Threat Database Rogue Anti-Spyware Program Windows Attacks Preventor

Windows Attacks Preventor

Windows Attacks Preventor Image

Do not trust Windows Attacks Preventor; this fake security program has no way of preventing attacks against your computer system. In fact, Windows Attacks Preventor is one of the components of a dangerous Trojan attack that invades your computer in an attempt to convince you to purchase useless bogus security programs like Windows Attacks Preventor itself. According to ESG security analysts, Windows Attacks Preventor is part of a large family of malware called WinWeb Security that was noted since at least 2009. A large batch of clones of this fake security program (which includes such gems as Virus Doctor and Windows Attacks Defender) has been released in January and February of 2012, reminding PC security analysts that the criminals behind these fake security programs are still at large and producing malicious software in order to scam their victims.

Windows Attacks Preventor and its clones all carry out the same basic scam which is associated with a kind of malware infection commonly known as a rogue security program. These fake security applications enter the victim's computer without authorization and pass themselves off as legitimate anti-virus or anti-spyware scanners. Then, they display a fake infection report that claims that the victim's computer is hopelessly infected with malware. Inexperienced computer users, who panic at the prospect of losing their data and expensive investment, will often fall for the Windows Attacks Preventor and convince themselves to purchase a useless version of this fake security program in order to remove the nonexistent threats from their computer.

Windows Attacks Preventor Often Spreads Using Fake Online Malware Scans

An online version of the same scam serves to distribute Windows Attacks Preventor, installing Windows Attacks Preventor onto the victim's computer, often with the victim's own cooperation. Basically, criminals use advertisements promising a fake malware scan that evaluates the health of a computer system. Inexperienced computer users may click on this advertisement, unable to resist the promise of a free diagnostic. However, the results of this fake scan are always alarming, and proceed to urge the victim to download and install Windows Attacks Preventor, a 'free anti-malware solution to fix these problems. It is not until the victim has installed Windows Attacks Preventor that Windows Attacks Preventor claims that the problems can only be fixed by purchasing a 'full version of Windows Attacks Preventor. Do not fall for this scam. Your anti-virus services should always be provided by competent, reputable anti-malware programs; never by advertisements for 'free malware scans on the Internet.

Other fake security programs that belong to tje WinWebSec family and are clones of Windows Attacks Preventor include System Security, Antivirus Security, Total Security 2009, Security Tool, Trojan.RogueAV.a.gen, System Adware Scanner 2010, FakeAlert-KW.e, Advanced Security Tool 2010, System Tool 2011, Security Shield, MS Removal Tool, Total Security, System Security 2011, Essential Cleaner, Security Shield Pro 2011, Personal Shield Pro, Security Shield 2011, Security Sphere 2012, Advanced PC Shield 2012, Futurro Antivirus. ScreenshotScreenshotScreenshotScreenshotScreenshotScreenshotScreenshotScreenshotScreenshotScreenshotScreenshot

SpyHunter Detects & Remove Windows Attacks Preventor

Windows Attacks Preventor Video

Tip: Turn your sound ON and watch the video in Full Screen mode.

File System Details

Windows Attacks Preventor may create the following file(s):
# File Name MD5 Detections
1. %AppData%\Protector-.exe
2. %AppData%\NPSWF32.dll
3. %AppData%\result.db
4. %Desktop%\Windows Attacks Preventor.lnk
5. %CommonStartMenu%\Programs\Windows Attacks Preventor.lnk
6. Protector-grd.exe d8bd1894b3f5ad2daf8499a6136f2c98 0

Registry Details

Windows Attacks Preventor may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "UID" = "fneqtdmtpi"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegistryTools" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\windows Police Pro.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oasrv.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avxmonitor9x.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "net" = 2012-3-1_2
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegedit" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symtray.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmod.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashCnsnt.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Inspector"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fnrb32.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ERROR_PAGE_BYPASS_ZONE_CHECK_FOR_HTTPS_KB954312

Messages

The following messages associated with Windows Attacks Preventor were found:

Error
Software without a digital signature detected.
Your system files are at risk. We strongly advise you to activate your protection.
Warning! Virus Detected
Threat detected: FTP Server
Infected file: C:WindowsSystem32dllcachewmpshell.dll
rror
Keylogger activity detected. System information security is at risk.
It is recommended to activate protection and run a full system scan.

Trending

Most Viewed

Loading...