which was designed to have harmful functionality and is utilized to ensure a PC user&#8217;s entire network is compromised and possibly endangered. This term Trojan refers to the fact this particular malware, Google Redirect virus is installed under deceptive pretences, infiltrating the<br />
user&#8217;s PC without their approval or knowledge.</p></blockquote>
<blockquote><p>NetPumper Send Reports Blocked<br />
Once installed on your machine, Netpumper may start monitoring your web browsing habits, such as what pages you usually load and what search terms you usually type in the search page. NetPumper may also deliver excessive pop-up advertisements even when you are not browsing the Internet. NetPumper has also an ability to slow down your computer performance by using yur hard drive recources in order to deliver advertisements on your computer screen.</p></blockquote>
<blockquote><p>Security Center Alert<br />
To help protect your computer, Security Center has blocked some features of this program<br />
Sft.dez.Wien is a virus attempts to spread itself by attaching to a host program and can damage hardware, software or data in the process. This worm can be blocked from firewall and antivirus software.</p></blockquote>
<blockquote><p>VirtuMonde activity tracked<br />
Virtumonde is an adware program that tends to monitor your Internet browsing habits and may display targeted advertisements onto your computer screen. Virtumonde may also create a malicious DLL file in order to log your keystrokes and send the recorded information to a third party website. Virtumonde is an unwanted application and recommended to be removed.</p></blockquote>
<p>Users should not fall for the false alerts of system infection and buy the scareware to &#8216;clean&#8217; the system. If you purchased one by entering your credit card number at a rogue software website, it would be prudent to:</p>
<ul>
<li>Immediately contact the bank that issued the card and dispute the charges.</li>
<li>Request them to not allow any further transaction and cancel the card. You may also request them to issue a new card with a different number.</li>
</ul>
<h2>BitDefender 2011 Associated Files and Folders</h2>
<ul>
<li>C:\Documents and Settings\All Users\Start Menu\BitDefender 2011\BitDefender 2011.lnk</li>
<li>C:\Documents and Settings\All Users\Start Menu\BitDefender 2011\Uninstall.lnk</li>
<li>C:\Documents and Settings\malwarehelp.org\Desktop\BitDefender 2011.lnk</li>
</ul>
<ul>
<li>C:\WINDOWS\system32\iesafemode.exe</li>
<li>C:\WINDOWS\Prefetch\BITDEFENDER.EXE-0571D06A.pf</li>
<li>C:\WINDOWS\Prefetch\BITDEFENDER.EXE-06B296CB.pf</li>
<li>C:\WINDOWS\Prefetch\MSCONFIG.EXE-1EF1EA0F.pf</li>
</ul>
<p><i>Some of the file names may be randomly generated. The term malwarehelp.org or malwarehelp in the above entries denotes the name of the Windows user account in the test machine.</i></p>
<h2>BitDefender 2011 Associated Registry Values and Keys</h2>
<ul>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe</li>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe\Debugger=iesafemode.exe -sb</li>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe</li>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe\Debugger=iesafemode.exe -sb</li>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe</li>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe\Debugger=iesafemode.exe -sb</li>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe</li>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe\Debugger=iesafemode.exe -sb</li>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safari.exe</li>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safari.exe\Debugger=iesafemode.exe -sb</li>
</ul>
<ul>
<li>HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable=0</li>
<li>HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Hardware Profiles\Current\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable=0</li>
<li>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable=0</li>
<li>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Hardware Profiles\Current\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable=0</li>
</ul>
<ul>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable=0</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\BitDefender 2011=C:\Program Files\BitDefender 2011\bitdefender.exe</li>
<li>HKEY_CURRENT_USER\Control Panel\Desktop\ForegroundLockTimeout=0</li>
<li>HKEY_CURRENT_USER\Software\EVA86D\</li>
<li>HKEY_CURRENT_USER\Software\Mon86D</li>
<li>HKEY_CURRENT_USER\Software\Mon86D\ebggddkhod=AGT</li>
<li>HKEY_CURRENT_USER\Software\Mon86D\ebggeddf=EVA</li>
<li>HKEY_CURRENT_USER\Software\Mon86D\ebgglcofkc=ABCEVA</li>
<li>HKEY_CURRENT_USER\Software\Mon86D\ebggbc={EA520B3F-F2F1-41E0-AD9F-C818F032C581}</li>
<li>HKEY_CURRENT_USER\Software\Mon86D\ebggddnf=0</li>
<li>HKEY_CURRENT_USER\Software\Mon86D\ebgglceeac=C:\Program Files\BitDefender 2011\bitdefender.exe</li>
<li>HKEY_CURRENT_USER\Software\Mon86D\ebggfdlh=BitDefender 2011</li>
</ul>
<p><i>The term malwarehelp.org or malwarehelp in the above entries denotes the name of the Windows user account in the test machine. Manually editing the registry is NOT recommended.</i></p>
<h2>BitDefender 2011 Associated Domains</h2>
<p>This scareware was observed accessing the following domains during installation and operation:</p>
<ul>
<li>http://secure.supersoftstore. com</li>
<li>http://windows-networks. com/</li>
<li>http://secure.ordersunsprotection. com/</li>
</ul>
<p><u>Note: Visiting the domains mentioned above may harm your computer system.</u></p>
<p>If you are unable to get rid of this scareware, please visit one of the <a  linkindex="65" href="http://www.malwarehelp.org/recommended-online-forums-for-malware.html">recommended forums for malware help</a> and post about your problem.</p>
<h2>BitDefender 2011 Scareware — Screenshots</h2>
 [<a href="http://www.malwarehelp.org/bitdefender-2011-removal-2011.html">See image gallery at www.malwarehelp.org</a>] 
<p><i>Note: The BitDefender 2011 installation and removal was tested on a default installation of  Windows XP SP3. The content provided in this article is not warranted or guaranteed by Malware Help. Org. The content provided is intended for entertainment and/or educational purposes. I am not liable for any negative consequences that may result from implementing any information covered in this article. The above information is correct at the time of my testing, it might change with time and or under different testing conditions.</i></p>
<p><p>Advt<br />
Limited period offer!<br />
<a  href="http://www.malwarehelp.org/security_software_coupons.html" target="_blank" title="Click to find more offers on Security Software!!!'">Genuine Security software at discounted rates!</a></p>
<p><small>Author: Shanmuga<br /> <br />
Copyright &copy; 2005 &#8211; 2012, malwarehelp.org</small></p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/bitdefender-2011-removal-2011.html">BitDefender 2011 Removal and Analysis</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.malwarehelp.org/bitdefender-2011-removal-2011.html/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">2845</post-id>	</item>
		<item>
		<title>Antivirus AntiSpyware 2011 Removal and Analysis</title>
		<link>http://www.malwarehelp.org/antivirus-antispyware-2011-removal-2011.html</link>
		<comments>http://www.malwarehelp.org/antivirus-antispyware-2011-removal-2011.html#comments</comments>
		<pubDate>Mon, 25 Apr 2011 06:31:39 +0000</pubDate>
		<dc:creator><![CDATA[Shanmuga]]></dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Rogue Security Software]]></category>
		<category><![CDATA[spyware removal]]></category>
		<category><![CDATA[Antivirus AntiSpyware 2011]]></category>
		<category><![CDATA[rogue security software]]></category>

		<guid isPermaLink="false">http://www.malwarehelp.org/?p=2838</guid>
		<description><![CDATA[<p>Antivirus AntiSpyware 2011 is rogue security application, similar to Internet Security 2010, Security essentials 2010, Security essentials 2011 etc., Once installed, this scareware produces frequent fake security warnings about non-existent malware and network intrusions. This rogue software pops up a security alert and blocks execution of legitimate programs. The fake security alerts come in a [...]</p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/antivirus-antispyware-2011-removal-2011.html">Antivirus AntiSpyware 2011 Removal and Analysis</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a  class="post_image_link" href="http://www.malwarehelp.org/antivirus-antispyware-2011-removal-2011.html" title="Permanent link to Antivirus AntiSpyware 2011 Removal and Analysis"><img class="post_image alignleft" src="https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-antispyware-2011.png?resize=100%2C100" width="100" height="100" alt="Post image for Antivirus AntiSpyware 2011 Removal and Analysis" data-recalc-dims="1" /></a>
</p><p>Antivirus AntiSpyware 2011 is rogue security application, similar to Internet Security 2010, Security essentials 2010, Security essentials 2011 etc., Once installed, this scareware produces frequent fake security warnings about non-existent malware and network intrusions. This rogue software pops up a security alert and blocks execution of legitimate programs.  The fake security alerts come in a variety of shapes and colors designed to cheat the unwary users.</p>
<p>Scareware like Antivirus AntiSpyware 2011 are commonly installed when users are redirected to fake online scanner pages, fraudulent porn sites, illegal cracks/warez sites and fake &#8216;video codec required&#8217; pages distributed throughout the Web by cyber criminals using blackhat SEO techniques, Spam and Malicious flash advertisements.</p>
<div id="attachment_2841" class="wp-caption aligncenter" style="width: 590px">
	<a  href="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-antispyware-2011-desktop-hijacked.png" class="thickbox no_icon" title="antivirus-antispyware-2011-desktop hijacked"><img data-attachment-id="2841" data-permalink="http://www.malwarehelp.org/antivirus-antispyware-2011-removal-2011.html/antivirus-antispyware-2011-desktop-hijacked/" data-orig-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-antispyware-2011-desktop-hijacked.png?fit=800%2C451" data-orig-size="800,451" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="antivirus-antispyware-2011-desktop hijacked" data-image-description="&lt;p&gt;Desktop hijacked by Antivirus Antispyware 2011&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-antispyware-2011-desktop-hijacked.png?fit=300%2C169" data-large-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-antispyware-2011-desktop-hijacked.png?fit=590%2C332" src="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-antispyware-2011-desktop-hijacked.png?resize=590%2C332" alt="Desktop hijacked by Antivirus Antispyware 2011" title="antivirus-antispyware-2011-desktop hijacked" width="590" height="332" class="size-large wp-image-2841" srcset="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-antispyware-2011-desktop-hijacked.png?resize=590%2C332 590w, https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-antispyware-2011-desktop-hijacked.png?resize=300%2C169 300w, https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-antispyware-2011-desktop-hijacked.png?w=800 800w" sizes="(max-width: 590px) 100vw, 590px" data-recalc-dims="1" /></a>
