Threat Database Rogue Anti-Spyware Program Windows Antibreach Module

Windows Antibreach Module

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 8
First Seen: November 21, 2014
Last Seen: August 27, 2019
OS(es) Affected: Windows

Windows Antibreach Module is a fraudulent anti-spyware product known to belong to the FakeVimes family of threats. Within this family of threats, the Windows Antibreach Module program uses the same interface as other applications that ill-minded persons have marketed as programs designed to detect and remove threats on a PC. The catch with Windows Antibreach Module is that Windows Antibreach Module does exactly the opposite; Windows Antibreach Module is the actual infection present on your computer. Windows Antibreach Module do not have the ability to remove real threats from any system. Windows Antibreach Module is basically designed by hackers who want to take money from naive computer users. To accomplish its intent, Windows Antibreach Module does whatever it takes to convince the affected computer user to purchase its good for nothing security program.The best approach to take when Windows Antibreach Module is installed on a computer is to obtain a trusted anti-malware program to remove Windows Antibreach Module at once.

Other applications that belong to the Windows Antibreach Module family include Virus Melt, Presto TuneUp, Fast Antivirus 2009, Extra Antivirus, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, PC Live Guard, Live PC Care, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus, Smart Security, Windows Protection Suite, Windows Work Catalyst.

SpyHunter Detects & Remove Windows Antibreach Module

File System Details

Windows Antibreach Module may create the following file(s):
# File Name MD5 Detections
1. fake.exe ba4332c134a70ecdd130468f2cfa2c81 4
2. %AllUsersProfile%\Start Menu\Programs\Windows AntiBreach Module.lnk
3. %UserProfile%\Desktop\Windows AntiBreach Module.lnk
4. %AppData%\data.sec

Registry Details

Windows Antibreach Module may create the following registry entry or registry entries:
File name without path
Windows AntiBreach Module.lnk
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "EnableVirtualization" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "EnableLUA" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorUser" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorAdmin" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" = "%AppData%\svc-.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments "SaveZoneInformation" = 1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations "LowRiskFileTypes" = ".zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;"
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bckd "ImagePath" = 22.sys
HKEY_LOCAL_MACHINE\Software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe

Trending

Most Viewed

Loading...