Threat Database Rogue Anti-Spyware Program Windows Foolproof Protector

Windows Foolproof Protector

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 3
First Seen: April 13, 2012
OS(es) Affected: Windows

Windows Foolproof Protector Image

Since early 2012, ESG malware analysts have been receiving reports of a large batch of rogue security applications in the FakeVimes family of malware. Although this family of rogue security programs has been active and continually updated since 2009, this recent release includes a dangerous rootkit component that can be quite difficult to remove.

Windows Foolproof Protector is one of the dozens of clones in this batch of FakeVimes prorgams that include that rootkit component. ESG malware researchers have identified this rootkit as a variant of the infamous ZeroAccess infection. This means that, even though most security programs can remove FakeVimes malware quite easily, FakeVimes rogue anti-virus programs released in this 2012 batch are particularly difficult because they require a specialized anti-rootkit tool.

There are dozens of clones of Windows Foolproof Protector with new ones being detected every day. Some examples of these include malware with names like Virus Melt, Presto TuneUp, Fast Antivirus 2009, Extra Antivirus, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, PC Live Guard, Live PC Care, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus, Smart Security, Windows Protection Suite, Windows Work Catalyst. ESG security analysts recommend using an appropriate anti-malware program containing anti-rootkit technology to remove Windows Foolproof Protector's crucial associated rootkit component.

A Brief Description of How Windows Foolproof Protector Attempts to Steal Your Money

The Windows Foolproof Protector scam has been around unaltered for nearly a decade in some version or another. Basically, criminals create malware which they then market as an anti-virus or anti-malware program. By programming their malware so that it will display error messages and alarming security alerts, criminals can make their victims panic in order to convince them to purchase or 'register' their fake security program. The Windows Foolproof Protector scam follows this model faithfully. However, Windows Foolproof Protector contains some nasty components designed to detect real security software on the victim's computer and to disable it. Windows Foolproof Protector can also disable vital Windows components like System Restore, the Registry Editor and the Task Manager in order to make the removal of Windows Foolproof Protector much more difficult for the victim. If Windows Foolproof Protector's self-defense features are making removal of this threat difficult, it is often effective to start up Windows in Safe Mode. This can prevent some of Windows Foolproof Protector's more nasty components from starting up automatically, giving the victim a chance to use a powerful anti-malware tool to detect and destroy Windows Foolproof Protector.

SpyHunter Detects & Remove Windows Foolproof Protector

Windows Foolproof Protector Video

Tip: Turn your sound ON and watch the video in Full Screen mode.

File System Details

Windows Foolproof Protector may create the following file(s):
# File Name MD5 Detections
1. Protector-efhc.exe 393af3c7306664675f094c1ad1f04d6f 2
2. Protector-oerw.exe e2610eadd19e12e745cafbc8662d6c45 1
3. %AppData%\NPSWF32.dll
4. %AppData%\Protector-.exe
5. %AppData%\result.db
6. %Desktop%\Windows Foolproof Protector.lnk
7. %CommonStartMenu%\Programs\Windows Foolproof Protector.lnk

Registry Details

Windows Foolproof Protector may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorAdmin" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "UID" = "ahwohainwk"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atcon.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\inetlnfo.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvp95.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ozn695m5.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "EnableLUA" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "net" = "2012-4-7_2"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswUpdSv.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswRunDll.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bidef.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winupdate.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegistryTools" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegedit" = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorUser" = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Inspector"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\advxdwin.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tds-3.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rtvscn95.exe

Messages

The following messages associated with Windows Foolproof Protector were found:

Error
Trojan activity detected. System data security is at risk.
It is recommended to activate protection and run a full system scan.
Warning
Firewall has blocked a program from accessing the Internet
C:\program files\internet explorer\iexplore.exe
is suspected to have infected your PC. This type of virus intercepts entered data and transmits them to a remote server.
Warning! Identity theft attempt Detected
Hidden connection IP: 58.82.12.124
Target: Your passwords for sites

Trending

Most Viewed

Loading...