	<p class="wp-caption-text">Desktop hijacked by Antivirus Antispyware 2011</p>
</div>
<h2>Antivirus AntiSpyware 2011 Removal (How to remove Antivirus AntiSpyware 2011)</h2>
<p><a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">MalwareBytes&#8217;s Anti-Malware Free edition</a> (mbam-setup.exe) was able to remove this infection.</p>
<ol><LI>Boot in to <a  linkindex="63" href="http://www.malwarehelp.org/restart-into-safe-mode-how-to-2010.html">Windows Safe Mode</a> with networking</LI> </p>
<p><LI>Download <a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">MalwareBytes&#8217;s Anti-Malware Free edition</a> (mbam-setup.exe) or from a clean computer download and copy to a removable drive like CD, DVD or USB flash drive.</LI></p>
<p><LI>Double-click<b> mbam-setup.exe</b> to start the installation. Proceed with installation following the prompts. Make sure that the following option is checked when you finish the installation: <strong>Update Malwarebytes&#8217; Anti-Malware</strong>.</LI></p>
<p><LI>Once the update is completed, <strong>Launch Malwarebytes&#8217; Anti-Malware</strong> and select <b>Perform full scan</b> in the Scanner tab. When the scan is completed, click &#8220;<b>Show results</b>&#8220;, confirm that all instances of the rogue security software are check-marked and then click &#8220;<b>Remove Selected</b>&#8221; to delete them. If prompted restart immediately to complete the removal process.</LI></p>
<p><LI><a  linkindex="64" href="http://www.malwarehelp.org/how-to-disable-enable-system-restore-turn-system-restore-on-or-off.html">Turn System Restore off and on</a>.</LI></ol>
<p>You should now be clean of this rogue.</p>
<p>The full version of Malwarebytes&#8217; Anti-Malware performs brilliantly against scareware such as Antivirus AntiSpyware 2011. The real-time component of the paid version includes dynamic blocking of malicious websites, servers and prevents execution of malware. It would caution you before most rogue security software could install itself. Please consider purchasing the <a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">Malwarebytes&#8217; Anti-Malware Full version</a> for additional protection.</p>
<h2>Antivirus AntiSpyware 2011 Analysis</h2>
<p>A rogue security software such as Antivirus AntiSpyware 2011 belongs to a family of software products that call themselves as antivirus, antispyware or registry cleaners and often use deceptive or high pressure sales tactics and deliberate false positives to convince users into buying a license/subscription. They are often repackaged and renamed. They do not actually remove malware instead many of them add more malware of their own. They need to be removed immediately from your system.</p>
<p>The trojan installer file was about 2603016 bytes in size. According to ThreatExpert, this file &#8220;is protected with Themida in order to prevent the sample from being reverse-engineered. Themida protection can potentially be used by a threat to complicate the manual threat analysis (e.g. the sample would not run under the Virtual Machine).&#8221;</p>
<p>This scareware is detected by 17/ 41 (41.5%) of the antivirus engines available at VirusTotal. It is identified as:</p>
<ul>
<li>Trojan/Win32.ADH</li>
<li>TR/FraudPack.csig</li>
<li>Trojan.Win32.FakeAV.ctol</li>
<li>Win32/Adware.SecurityEssentials.AB</li>
<li>Trojan.DownLoader2.39788	</li>
</ul>
<h2>Typical Antivirus AntiSpyware 2011 Scare Messages</h2>
<blockquote><p>The proactive system found several active vulnerablilities on your computer. Your system is at risk of being damaged by existing viruses. This can lead to PC freezes, crashes, erratic behavior and data loss.</p></blockquote>
<blockquote><p>CRITICAL ERROR<br />
Running of application is impossible!<br />
A problem has been detected and the application has been shut down to prevent damage to your computer. Running of notepad.exe is impossible due to the Net-Worm.Win32.Mytob.t activity. Perform the full system scan without delay to solve the issue.</p></blockquote>
<blockquote><p>System warning!<br />
Continue working in unprotected mode is very dangerous. Viruses can damage your confidential data and work on your computer. Click here to protect your computer.</p></blockquote>
<blockquote><p>Critical system error!<br />
Critical system error ocured! Your system is infected with the last version of Trojan-Spy.HTML.Visapass.a, Website access passwords might be stolen from Internet Explorer, Mozilla Firefox, Opera, Outlook. It is highly recommended to click YES button to scan and remove threats.</p></blockquote>
<blockquote><p>Your computer is being attacked from a remote machine!<br />
Block Internet access to your computer to prevent system infection.</p></blockquote>
<blockquote><p>Spyware threat detected!<br />
Your system is vulnerable to Internet attacks.<br />
Spyware may damage systems files, monitor your internet usage or intercept any data you send over the internet.<br />
It is strongly recommended for you to remove detected threats. Do not ignore this alert message!</p></blockquote>
<blockquote><p>Your system is infected with the Spydot.facebook,error.exe. Your website access passwords for socail networks, Icq and Skype might be stolen and used by third parties. It is highly recommended to click YES button to scan and remove threats.</p></blockquote>
<p>Users should not fall for the false alerts of system infection and buy the scareware to &#8216;clean&#8217; the system. If you purchased one by entering your credit card number at a rogue software website, it would be prudent to:</p>
<ul>
<li>Immediately contact the bank that issued the card and dispute the charges.</li>
<li>Request them to not allow any further transaction and cancel the card. You may also request them to issue a new card with a different number.</li>
</ul>
<h2>Antivirus AntiSpyware 2011 Associated Files and Folders</h2>
<ul>
<li>C:\Documents and Settings\All Users\Application Data\Antivirus AntiSpyware 2011\872.mof</li>
<li>C:\Documents and Settings\All Users\Application Data\Antivirus AntiSpyware 2011\AS2011.exe</li>
<li>C:\Documents and Settings\All Users\Application Data\Antivirus AntiSpyware 2011\wewekds\wethrazuds.cfg</li>
<li>C:\Documents and Settings\malwarehelp.org\Application Data\Microsoft\Internet Explorer\Quick Launch\Antivirus AntiSpyware 2011.lnk</li>
<li>C:\Documents and Settings\malwarehelp.org\Desktop\Antivirus AntiSpyware 2011.lnk</li>
<li>C:\WINDOWS\Prefetch\AA2011.EXE-077BB82B.pf</li>
<li>C:\WINDOWS\Prefetch\AS2011.EXE-22AB0EF7.pf</li>
<li>C:\WINDOWS\Prefetch\MOFCOMP.EXE-01718E95.pf</li>
</ul>
<p><i>Some of the file names may be randomly generated. The term malwarehelp.org or malwarehelp in the above entries denotes the name of the Windows user account in the test machine.</i></p>
<h2>Antivirus AntiSpyware 2011 Associated Registry Values and Keys</h2>
<ul>
<li>HKEY_CURRENT_USER\SOFTWARE\SE2010</li>
<li>HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wethrazuds.cfg</li>
</ul>
<ul>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AA2011.DocHostUIHandler</li>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AA2011.DocHostUIHandler\Clsid</li>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AS2011.DocHostUIHandler</li>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AS2011.DocHostUIHandler\Clsid</li>
<li>HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable=0</li>
<li>HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Hardware Profiles\Current\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable=0</li>
</ul>
<p><i>The term malwarehelp.org or malwarehelp in the above entries denotes the name of the Windows user account in the test machine. Manually editing the registry is NOT recommended.</i></p>
<h2>Antivirus AntiSpyware 2011 Associated Domains</h2>
<p>This scareware was observed accessing the following domains during installation and operation:</p>
<ul>
<li>get-se2011.com</li>
<li>http://shopsoftwaresecurity.com</li>
</ul>
<p><u>Note: Visiting the domains mentioned above may harm your computer system.</u></p>
<p>If you are unable to get rid of this scareware, please visit one of the <a  linkindex="65" href="http://www.malwarehelp.org/recommended-online-forums-for-malware.html">recommended forums for malware help</a> and post about your problem.</p>
<h2>Antivirus AntiSpyware 2011 Scareware — Screenshots</h2>
 [<a href="http://www.malwarehelp.org/antivirus-antispyware-2011-removal-2011.html">See image gallery at www.malwarehelp.org</a>] 
<p><i>Note: The Antivirus AntiSpyware 2011 installation and removal was tested on a default installation of  Windows XP SP3. The content provided in this article is not warranted or guaranteed by Malware Help. Org. The content provided is intended for entertainment and/or educational purposes. I am not liable for any negative consequences that may result from implementing any information covered in this article. The above information is correct at the time of my testing, it might change with time and or under different testing conditions.</i></p>
<p><p>Advt<br />
Limited period offer!<br />
<a  href="http://www.malwarehelp.org/security_software_coupons.html" target="_blank" title="Click to find more offers on Security Software!!!'">Genuine Security software at discounted rates!</a></p>
<p><small>Author: Shanmuga<br /> <br />
Copyright &copy; 2005 &#8211; 2012, malwarehelp.org</small></p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/antivirus-antispyware-2011-removal-2011.html">Antivirus AntiSpyware 2011 Removal and Analysis</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.malwarehelp.org/antivirus-antispyware-2011-removal-2011.html/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">2838</post-id>	</item>
		<item>
		<title>Antivirus Clean 2011 Removal and Analysis</title>
		<link>http://www.malwarehelp.org/antivirus-clean-2011-removal-2011.html</link>
		<comments>http://www.malwarehelp.org/antivirus-clean-2011-removal-2011.html#respond</comments>
