Data Repair
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 80 % (High) |
Infected Computers: | 7 |
First Seen: | September 28, 2011 |
Last Seen: | December 14, 2020 |
OS(es) Affected: | Windows |
Data Repair is a fake defragmenter and system optimization tool. Data Repair is part of a large family of fake defragmenters, the FakeSysDef family, that have managed to build up a very real presence on the Web. Millions of dollars are stolen every year by fake security programs such as these. According to ESG security researchers, Data Repair has absolutely no system optimization or defragmenting capabilities. Underneath its showy exterior, Data Repair is little more than a handful of harmful scripts, Trojans and alarming error messages. This is why ESG malware analysts strongly recommend the removal of Data Repair with a reputable, effective anti-malware utility.
There are several clones of Data Repair, including fake defragmenters named System Defragmenter, Ultra Defragger, HDD Control, Win HDD, Win Defrag, Win Defragmenter, Disk Doctor, Hard Drive Diagnostic, HDD Diagnostic, HDD Plus, HDD Repair, HDD Rescue, Smart HDD, Defragmenter, HDD Tools, Disk Repair, Windows Optimization Center, Scanner, HDD Low, Hdd Fix.
Table of Contents
How Programs Like Data Repair Steal Your Money
Most rogue security programs use the same scam to steal a victim's money. Even though the rogue security software scam is fairly common, inexperienced computer users are still taken in by it every single day. This is why it is important to understand exactly how it goes; the best way to avoid falling for the Data Repair is to understand beforehand exactly how these scams work. The Data Repair scam follows the same basic steps as most rogue security software scams:
- Data Repair is installed onto the victim's computer with the aid of a Trojan or through deceptive marketing. Typically, a computer user will receive a fake error message – either as a pop-up window on their browser or as a fake security alert from a Trojan on the victim's computer system. This message will usually indicate that the PC is infected with a virus or Trojan and that the download of Data Repair is recommended in order to fix the problem.
- If the victim falls for this fake message and accepts it, Data Repair will be downloaded and installed. As part of its installation process, Data Repair makes harmful changes to the Windows Registry and installs a number of harmful components. Data Repair changes your system settings, so that Data Repair will run this fake optimization tool automatically upon start-up. It will also reboot your computer system at the end of installation, forcing you to start up with Data Repair already activated and running in the background.
- Upon start-up, Data Repair displays a fake scan of your computer system, indicating that there are a large number of impossibly-severe problems on your hard drives. However, whenever the victim tries to fix these problems (by clicking on the 'fix problems' button), Data Repair will redirect the victim to Data Repair's website where a purchase of a 'full version' will be requested. ESG security researchers strongly advise that you do not pay for Data Repair but, instead, remove Data Repair from your computer system.
File System Details
# | File Name |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|
1. | %Documents and Settings%\[User Name]\Local Settings\Application Data\[RANDOM CHARACTERS].exe | |
2. | %Documents and Settings%\[User Name]\Local Settings\Temp\smtmp\3 | |
3. | %Documents and Settings%\[User Name]\Start Menu\\Programs\Data Repair\ | |
4. | %Documents and Settings%\[User Name]\Desktop\Data Repair.lnk | |
5. | %Documents and Settings%\[User Name]\Local Settings\Temp\smtmp\2 | |
6. | %Documents and Settings%\[User Name]\Local Settings\Application Data\~ | |
7. | %Documents and Settings%\[User Name]\Start Menu\\Programs\Data Repair\Uninstall Data Repair.lnk | |
8. | %Documents and Settings%\[User Name]\Local Settings\Application Data\[RANDOM CHARACTERS] | |
9. | %Documents and Settings%\[User Name]\Local Settings\Temp\smtmp\1 | |
10. | %Documents and Settings%\[User Name]\Local Settings\Temp\smtmp\4 | |
11. | %Documents and Settings%\[User Name]\Start Menu\\Programs\Data Repair\Data Repair.lnk | |
12. | %Documents and Settings%\[User Name]\Local Settings\Temp\smtmp\ |