Antimalware Tool

Despite its generic name, Antimalware Tool is not a program that can be trusted. Chances are, if you have Antimalware Tool on your computer you can tell, by the way, that Antimalware Tool prevents you from doing anything with your own PC that it isn't up to any good. Antimalware Tool pretends to be a security application, in order to scare you into paying money for a worthless license, but Antimalware Tool is malware.

Problems Caused by Antimalware Tool

Antimalware Tool relies heavily on scare tactics in order to try to persuade you to go to Antimalware Tool's bogus website and pay to "activate" the Antimalware Tool software. Antimalware Tool will try to convince you that your computer is infected with some very dangerous viruses and that your information is under attack or is in danger of being stolen. After Antimalware Tool installs itself, Antimalware Tool will set itself up to run every time that Windows boots. So every time you start your computer, you will see the Antimalware Tool user interface, which will play a progress animation in order to simulate a scan of your PC. This fake scans always turn up results, and Antimalware Tool will even tell you the names of specific threats that Antimalware Tool claims to have found, but all of the names are fake. Antimalware Tool does this so that it can tell you that the only way to remove these supposed threats is for you to pay the activation fee.

After the interface clears – because you will not be able to skip Antimalware Tool or stop the bogus scan – Antimalware Tool will continue to try to scare you by showing fake security alerts. Generally, these alerts are very vague, and they will say that your computer is under attack, that some kind of malware has been detected, or that your data is in danger of "leakage" (whatever that means). These alerts come with prompts and reminders that tell you to “activate” Antimalware Tool, and just like the prompts provided after the fake scans, they will take you to the payment site for the Antimalware Tool scam if you follow them.

In order to prevent you from removing it, Antimalware Tool blocks all other programs from starting, except the web browser. Whenever you try to start another program, Antimalware Tool will stop it, and then tell you that the reason for this was that the program was infected or dangerous. Unfortunately, the availability of your web browser is not as good a thing as it might seem, because Antimalware Tool will prevent you from viewing any site other than Antimalware Tool's own. When you try to go to another site, Antimalware Tool will either redirect you, or show you a fake security error screen that includes links to the Antimalware Tool site.

Where Does Antimalware Tool Come From?

Antimalware Tool comes from a large family of fake anti-malware programs, the family and Antimalware Tool is very nearly identical to most of them. All of these fake security applications are installed by a Trojan, which is usually hidden in a video codec, program update, or other infected file that you download. Some of the other rogue security applications related to Antimalware Tool are

Proof of Antimalware Tool's relationship to these other threats can be found in some of Antimalware Tool's error messages, which will mention Smart Security instead of Antimalware Tool. No matter what this malware is called, the whole family is part of a widespread Russian Internet scam. No amount of money can turn Antimalware Tool into the software that Antimalware Tool claims to be.

File System Details

Antimalware Tool may create the following file(s):
# File Name Detections
1. %UserProfile%\Application Data\.exe

Registry Details

Antimalware Tool may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe "Debugger" = 'svchost.exe'
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" = '%UserProfile%\Application Data\.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe "Debugger" = 'svchost.exe'

Trending

Most Viewed

Loading...