		<pubDate>Sat, 23 Apr 2011 04:03:09 +0000</pubDate>
		<dc:creator><![CDATA[Shanmuga]]></dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Rogue Security Software]]></category>
		<category><![CDATA[spyware removal]]></category>
		<category><![CDATA["rogue software"]]></category>
		<category><![CDATA[Antivirus Clean 2011]]></category>
		<category><![CDATA[Phishing]]></category>

		<guid isPermaLink="false">http://www.malwarehelp.org/?p=2828</guid>
		<description><![CDATA[<p>Antivirus Clean 2011 is a fraudulent security software that displays fake Windows warning messages about non-existent malware infections to scare the victim to purchase a license. This scareware actually phishes for the credit card data instead of just scamming the user for a subscription. The secure payment page to which the user is taken on [...]</p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/antivirus-clean-2011-removal-2011.html">Antivirus Clean 2011 Removal and Analysis</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a  class="post_image_link" href="http://www.malwarehelp.org/antivirus-clean-2011-removal-2011.html" title="Permanent link to Antivirus Clean 2011 Removal and Analysis"><img class="post_image alignleft" src="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011-icon.png?resize=100%2C100" width="100" height="100" alt="Post image for Antivirus Clean 2011 Removal and Analysis" data-recalc-dims="1" /></a>
</p><p>Antivirus Clean 2011 is a fraudulent security software that displays fake Windows warning messages about non-existent malware infections to scare the victim to purchase a license. This scareware actually phishes for the credit card data instead of just scamming the user for a subscription. The secure payment page to which the user is taken on clicking an activation link is in reality a web page designed to capture credit card data.</p>
<p>Scareware like Antivirus Clean 2011 are commonly installed when users are redirected to fake online scanner pages or fake &#8216;video codec required&#8217; pages distributed through out the Web by cyber criminals using blackhat SEO techniques, Spam and Malicious flash advertisements.</p>
<div id="attachment_2829" class="wp-caption aligncenter" style="width: 590px">
	<a  href="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011.png" class="thickbox no_icon" title="antivirus-clean-2011"><img data-attachment-id="2829" data-permalink="http://www.malwarehelp.org/antivirus-clean-2011-removal-2011.html/antivirus-clean-2011/" data-orig-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011.png?fit=800%2C451" data-orig-size="800,451" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="antivirus-clean-2011" data-image-description="" data-medium-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011.png?fit=300%2C169" data-large-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011.png?fit=590%2C332" src="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011.png?resize=590%2C332" alt="antivirus-clean-2011" title="antivirus-clean-2011" width="590" height="332" class="size-large wp-image-2829" srcset="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011.png?resize=590%2C332 590w, https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011.png?resize=300%2C169 300w, https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011.png?w=800 800w" sizes="(max-width: 590px) 100vw, 590px" data-recalc-dims="1" /></a>
	<p class="wp-caption-text">Antivirus Clean 2011</p>
</div>
<h2>Antivirus Clean 2011 Removal (How to remove Antivirus Clean 2011)</h2>
<p><a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank"><b>MalwareBytes&#8217;s Anti-Malware Free edition</b></a> (mbam-setup.exe) was able to remove this infection.</p>
<ol><LI>Boot in to <a  linkindex="63" href="http://www.malwarehelp.org/restart-into-safe-mode-how-to-2010.html">Windows Safe Mode</a> with networking</LI> </p>
<p><LI>Download <a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">MalwareBytes&#8217;s Anti-Malware Free edition</a> (mbam-setup.exe) or from a clean computer download and copy to a removable drive like CD, DVD or USB flash drive.</LI></p>
<p><LI>Double-click<b> mbam-setup.exe</b> to start the installation. Proceed with installation following the prompts. Make sure that the following option is checked when you finish the installation: <strong>Update Malwarebytes&#8217; Anti-Malware</strong>.</LI></p>
<p><LI>Once the update is completed, <strong>Launch Malwarebytes&#8217; Anti-Malware</strong> and select <b>Perform full scan</b> in the Scanner tab. When the scan is completed, click &#8220;<b>Show results</b>&#8220;, confirm that all instances of the rogue security software are check-marked and then click &#8220;<b>Remove Selected</b>&#8221; to delete them. If prompted restart immediately to complete the removal process.</LI></p>
<p><LI><a  linkindex="64" href="http://www.malwarehelp.org/how-to-disable-enable-system-restore-turn-system-restore-on-or-off.html">Turn System Restore off and on</a>.</LI></ol>
<p>You should now be clean of this rogue.</p>
<p>The full version of Malwarebytes&#8217; Anti-Malware performs brilliantly against scareware such as Antivirus Clean 2011. The real-time component of the paid version includes dynamic blocking of malicious websites, servers and prevents execution of malware. It would caution you before most rogue security software could install itself. Please consider purchasing the <a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">Malwarebytes&#8217; Anti-Malware Full version</a> for additional protection.</p>
<h2>Antivirus Clean 2011 Analysis</h2>
<p>A rogue security software such as Antivirus Clean 2011 belongs to a family of software products that call themselves as antivirus, antispyware or registry cleaners and often use deceptive or high pressure sales tactics and deliberate false positives to convince users into buying a license/subscription. They are often repackaged and renamed. They do not actually remove malware instead many of them add more malware of their own. They need to be removed immediately from your system.</p>
<p>At present this rogue is just phishing for personal and credit card data. On clicking Register or Activate button, the victim is taken to a phishing page to elicit information including credit card security code.</p>
<p><a  href="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011-phishing.png" class="thickbox no_icon" title="antivirus-clean-2011-phishing"><img data-attachment-id="2830" data-permalink="http://www.malwarehelp.org/antivirus-clean-2011-removal-2011.html/antivirus-clean-2011-phishing/" data-orig-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011-phishing.png?fit=477%2C1053" data-orig-size="477,1053" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="antivirus-clean-2011-phishing" data-image-description="" data-medium-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011-phishing.png?fit=113%2C250" data-large-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011-phishing.png?fit=226%2C500" src="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011-phishing.png?resize=226%2C500" alt="antivirus-clean-2011-phishing-page" title="antivirus-clean-2011-phishing" width="226" height="500" class="aligncenter size-large wp-image-2830" srcset="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011-phishing.png?resize=226%2C500 226w, https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011-phishing.png?resize=113%2C250 113w, https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/antivirus-clean-2011-phishing.png?w=477 477w" sizes="(max-width: 226px) 100vw, 226px" data-recalc-dims="1" /></a></p>
<p>The rogue installer file was about 1539594 bytes. It is detected by 28/ 42 (66.7%) of the antivirus engines available at VirusTotal.</p>
<p>This scareware is detected as:</p>
<ul>
<li>VirTool:Win32/Obfuscator.EK</li>
<li>Gen:Packer.Morphine.anGfaCM0glh</li>
<li>W32/Heuristic-210!Eldorado</li>
<li>Trojan.Win32.FakeAV.cnkc</li>
<li>Bloodhound.Morphine</li>
</ul>
<h2>Typical Antivirus Clean 2011 Scare Messages</h2>
<blockquote><p>Your computer is in danger!<br />
Antivirus Clean 2011 has detected some serious threats to your computer!<br />
These viruses need to be eliminated immedeately! Please click this icon to remove threats.</p></blockquote>
<blockquote><p>Your system is infected!<br />
Your computer is compromised by hackers, adware, malware and worms!<br />
Antivirus Clean 2011 can remove this infection. Please click this icon to remove threats.</p></blockquote>
<p>Users should not fall for the false alerts of system infection and buy the scareware to &#8216;clean&#8217; the system. If you purchased one by entering your credit card number at a rogue software website, it would be prudent to:</p>
<ul>
<li>Immediately contact the bank that issued the card and dispute the charges.</li>
<li>Request them to not allow any further transaction and cancel the card. You may also request them to issue a new card with a different number.</li>
</ul>
<h2>Antivirus Clean 2011 Associated Files and Folders</h2>
<ul>
<li>C:\Program Files\Antivirus Clean 2011\avc2011.exe</li>
<li>C:\Program Files\Antivirus Clean 2011\avservice.exe</li>
<li>C:\Program Files\Antivirus Clean 2011\avsetup.exe</li>
</ul>
<ul>
<li>C:\Program Files\Antivirus Clean 2011</li>
</ul>
<p><i>Some of the file names may be randomly generated. The term malwarehelp.org or malwarehelp in the above entries denotes the name of the Windows user account in the test machine.</i></p>
<h2>Antivirus Clean 2011 Associated Registry Values and Keys</h2>
<ul>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntivirusClean=C:\Program Files\Antivirus Clean 2011\avc2011.exe</li>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\avservice=C:\Program Files\Antivirus Clean 2011\avservice.exe</li>
<li>HKEY_CURRENT_USER\Software\WinRAR SFX\C%%Program Files%Antivirus Clean 2011%=C:\Program Files\Antivirus Clean 2011\</li>
</ul>
<p><i>The term malwarehelp.org or malwarehelp in the above entries denotes the name of the Windows user account in the test machine. Manually editing the registry is NOT recommended.</i></p>
<h2>Antivirus Clean 2011 Associated Domains</h2>
<p>This scareware was observed accessing the following domains during installation and operation:</p>
<ul>
<li>http://crimsonscratch.square7. ch</li>
</ul>
<p><u>Note: Visiting the domains mentioned above may harm your computer system.</u></p>
<p>If you are unable to get rid of this scareware, please visit one of the <a  linkindex="65" href="http://www.malwarehelp.org/recommended-online-forums-for-malware.html">recommended forums for malware help</a> and post about your problem.</p>
<h2>Antivirus Clean 2011 Scareware — Screenshots</h2>
 [<a href="http://www.malwarehelp.org/antivirus-clean-2011-removal-2011.html">See image gallery at www.malwarehelp.org</a>] 
<p><i>Note: The Antivirus Clean 2011 installation and removal was tested on a default installation of  Windows XP SP3. The content provided in this article is not warranted or guaranteed by Malware Help. Org. The content provided is intended for entertainment and/or educational purposes. I am not liable for any negative consequences that may result from implementing any information covered in this article. The above information is correct at the time of my testing, it might change with time and or under different testing conditions.</i></p>
<p><p>Advt<br />
Limited period offer!<br />
<a  href="http://www.malwarehelp.org/security_software_coupons.html" target="_blank" title="Click to find more offers on Security Software!!!'">Genuine Security software at discounted rates!</a></p>
<p><small>Author: Shanmuga<br /> <br />
Copyright &copy; 2005 &#8211; 2012, malwarehelp.org</small></p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/antivirus-clean-2011-removal-2011.html">Antivirus Clean 2011 Removal and Analysis</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.malwarehelp.org/antivirus-clean-2011-removal-2011.html/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">2828</post-id>	</item>
		<item>
		<title>Malware runs even in safe mode &#8211; Cleaning Malware</title>
		<link>http://www.malwarehelp.org/safemode-malware-removal-2011.html</link>
		<comments>http://www.malwarehelp.org/safemode-malware-removal-2011.html#comments</comments>
		<pubDate>Fri, 01 Apr 2011 10:58:32 +0000</pubDate>
		<dc:creator><![CDATA[Shanmuga]]></dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[spyware removal]]></category>
		<category><![CDATA[malware removal]]></category>
		<category><![CDATA[safe mode]]></category>

		<guid isPermaLink="false">http://www.malwarehelp.org/?p=2812</guid>
		<description><![CDATA[<p>Yes! malware can even run in safe mode and safe mode with networking. A common devious method is to inject a malware process into legitimate Windows processes like userinit.exe, explorer.exe etc., These processes are loaded as part of the core drivers and services that Windows loads during a safe mode boot. According to a McAfee [...]</p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/safemode-malware-removal-2011.html">Malware runs even in safe mode &#8211; Cleaning Malware</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a  class="post_image_link" href="http://www.malwarehelp.org/safemode-malware-removal-2011.html" title="Permanent link to Malware runs even in safe mode &#8211; Cleaning Malware"><img class="post_image alignleft" src="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/safemode_malware.jpg?resize=100%2C100" width="100" height="100" alt="Post image for Malware runs even in safe mode &#8211; Cleaning Malware" data-recalc-dims="1" /></a>
</p><p>Yes! malware can even run in safe mode and safe mode with networking. A common devious method is to inject a malware process into legitimate Windows processes like userinit.exe, explorer.exe etc., These processes are loaded as part of the core drivers and services that Windows loads during a safe mode boot. </p>
<p>According to a <a  href="http://www.avertlabs.com/research/blog/index.php/2009/03/12/safe-mode-a-misnomer/">McAfee</a> blog, The services and drivers that load in Safe Mode are listed under the following registry key(s):</p>
<ul>
<li><strong>HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSafeBootMinimal</strong></li>
<li><strong>HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSafeBootNetwork</strong></li>
</ul>
<p>If malware gains control of the system, it can add its entry under the above key(s) to load during a Safe Mode boot.</p>
<p>One recent example would be the  <a  href="http://www.malwarehelp.org/cleanthis-removal-2011.html">CleanThis Scareware</a>. This malware tampers with the WinlogonShell key in the Windows registry to annoy users even in safe mode. The tampered key looks like this:</p>
<ul>
<li><strong>HKEY_CURRENT_USERsoftwareMicrosoftWindows NTCurrentVersionWinlogonShell = C:Documents and Settingsmalwarehelp.orgApplication Datagog.exe</strong></li>
</ul>
<p>In this case restoring the default shell value should disable this malware process on restart. But this malicious process also blocks execution of registry editor among other programs to protect itself. A workaround would be to use a .inf file to change the registry.</p>
<ul>
<li>Right click and save the file <a  href="http://www.malwarehelp.org/downloads/shell_restore.inf">shell_restore.inf</a>, make sure that you are saving the file with a .inf extension.</li>
<li>Right click the downloaded file shell_restore.inf and choose the option for install. This will restore the default Windows Shell which prevents the scareware from running at boot.</li>
<li>Restart to unload the malware executable from memory.</li>
</ul>
<p>Note: It can be dangerous to run .inf files downloaded from an untrusted source. </p>
<p>Another trick to defeat this tactic is to boot in safe mode with command prompt. This will start Windows with only core drivers and launches the command prompt.  Here is a short how-to, to run Malwarebytes’ Anti-Malware in <strong>safe mode with command prompt</strong>:</p>
<ul>
<li>Use an alternate computer to download <a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">MalwareBytes’s Anti-Malware</a> (mbam-setup.exe) and the <a  href="http://data.mbamupdates.com/tools/mbam-rules.exe" target="_blank">Malwarebytes’ Anti-Malware Malware definitions</a> (mbam-rules.exe) to a removable drive  like CDs, DVDs or USB flash drives.</li>
<li>Boot in to Windows <a  linkindex="62" href="http://www.malwarehelp.org/restart-into-safe-mode-how-to-2010.html">Safe Mode with Command Prompt Using F8 key</a>.</li>
<p>&nbsp;</p>
<p> <img data-attachment-id="2089" data-permalink="http://www.malwarehelp.org/cannot-boot-into-safe-mode-2010.html/windows-xp-pro-sp3-2010-04-20-10-59-20/" data-orig-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2010/04/Windows-XP-Pro-SP3-2010-04-20-10-59-20.png?fit=590%2C327" data-orig-size="590,327" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Windows XP safe mode" data-image-description="" data-medium-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2010/04/Windows-XP-Pro-SP3-2010-04-20-10-59-20.png?fit=300%2C166" data-large-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2010/04/Windows-XP-Pro-SP3-2010-04-20-10-59-20.png?fit=590%2C327" style="width: 590px; height: 327px;" src="https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/Windows-XP-Pro-SP3-2010-04-20-10-59-20.png?resize=590%2C327" alt="Windows XP Pro SP3 2010 04 20 10 59 20 Unable to start in Windows safe mode   Cleaning Malware" title="Windows XP safe mode" class="size-full wp-image-2089" height="327" width="590" data-recalc-dims="1" /></p>
<li>At the command prompt type ‘<b>explorer.exe</b>‘ and press the <b>Enter</b> key, wait for Windows Explorer to open. Now in ‘My Computer’ browse to your removable drive.</li>
<p>&nbsp;<br /> <img data-attachment-id="2090" data-permalink="http://www.malwarehelp.org/cannot-boot-into-safe-mode-2010.html/windows-xp-safe-mode-command-prompt/" data-orig-file="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2010/04/windows-xp-safe-mode-command-prompt.png?fit=590%2C229" data-orig-size="590,229" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="windows-xp-safe-mode-command-prompt" data-image-description="" data-medium-file="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2010/04/windows-xp-safe-mode-command-prompt.png?fit=300%2C116" data-large-file="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2010/04/windows-xp-safe-mode-command-prompt.png?fit=590%2C229" src="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/04/windows-xp-safe-mode-command-prompt.png?resize=590%2C229" alt="windows xp safe mode command prompt Unable to start in Windows safe mode   Cleaning Malware" title="windows-xp-safe-mode-command-prompt" class="aligncenter size-full wp-image-2090" height="229" width="590" data-recalc-dims="1" /></p>
<li>Install MalwareBytes’s Anti-Malware and Malwarebytes’ Anti-Malware Malware definitions from your removable drive. Launch Malwarebytes’ Anti-Malware and select <b>Perform full scan</b> in the Scanner tab. When the scan is completed, click “Show results“, confirm that all instances of the rogue security software are check-marked and then click “<b>Remove Selected</b>” to delete them. If prompted restart immediately to complete the removal process.</li>
<li>Reboot into normal mode, Launch, <b>Update</b> and scan again with MalwareBytes’s Anti-Malware.</li>
</ul>
<p>The tips above should help you to get started, when trying to clean malware that starts in safe mode. Have you used any other method to clean such malware? Please share it in the comments below.</p>
<p><p>Advt<br />
Limited period offer!<br />
<a  href="http://www.malwarehelp.org/security_software_coupons.html" target="_blank" title="Click to find more offers on Security Software!!!'">Genuine Security software at discounted rates!</a></p>
<p><small>Author: Shanmuga<br /> <br />
Copyright &copy; 2005 &#8211; 2012, malwarehelp.org</small></p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/safemode-malware-removal-2011.html">Malware runs even in safe mode &#8211; Cleaning Malware</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.malwarehelp.org/safemode-malware-removal-2011.html/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">2812</post-id>	</item>
		<item>
		<title>MS Removal Tool Removal and Analysis</title>
		<link>http://www.malwarehelp.org/ms-removal-tool-removal-2011.html</link>
		<comments>http://www.malwarehelp.org/ms-removal-tool-removal-2011.html#comments</comments>
		<pubDate>Tue, 29 Mar 2011 13:16:18 +0000</pubDate>
		<dc:creator><![CDATA[Shanmuga]]></dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Rogue Security Software]]></category>
		<category><![CDATA[spyware removal]]></category>
		<category><![CDATA[MS Removal Tool]]></category>
		<category><![CDATA[rogue antimalware]]></category>

		<guid isPermaLink="false">http://www.malwarehelp.org/?p=2801</guid>
		<description><![CDATA[<p>MS Removal Tool is similar in design and behavior to the System Tool rogue. It uses yellow system alert messages to get itself installed. MS Removal Tool blocks execution of most programs and Windows administrative tasks like Task Manager, Command prompt, Registry editor etc., presumably to protect itself and at the same time to scare [...]</p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/ms-removal-tool-removal-2011.html">MS Removal Tool Removal and Analysis</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a  class="post_image_link" href="http://www.malwarehelp.org/ms-removal-tool-removal-2011.html" title="Permanent link to MS Removal Tool Removal and Analysis"><img class="post_image alignleft" src="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/ms-removal-tool.png?resize=100%2C100" width="100" height="100" alt="Post image for MS Removal Tool Removal and Analysis" data-recalc-dims="1" /></a>
</p><p><b>MS Removal Tool</b> is similar in design and behavior to the System Tool rogue. It uses yellow system alert messages to get itself installed. MS Removal Tool blocks execution of most programs and Windows administrative tasks like Task Manager, Command prompt, Registry editor etc., presumably to protect itself and at the same time to scare the user to purchase a fraudulent subscription. </p>
<p>Once installed on the victim&#8217;s system, the MS Removal Tool rogue security software proceeds to close other applications and generates fake system security warnings about non-existent malware. The malware creates a random named folder and file in \All Users\Application Data\ folder. The last five characters always ended in 07003 in this variant, presumably the affiliate code. E.g: C:\Documents and Settings\All Users\Application Data\dHdGiAkCkEi07003\dHdGiAkCkEi07003.exe</p>
<p>One of the Mutex created reads <b>Don&#8217;t stop me! I need some money!</b></p>
<div id="attachment_2803" class="wp-caption aligncenter" style="width: 590px">
	<a  href="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/ms-removal-tool-system-scan.png" class="thickbox no_icon" title="ms-removal-tool-system-scan"><img data-attachment-id="2803" data-permalink="http://www.malwarehelp.org/ms-removal-tool-removal-2011.html/ms-removal-tool-system-scan/" data-orig-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/ms-removal-tool-system-scan.png?fit=751%2C562" data-orig-size="751,562" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="ms-removal-tool-system-scan" data-image-description="&lt;p&gt;MS Removal Tool Fake System Scan&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/ms-removal-tool-system-scan.png?fit=300%2C224" data-large-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/ms-removal-tool-system-scan.png?fit=590%2C441" src="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/ms-removal-tool-system-scan.png?resize=590%2C441" alt="ms-removal-tool-system-scan" title="ms-removal-tool-system-scan" width="590" height="441" class="size-large wp-image-2803" srcset="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/ms-removal-tool-system-scan.png?resize=590%2C441 590w, https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/ms-removal-tool-system-scan.png?resize=300%2C224 300w, https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/ms-removal-tool-system-scan.png?w=751 751w" sizes="(max-width: 590px) 100vw, 590px" data-recalc-dims="1" /></a>
	<p class="wp-caption-text">MS Removal Tool Fake System Scan</p>
</div>
<p>Scareware like MS Removal Tool are commonly installed when users are redirected to fake online scanner pages or fake &#8216;video codec required&#8217; pages distributed through out the Web by cyber criminals using blackhat SEO techniques, Spam and Malicious flash advertisements.</p>
<h2>MS Removal Tool Removal (How to remove MS Removal Tool)</h2>
<p><a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank"><b>MalwareBytes&#8217;s Anti-Malware Free edition</b></a> (mbam-setup.exe) was able to remove this infection.</p>
<ol><LI>Boot in to <a  linkindex="63" href="http://www.malwarehelp.org/restart-into-safe-mode-how-to-2010.html">Windows Safe Mode</a> with networking</LI> </p>
<p><LI>Download <a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">MalwareBytes&#8217;s Anti-Malware Free edition</a> (mbam-setup.exe) or from a clean computer download and copy to a removable drive like CD, DVD or USB flash drive.</LI></p>
<p><LI>Double-click<b> mbam-setup.exe</b> to start the installation. Proceed with installation following the prompts. Make sure that the following option is checked when you finish the installation: <strong>Update Malwarebytes&#8217; Anti-Malware</strong>.</LI></p>
<p><LI>Once the update is completed, <strong>Launch Malwarebytes&#8217; Anti-Malware</strong> and select <b>Perform full scan</b> in the Scanner tab. When the scan is completed, click &#8220;<b>Show results</b>&#8220;, confirm that all instances of the rogue security software are check-marked and then click &#8220;<b>Remove Selected</b>&#8221; to delete them. If prompted restart immediately to complete the removal process.</LI></p>
<p><LI><a  linkindex="64" href="http://www.malwarehelp.org/how-to-disable-enable-system-restore-turn-system-restore-on-or-off.html">Turn System Restore off and on</a>.</LI></ol>
<p>You should now be clean of this rogue.</p>
<blockquote><p>The full version of Malwarebytes&#8217; Anti-Malware performs brilliantly against scareware such as MS Removal Tool. The real-time component of the paid version includes dynamic blocking of malicious websites, servers and prevents execution of malware. It would caution you before most rogue security software could install itself. Please consider purchasing the <a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">Malwarebytes&#8217; Anti-Malware Full version</a> for additional protection.</p></blockquote>
<h2>MS Removal Tool Analysis</h2>
<p>A rogue security software such as MS Removal Tool belongs to a family of software products that call themselves as antivirus, antispyware or registry cleaners and often use deceptive or high pressure sales tactics and deliberate false positives to convince users into buying a license/subscription. They are often repackaged and renamed. They do not actually remove malware instead many of them add more malware of their own. They need to be removed immediately from your system.</p>
<p>The trojan file was about 319488 bytes in size. It was detected by  11/ 43 (25.6%) of the antivirus engines available at VirusTotal.</p>
<p>This scareware is detected as:</p>
<ul>
<li>Trojan.Generic.KD.170369</li>
<li>Trojan.Fakealert.20556</li>
<li>W32/FakeAlert.LO.gen!Eldorado</li>
<li>FakeAlert-SecurityTool.bf</li>
<li>a variant of Win32/Kryptik.MAR</li>
<li>Trojan.Agent/Gen-RogueLoad</li>
</ul>
<h2>Typical MS Removal Tool Scare Messages</h2>
<blockquote><p>Warning: Your computer is infected<br />
Windows has detected spyware infection!<br />
Click this message to install the last update of Windows security software&#8230;</p></blockquote>
<blockquote><p>MS Removal Tool Warning<br />
Intercepting programs that may compromise your privacy and harm your system have been detected on your PC.<br />
Click here to remove them immediately with MS Removal Tool</p></blockquote>
<blockquote><p>Warning!<br />
Application cannot be executed. The file filename.exe is infected.<br />
Please activate your antivirus software.</p></blockquote>
<p>Users should not fall for the false alerts of system infection and buy the scareware to &#8216;clean&#8217; the system. If you purchased one by entering your credit card number at a rogue software website, it would be prudent to:</p>
<ul>
<li>Immediately contact the bank that issued the card and dispute the charges.</li>
<li>Request them to not allow any further transaction and cancel the card. You may also request them to issue a new card with a different number.</li>
</ul>
<h2>MS Removal Tool Associated Files and Folders</h2>
<ul>
<li>C:\Documents and Settings\All Users\Application Data\oGcMaMjAlJj07003</li>
<li>C:\Documents and Settings\All Users\Application Data\oGcMaMjAlJj07003\oGcMaMjAlJj07003.exe</li>
<li>C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\aC555.exe</li>
<li>C:\Documents and Settings\malwarehelp.org\Local Settings\Temp\aC555.tmp</li>
</ul>
<p><i>Some of the file names may be randomly generated. The term malwarehelp.org or malwarehelp in the above entries denotes the name of the Windows user account in the test machine.</i></p>
<h2>MS Removal Tool Associated Registry Values and Keys</h2>
<ul>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\oGcMaMjAlJj07003=C:\Documents and Settings\All Users\Application Data\oGcMaMjAlJj07003\oGcMaMjAlJj07003.exe</li>
</ul>
<p><i>Manually editing the registry is NOT recommended.</i></p>
<h2>MS Removal Tool Associated Domains</h2>
<p>This scareware was observed accessing the following domains during installation and operation:</p>
<ul>
<li>http://194.28.113. 214</li>
<li>http://69.50.195. 77</li>
<li>http://msantispam-srv2. com</li>
<li>http://69.50.209. 220</li>
</ul>
<p><u>Note: Visiting the domains mentioned above may harm your computer system.</u></p>
<p>If you are unable to get rid of this scareware, please visit one of the <a  linkindex="65" href="http://www.malwarehelp.org/recommended-online-forums-for-malware.html">recommended forums for malware help</a> and post about your problem.</p>
<h2>MS Removal Tool Scareware — Screenshots</h2>
 [<a href="http://www.malwarehelp.org/ms-removal-tool-removal-2011.html">See image gallery at www.malwarehelp.org</a>] 
<p><i>Note: The MS Removal Tool installation and removal was tested on a default installation of  Windows XP SP3. The content provided in this article is not warranted or guaranteed by Malware Help. Org. The content provided is intended for entertainment and/or educational purposes. I am not liable for any negative consequences that may result from implementing any information covered in this article. The above information is correct at the time of my testing, it might change with time and or under different testing conditions.</i></p>
<p><p>Advt<br />
Limited period offer!<br />
<a  href="http://www.malwarehelp.org/security_software_coupons.html" target="_blank" title="Click to find more offers on Security Software!!!'">Genuine Security software at discounted rates!</a></p>
<p><small>Author: Shanmuga<br /> <br />
Copyright &copy; 2005 &#8211; 2012, malwarehelp.org</small></p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/ms-removal-tool-removal-2011.html">MS Removal Tool Removal and Analysis</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.malwarehelp.org/ms-removal-tool-removal-2011.html/feed/</wfw:commentRss>
		<slash:comments>35</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">2801</post-id>	</item>
		<item>
		<title>Find and Remove SpyEye Banking Trojan</title>
		<link>http://www.malwarehelp.org/find-and-remove-spyeye-trojan-2011.html</link>
		<comments>http://www.malwarehelp.org/find-and-remove-spyeye-trojan-2011.html#comments</comments>
		<pubDate>Mon, 28 Mar 2011 07:30:49 +0000</pubDate>
		<dc:creator><![CDATA[Shanmuga]]></dc:creator>
				<category><![CDATA[Botnets]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[spyware removal]]></category>
		<category><![CDATA[Trojan Horse]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[spyeye]]></category>
		<category><![CDATA[trojan]]></category>

		<guid isPermaLink="false">http://www.malwarehelp.org/?p=2780</guid>
		<description><![CDATA[<p>SpyEye banking trojan first made its appearance about a year back as a competitor to what is till then known as the king of all bots Zeus/Zbot. Security researchers believe that both bots have now joined hands to prey upon online banking users world-wide. Similar to Zbot, SpyEye trojan is created using a specialized builder [...]</p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/find-and-remove-spyeye-trojan-2011.html">Find and Remove SpyEye Banking Trojan</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a  class="post_image_link" href="http://www.malwarehelp.org/find-and-remove-spyeye-trojan-2011.html" title="Permanent link to Find and Remove SpyEye Banking Trojan"><img class="post_image alignleft" src="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/spyeye-trojan.jpg?resize=100%2C100" width="100" height="100" alt="Post image for Find and Remove SpyEye Banking Trojan" data-recalc-dims="1" /></a>
</p><p>SpyEye banking trojan first made its appearance about a year back as a competitor to what is till then known as the king of all bots <a  href="http://www.malwarehelp.org/find-and-remove-zeus-zbot-banking-trojan-2009.html">Zeus/Zbot</a>. Security researchers believe that both bots have now joined hands to prey upon online banking users world-wide.</p>
<p>Similar to Zbot, SpyEye trojan is created using a specialized builder or kit. The kit contains tools to customize, create and control individual bots and botnets. </p>
<p>Trojan SpyEye requires a C&#038;C (Command and control) server to which the bots (individual machines infected by spyeye trojan) connect for receiving instructions from the botnet owner.</p>
<p>Abuse.ch which is running a Zeus tracker, also has a project called <a  href="https://spyeyetracker.abuse.ch/" target="_blank">SpyEye Tracker</a> for tracking an monitoring SpyEye command and control Servers. At the time of this writing the tracker&#8217;s statistics are as follows: </p>
<ul>
<li>SpyEye C&#038;C servers tracked: 230</li>
<li>SpyEye C&#038;C servers online: 61</li>
<li>SpyEye C&#038;C server with files online: 25</li>
<li><b>Average SpyEye binary Antivirus detection: 29.72%</b></li>
</ul>
<h3>What is the danger of SpyEye trojan?</h3>
<div id="attachment_2786" class="wp-caption aligncenter" style="width: 590px">
	<a  href="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/spyeye-bot-builder-kit.png" class="thickbox no_icon" title="Image of spyeye-bot-builder-kit"><img src="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/spyeye-bot-builder-kit.png?resize=590%2C436" alt="Image of spyeye-bot-builder-kit" title="spyeye-bot-builder-kit" width="590" height="436" class="size-large wp-image-2786" data-recalc-dims="1" /></a>
	<p class="wp-caption-text">SpyEye Builder kit. Used by criminals to customize and control the trojan bot.</p>
</div>
<p>Similar to Zeus/Zbot trojan, SpyEye specializes in stealing valuable personal information from the victim&#8217;s computer. Some of the data it can be made to steal are:</p>
<ul>
<li>Online banking login username and passwords</li>
<li>Credit card numbers, names and PIN numbers</li>
<li>Social Security numbers</li>
<li>FTP account names and passwords</li>
<li>Complete ID profiles from form Auto-fill function of your browser</li>
</ul>
<p>All these data can be stolen even if you communicate with sensitive web sites using SSL (HTTPS) encrypted connections. </p>
<p.These botnets can also be used for DDos (denial-of-service) attacks, sending spam and distributing other malware.</p>
<h3>How does a computer get infected with SpyEye trojan</h3>
<p>This trojan must be manually installed. This is achieved in several ways. The popular ones seem to be through exploited web sites and downloadable email spam products. For example the victim may be downloading an illegal file like warez/crack files or what may proclaim to be a free screensaver. Beware! this trojan could hitch hike with one those programs and silently install itself in the background on an unprotected computer.</p>
<h3>Symptoms/Indications of SpyEye infection </h3>
<p>The victim will not see any visual indication of its installation. The only indication that you have SpyEye in your system may be when an antivirus software alerts you to its presence.</p>
<p>SpyEye trojan dropper is detected as  Win-Trojan/Spyeyes, Trojan.Siggen, TSPY_SPYEYE, BScope.Trojan-Dropper by different antivirus vendors.</p>
<p>Trojan SpyEye silently sits in the background till the victim visits a sensitive Website like his bank site. It then captures valuable data using a keylogger. The trojan can be customized by its master to automatically steal and transfer money using the captured data or use it otherwise.</p>
<h3>SpyEye Associated Files and Folders</h3>
<p>It is difficult to manually identify its files and registry keys as it hides them from regular Windows explorer, Task Manager and Registry editor using rootkit techniques.</p>
<div id="attachment_2790" class="wp-caption aligncenter" style="width: 590px">
	<a  href="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/spyeye-bot-builder-name-customize.png" class="thickbox no_icon" title="spyeye-bot-builder-name-customize"><img data-attachment-id="2790" data-permalink="http://www.malwarehelp.org/find-and-remove-spyeye-trojan-2011.html/spyeye-bot-builder-name-customize/" data-orig-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/spyeye-bot-builder-name-customize.png?fit=679%2C40" data-orig-size="679,40" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="spyeye-bot-builder-name-customize" data-image-description="&lt;p&gt;Executable name of the bot can be customized.&lt;/p&gt;
" data-medium-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/spyeye-bot-builder-name-customize.png?fit=300%2C17" data-large-file="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/spyeye-bot-builder-name-customize.png?fit=590%2C34" src="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/spyeye-bot-builder-name-customize.png?resize=590%2C34" alt="Image of spyeye-bot-builder-name-customize-option" title="spyeye-bot-builder-name-customize" width="590" height="34" class="size-large wp-image-2790" srcset="https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/spyeye-bot-builder-name-customize.png?resize=590%2C34 590w, https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/spyeye-bot-builder-name-customize.png?resize=300%2C17 300w, https://i0.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/spyeye-bot-builder-name-customize.png?w=679 679w" sizes="(max-width: 590px) 100vw, 590px" data-recalc-dims="1" /></a>
	<p class="wp-caption-text">Executable name of the bot can be customized.</p>
</div>
<p>The name of the executable file can be customized to anything by the criminals. The default entry cleansweep.exe is the most commonly seen name. Typically, SpyEye trojan installs itself and its encrypted configuration file named config.bin in C:\<filename>.exe\<filename>.exe   </p>
<ul>
<li>C:\cleansweep.exe\cleansweep.exe</li>
<li>C:\cleansweep.exe\config.bin</li>
</ul>
<p>According to Microsoft, some of the file names seen are:</p>
<ul>
<li>cleansweep.exe</li>
<li>windowseep.exe</li>
<li>systemhost.exe</li>
<li>mssetupers.exe</li>
<li>msixxxxxxx.exe</li>
<li>systemrxxt.exe</li>
<li>malacuxatx.exe</li>
<li>windowsxxx.exe</li>
<li>portwexexe.exe</li>
<li>bofabotxxx.exe</li>
<li>cxlacuxatx.exe</li>
<li>googlemaps.exe</li>
<li>windowsdvd.exe</li>
<li>ciaxxxxxxx.exe</li>
<li>onweretetr.exe</li>
<li>moneyxmexx.exe</li>
<li>wlcwlcwlcw.exe</li>
<li>shitspykid.exe</li>
<li>rundllxxxx.exe</li>
<li>jdsfjsdijf.exe</li>
<li>usxxxxxxxx.exe</li>
<li>inetserver.exe</li>
<li>intelcored.exe</li>
<li>bbbxxxxxxx.exe</li>
<li>defenderxx.exe</li>
<li>bootstartx.exe</li>
<li>mdnsrespon.exe</li>
<li>winstackxx.exe</li>
</ul>
<h3>SpyEye Associated Registry Values and Keys</h3>
<p>A hidden registry key is created so that the malware runs at every system restart></p>
<ul>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\cleansweep.exe=C:\cleansweep.exe\cleansweep.exe</li>
</ul>
<p>Tampers with system internet settings by modifying these keys:</p>
<ul>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\EnableHttp1_1=0</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyHttp1.1=0</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\WarnonBadCertRecving=0</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\WarnOnPostRedirect=0</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\WarnOnIntranet=0</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0 1409</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0 1609</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0 1406</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\1 1406</li>
</ul>
<h4>How to remove SpyEye – SpyEye Removal</h4>
<p>Run a full-system scan with an up-to-date antivirus and optionally an antimalware product to find and remove Zeus (Zbot) infection.</p>
<p><b>Recommended free antivirus software</b>:</p>
<ul>
<li><a  href="http://www.free-av.de/en/trialpay_download/1/avira_antivir_personal__free_antivirus.html">Avira AntiVir Personal – FREE Antivirus</a></li>
<li><a  href="http://free.avg.com/download-avg-anti-virus-free-edition">AVG Anti-Virus Free Edition</a></li>
<li><a  href="http://www.avast.com/eng/download-avast-home.html">avast! antivirus Home Edition</a></li>
<li><a  href="http://www.microsoft.com/Security_Essentials/">Microsoft Security Essentials</a></li>
</ul>
<p>Alternatively an online malware scanner like <a  href="http://housecall.trendmicro.com/">Trend Micro HouseCall</a> or <a  href="http://onecare.live.com/site/en-US/default.htm">Windows Live OneCare safety scanner</a> may also be used to scan your system for bot infection. More <a  href="http://www.malwarehelp.org/online_anti_virus_scanners.html">Online Anti-virus Scanners</a>.</p>
<p><b>Recommended free antimalware software</b>:</p>
<ul>
<li><a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">MalwareBytes’s Anti-Malware</a> &#8211; Direct Download</li>
<li><a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=81__zoneid=0__log=no__cb=cf157cd235__oadest=http%3A%2F%2Fwww.superantispyware.com%2Fsuperantispyware.html%3Frid%3D3596">SuperAntiSpyware</a></li>
</ul>
<p>Related: <a  href="http://www.malwarehelp.org/is-your-pc-part-of-a-zombie-botnet-check-now-2009.html"><strong>Is your PC part of a Zombie Botnet? Check now!</strong></a></p>
<p>Sources of Information</p>
<ul>
<li><a  href="http://www.microsoft.com/security/portal/">Microsoft Malware Protection Center</a></li>
<li><a  href="http://www.norman.com/security_center/en">Security Center | Norman</a></li>
<li><a  href="http://www.symantec.com/security_response/">Symantec Security Response</a></li>
</ul>
<p><p>Advt<br />
Limited period offer!<br />
<a  href="http://www.malwarehelp.org/security_software_coupons.html" target="_blank" title="Click to find more offers on Security Software!!!'">Genuine Security software at discounted rates!</a></p>
<p><small>Author: Shanmuga<br /> <br />
Copyright &copy; 2005 &#8211; 2012, malwarehelp.org</small></p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/find-and-remove-spyeye-trojan-2011.html">Find and Remove SpyEye Banking Trojan</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.malwarehelp.org/find-and-remove-spyeye-trojan-2011.html/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">2780</post-id>	</item>
		<item>
		<title>Recommended Reads – 26 March 2011</title>
		<link>http://www.malwarehelp.org/recommended-reads-%e2%80%93-26-march-2011.html</link>
		<comments>http://www.malwarehelp.org/recommended-reads-%e2%80%93-26-march-2011.html#respond</comments>
		<pubDate>Sat, 26 Mar 2011 13:30:48 +0000</pubDate>
		<dc:creator><![CDATA[Shanmuga]]></dc:creator>
				<category><![CDATA[Recommended Reads]]></category>

		<guid isPermaLink="false">http://www.malwarehelp.org/?p=2774</guid>
		<description><![CDATA[<p>FireEye Malware Intelligence Lab: An overview of Rustock &#8211; &#8220;As you might have seen in the news, the largest spam botnet, Rustock, was recently taken down in a collaborated, coordinated way. All parties involved were bound by a sealed federal lawsuit against the John Doe&#8217;s involved, but now that the case has been unsealed, it&#8217;s [...]</p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/recommended-reads-%e2%80%93-26-march-2011.html">Recommended Reads – 26 March 2011</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p></p><p><a  href="http://blog.fireeye.com/research/2011/03/an-overview-of-rustock.html?utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+FE_research+%28FireEye+Malware+Intelligence+Lab%29">FireEye Malware Intelligence Lab: An overview of Rustock</a> &#8211; &#8220;As you might have seen in the news, the largest spam botnet, Rustock, was recently taken down in a collaborated, coordinated way. All parties involved were bound by a sealed federal lawsuit against the John Doe&#8217;s involved, but now that the case has been unsealed, it&#8217;s time to talk about a few of the details.&#8221;</p>
<p><a  href="http://4sysops.com/archives/how-to-turn-off-data-execution-prevention-dep/?utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+4sysops+%284sysops%29">How to turn off Data Execution Prevention (DEP) &#8211; 4sysops</a> &#8211; &#8220;Data Execution Prevention (DEP) is a security feature of the CPU that prevents an application from executing code from a non-executable memory region. This is supposed to prevent buffer overflow attacks from succeeding.&#8221;</p>
<p><a  href="http://www.computerworld.com/s/article/9215021/Java_updates_may_include_annoying_McAfee_scanner?utm_campaign=Feed:%20computerworld/s/feed/topic/17%20(Computerworld%20Security%20News)&#038;utm_medium=feed&#038;utm_source=feedburner&#038;source=rss_security">Java updates may include annoying McAfee scanner &#8211; Computerworld</a> &#8211; &#8220;Windows users who install the latest Java security patches may end up with a little more security than they bargained for, at least that&#8217;s the risk they take if they don&#8217;t pay close attention to the installation process.&#8221;</p>
<p><a  href="http://www.msnbc.msn.com/id/42239031/ns/business-consumer_news/">ConsumerMan: Who&#8217;s tracking you online?</a> &#8211; &#8220;Don&#8217;t look now, but you&#8217;re being tracked — some might say stalked — whenever you go online. Information about the sites you visit, the things you buy and the topics you search is used to build a detailed profile about you. In most cases, this is done without your knowledge or consent.&#8221;</p>
<p><a  href="http://howto.techworld.com/security/3266681/how-to-stop-your-boss-spying-on-you-at-work/?olo=rss">How to stop your boss spying on you at work &#8211; How-to &#8211; Techworld.com</a> &#8211; &#8220;Privacy may be dead, but that doesn&#8217;t mean you have to enjoy having your every electronic move tracked by your nosy manager.&#8221;</p>
<p><a  href="http://erratasec.blogspot.com/2011/03/brief-introduction-to-web-certificates.html">Errata Security: A brief introduction to web &quot;certificates&quot;</a> &#8211; &#8220;The company Comodo is what’s called a “Certificate Authority”. A hacker tricked them into issuing “certificates” for companies like Microsoft and Google. This would allow anybody who could tap the network between you and those websites to decrypt otherwise encrypted traffic. This somebody would have to somebody in-line with the network, like a hacker next to you in a coffee shop, or the Iranian government wiretapping the ISP.    This document explains how SSL is protects against such attacks, and how the bogus Comodo certificates defeat those protections.&#8221;</p>
<p><a  href="http://www.macworld.com/article/158131/2011/02/privacy_data_theft.html">Protect your privacy: what happens to your data?</a> &#8211; &#8220;When criminals obtain your e-mail address, credit card, or Social Security Number, your information enters an underground economy where it’s sold, bought, and (maybe) eventually used in a crime.&#8221;</p>
<p><p>Advt<br />
Limited period offer!<br />
<a  href="http://www.malwarehelp.org/security_software_coupons.html" target="_blank" title="Click to find more offers on Security Software!!!'">Genuine Security software at discounted rates!</a></p>
<p><small>Author: Shanmuga<br /> <br />
Copyright &copy; 2005 &#8211; 2012, malwarehelp.org</small></p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/recommended-reads-%e2%80%93-26-march-2011.html">Recommended Reads – 26 March 2011</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.malwarehelp.org/recommended-reads-%e2%80%93-26-march-2011.html/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">2774</post-id>	</item>
		<item>
		<title>CleanThis Removal and Analysis</title>
		<link>http://www.malwarehelp.org/cleanthis-removal-2011.html</link>
		<comments>http://www.malwarehelp.org/cleanthis-removal-2011.html#comments</comments>
		<pubDate>Wed, 23 Mar 2011 05:07:45 +0000</pubDate>
		<dc:creator><![CDATA[Shanmuga]]></dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Rogue Security Software]]></category>
		<category><![CDATA[spyware removal]]></category>
		<category><![CDATA[CleanThis]]></category>
		<category><![CDATA[CleanThis removal]]></category>
		<category><![CDATA[remove CleanThis]]></category>
		<category><![CDATA[rogue security software]]></category>

		<guid isPermaLink="false">http://www.malwarehelp.org/?p=2764</guid>
		<description><![CDATA[<p>CleanThis scareware uses the Fake Security Essentials Alert to download itself on to the victim&#8217;s computer. Once installed, this rogue software proceeds to restart the system automatically, on restart access to the desktop is completely blocked. Taskbar is hidden, right click is disabled and the fake scan is run identifying non-existent malware. You cannot close [...]</p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/cleanthis-removal-2011.html">CleanThis Removal and Analysis</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a  class="post_image_link" href="http://www.malwarehelp.org/cleanthis-removal-2011.html" title="Permanent link to CleanThis Removal and Analysis"><img class="post_image alignleft" src="https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/cleanthis-100x100.png?resize=100%2C100" width="100" height="100" alt="Post image for CleanThis Removal and Analysis" data-recalc-dims="1" /></a>
</p><p>CleanThis scareware uses the <a  href="http://www.malwarehelp.org/fake-security-essentials-alert-removal-2011.html">Fake Security Essentials Alert</a> to download itself on to the victim&#8217;s computer. Once installed, this rogue software proceeds to restart the system automatically, on restart access to the desktop is completely blocked. Taskbar is hidden, right click is disabled and the fake scan is run identifying non-existent malware. You cannot close it or kill it using the Task manager. CleanThis malware manages to run even safe mode and safe mode with networking. </p>
<p>Scareware like CleanThis are commonly installed when users are redirected to fake online scanner pages or fake &#8216;video codec required&#8217; pages distributed throughout the Web by cyber criminals using blackhat SEO techniques, Spam and Malicious flash advertisements.</p>
<div id="attachment_2766" class="wp-caption aligncenter" style="width: 590px">
	<a  href="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/cleanthis_-2.png" class="thickbox no_icon" title="Desktop hijacked by CleanThis Malware"><img data-attachment-id="2766" data-permalink="http://www.malwarehelp.org/cleanthis-removal-2011.html/cleanthis_-2/" data-orig-file="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/cleanthis_-2.png?fit=799%2C600" data-orig-size="799,600" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Desktop hijacked by CleanThis Malware" data-image-description="&lt;p&gt;Desktop hijacked by CleanThis Malware&lt;/p&gt;
" data-medium-file="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/cleanthis_-2.png?fit=300%2C225" data-large-file="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/cleanthis_-2.png?fit=590%2C443" src="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/cleanthis_-2.png?resize=590%2C443" alt="Image of CleanThis" title="Desktop hijacked by CleanThis Malware" width="590" height="443" class="size-large wp-image-2766" srcset="https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/cleanthis_-2.png?resize=590%2C443 590w, https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/cleanthis_-2.png?resize=300%2C225 300w, https://i1.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/cleanthis_-2.png?w=799 799w" sizes="(max-width: 590px) 100vw, 590px" data-recalc-dims="1" /></a>
	<p class="wp-caption-text">Desktop hijacked by CleanThis Rogue security software</p>
</div>
<h2>CleanThis Removal (How to remove CleanThis)</h2>
<p><b>Download the following from an alternate computer and copy to a removable drive like CD, DVD or USB stick:</b></p>
<ul>
<li>Download <a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank"><b>MalwareBytes&#8217;s Anti-Malware Free edition</b></a>(mbam-setup.exe)</li>
<p></p>
<li>Right click and save the file <a  href="http://www.malwarehelp.org/downloads/shell_restore.inf">shell_restore.inf</a>, make sure that you are saving the file with a .inf extension.</li>
<p></p>
<li>Boot in to Windows <a  linkindex="62" href="http://www.malwarehelp.org/restart-into-safe-mode-how-to-2010.html">Safe Mode with Command Prompt</a></li>
<p>
<a  href="https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/safe-mode-with-command-prompt.gif" class="thickbox no_icon" title="safe-mode-with-command-prompt"><img data-attachment-id="2767" data-permalink="http://www.malwarehelp.org/cleanthis-removal-2011.html/safe-mode-with-command-prompt/" data-orig-file="https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/safe-mode-with-command-prompt.gif?fit=590%2C292" data-orig-size="590,292" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="safe-mode-with-command-prompt" data-image-description="&lt;p&gt;safe-mode-with-command-prompt&lt;/p&gt;
" data-medium-file="https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/safe-mode-with-command-prompt.gif?fit=300%2C148" data-large-file="https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/safe-mode-with-command-prompt.gif?fit=590%2C292" src="https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/safe-mode-with-command-prompt.gif?resize=590%2C292" alt="safe-mode-with-command-prompt" title="safe-mode-with-command-prompt" width="590" height="292" class="aligncenter size-full wp-image-2767" srcset="https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/safe-mode-with-command-prompt.gif?w=590 590w, https://i2.wp.com/www.malwarehelp.org/blog/wp-content/uploads/2011/03/safe-mode-with-command-prompt.gif?resize=300%2C148 300w" sizes="(max-width: 590px) 100vw, 590px" data-recalc-dims="1" /></a></p>
<li>At the command prompt type “<b>explorer.exe</b>” and press the <b>Enter</b> key, wait for Windows Explorer to open. Now from Windows start button access <strong>My Computer</strong> and browse to your removable drive.</li>
<p></p>
<li>Right click the downloaded file (<a  href="http://www.malwarehelp.org/downloads/shell_restore.inf">shell_restore.inf</a>) and choose the option for install. There will not be any visual confirmation/notification. This will restore the default Windows Shell which will prevent the scareware from running at boot.</li>
<p></p>
<li>Restart in normal mode.</li>
<p></p>
<li>Double-click<b> mbam-setup.exe</b> to start the installation. Proceed with installation following the prompts. Make sure that the following option is checked when you finish the installation: <strong>Update Malwarebytes’ Anti-Malware</strong>.</li>
<p></p>
<li>Once the update is completed, <strong>Launch Malwarebytes’ Anti-Malware</strong> and select <b>Perform full scan</b> in the Scanner tab. When the scan is completed, click “<b>Show results</b>“, confirm that all instances of the rogue security software are check-marked and then click “<b>Remove Selected</b>” to delete them. If prompted restart immediately to complete the removal process.</li>
<p></p>
<li><a  linkindex="64" href="http://www.malwarehelp.org/how-to-disable-enable-system-restore-turn-system-restore-on-or-off.html">Turn System Restore off and on</a>.</li>
</ul>
<p>You should now be clean of this rogue.</p>
<p>The full version of Malwarebytes&#8217; Anti-Malware performs brilliantly against scareware such as CleanThis. The real-time component of the paid version includes dynamic blocking of malicious websites, servers and prevents execution of malware. It would caution you before most rogue security software could install itself. Please consider purchasing the <a  href="http://vilambarams.malwarehelp.org/www/delivery/ck.php?oaparams=2__bannerid=83__zoneid=0__log=no__cb=64251ffcc7__oadest=https%3A%2F%2Fstore.malwarebytes.org%2F342%2Fcookie%3Faffiliate%3D2356%26redirectto%3Dhttp%253a%252f%252fwww.malwarebytes.org%252fmbam-download-exe.php%26product%3D29945" target="_blank">Malwarebytes&#8217; Anti-Malware Full version</a> for additional protection.</p>
<h2>CleanThis Analysis</h2>
<p>A rogue security software such as CleanThis belongs to a family of software products that call themselves as antivirus, antispyware or registry cleaners and often use deceptive or high pressure sales tactics and deliberate false positives to convince users into buying a license/subscription. They are often repackaged and renamed. They do not actually remove malware instead many of them add more malware of their own. They need to be removed immediately from your system.</p>
<p>The trojan dropper file was about 619520 bytes in size. It was detected by 21/ 42 (50.0%) of the anti-virus engines available at VirusTotal.</p>
<p>This scareware is detected by the following aliases:</p>
<ul>
<li>Trojan/Win32.FakeAV</li>
<li>Win32:Malware-gen</li>
<li>Trojan.Win32.FakeAV.bmbd</li>
<li>Rogue:Win32/FakePAV</li>
<li>a variant of Win32/Adware.FakeAntiSpy.AA</li>
</ul>
<p>The following behavior was observed:</p>
<ul>
<li>Changes the size of the desktop wallpaper, disables right click on desktop. Taskbar is hidden.</li>
<p></p>
<li>Drops a file named <b>gog.exe</b> in the application data folder of the current user ( Example: C:\Documents and Settings\malwarehelp.org\Application Data\gog.exe)</li>
<p></p>
<li>Tampers with Windows registry and adds itself to the Winlogon\Shell key, so that it starts with Windows even in safe mode. (Example: HKEY_CURRENT_USER\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = C:\Documents and Settings\malwarehelp.org\Application Data\gog.exe)</li>
</ul>
<h2>Typical CleanThis Scare Messages</h2>
<blockquote><p>CleanThis has detected security threats on your PC. To remove please install the heuristic module. click here to install heuristic module.</p></blockquote>
<blockquote><p>Current settings don&#8217;t allow unprotected startup. Please check your settings.</p></blockquote>
<blockquote><p>Database update failed! Outdated viruses databases are not effective and can&#8217;t guarantee adequate protection and security for your PC! Click here to get the full version of the product and update the database!</p></blockquote>
<p>Users should not fall for the false alerts of system infection and buy the scareware to &#8216;clean&#8217; the system. If you purchased one by entering your credit card number at a rogue software website, it would be prudent to:</p>
<ul>
<li>Immediately contact the bank that issued the card and dispute the charges.</li>
<li>Request them to not allow any further transaction and cancel the card. You may also request them to issue a new card with a different number.</li>
</ul>
<h2>CleanThis Associated Files and Folders</h2>
<ul>
<li>C:\Documents and Settings\malwarehelp.org\Application Data\1.gif</li>
<li>C:\Documents and Settings\malwarehelp.org\Application Data\completescan</li>
<li>C:\Documents and Settings\malwarehelp.org\Application Data\gog.exe</li>
<li>C:\Documents and Settings\malwarehelp.org\Application Data\install</li>
<li>C:\Documents and Settings\malwarehelp.org\Desktop\Clean This.lnk</li>
</ul>
<p><i>Some of the file names may be randomly generated. The term malwarehelp.org or malwarehelp in the above entries denotes the name of the Windows user account in the test machine.</i></p>
<h2>CleanThis Associated Registry Values and Keys</h2>
<ul>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell=C:\Documents and Settings\malwarehelp.org\Application Data\gog.exe</li>
<li>HKEY_CURRENT_USER\Control Panel\Desktop\WallpaperStyle=0</li>
<li>HKEY_CURRENT_USER\Control Panel\Desktop\Pattern=</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\GeneralFlags=0</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\General\WallpaperStyle=0</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\General\Wallpaper=%APPDATA%\1.gif</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\WarnOnPost=0</li>
<li>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\WarnonBadCertRecving=0</li>
</ul>
<p><i>The term malwarehelp.org or malwarehelp in the above entries denotes the name of the Windows user account in the test machine. Manually editing the registry is NOT recommended.</i></p>
<h2>CleanThis Associated Domains</h2>
<p>This scareware was observed accessing the following domains during installation and operation:</p>
<ul>
<li>configure-network-online .com</li>
</ul>
<p><u>Note: Visiting the domains mentioned above may harm your computer system.</u></p>
<p>Malwarebytes’ Anti-Malware should take care of the scareware completely. If you have difficulty in removing any other malware that might have creeped in with CleanThis, checkout <a  href="http://www.malwarehelp.org/how-to-remove-malware-with-kaspersky-free-tool.html">Kaspersky Virus Removal Tool</a> and <a  href="http://www.malwarehelp.org/remove-malware-using-kaspersky-rescue-disk-2011.html">Kaspersky Rescue Disk</a>.</p>
<p>If you are unable to get rid of this scareware, please visit one of the <a  linkindex="65" href="http://www.malwarehelp.org/recommended-online-forums-for-malware.html">recommended forums for malware help</a> and post about your problem.</p>
<h2>CleanThis Scareware — Screenshots</h2>
 [<a href="http://www.malwarehelp.org/cleanthis-removal-2011.html">See image gallery at www.malwarehelp.org</a>] 
<h2>CleanThis Scareware — Video</h2>
<p><a  href="http://www.malwarehelp.org/cleanthis-removal-2011.html"><img src="//i.ytimg.com/vi/TRPd0jX4wCI/hqdefault.jpg" alt="YouTube Video" /></a></p>
<p><i>Note: The CleanThis installation and removal was tested on a default installation of  Windows XP SP3. The content provided in this article is not warranted or guaranteed by Malware Help. Org. The content provided is intended for entertainment and/or educational purposes. I am not liable for any negative consequences that may result from implementing any information covered in this article. The above information is correct at the time of my testing, it might change with time and or under different testing conditions.</i></p>
<p><p>Limited period offer!<br />
<a  href="http://www.malwarehelp.org/security_software_coupons.html#Avast"><b>$10.00 Off avast! Internet Security Version 7</b></a></p></p>
<p>The post <a rel="nofollow" href="http://www.malwarehelp.org/cleanthis-removal-2011.html">CleanThis Removal and Analysis</a> appeared first on <a rel="nofollow" href="http://www.malwarehelp.org">Malware Help. Org</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.malwarehelp.org/cleanthis-removal-2011.html/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">2764</post-id>	</item>
	</channel>
</rss>
