EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
|Threat Level:||100 % (High)|
|First Seen:||November 30, 2010|
|Last Seen:||January 23, 2022|
The Rogue:Win32/FakeVimes family of malware is a group of fake security applications that has been prevalent since at least 2009. There are numerous fake security programs belonging to the FakeVimes family, including earlier rogue anti-virus programs like Malware Catcher 2009 and Smart Engine, as well as other Rogue:Win32/FakeVimes clones that include such fake security applications as The presence of malware belonging to the Rogue:Win32/FakeVimes family on your computer is a severe intrusion into your computer's security and can be devastating if not treated immediately with a real, reliable and advanced anti-malware application. Basically, any program in the Rogue:Win32/FakeVimes family of malware claims that they scan your computer system for malware, but actually does nothing but harass the victim with constant fake warnings claiming that the victim's computer is infected. The catch is that FakeVimes programs claim that they will only remove these nonexistent problems if the victim is willing to purchase a registration code for a "full version" of Rogue:Win32/FakeVimes responsible for the attack. Rogue:Win32/FakeVimes has been known to use trademarked logos and product names in order to disguise themselves as legitimate security programs.
How Rogue:Win32/FakeVimes Attacks your Computer System
FakeVimes programs have been known to carry out browser hijacking and web browser redirects. The presence of an invasive fake security program and constant fake security alerts on your computer are the main symptoms of an infection with a Rogue:Win32/FakeVimes threat. FakeVimes programs are particularly dangerous because they tend not to be limited to spamming their victims with fake error messages. Members of the Rogue:Win32/FakeVimes family of malware have been known to disable known security programs as well as being able to stop file processes corresponding to applications that are often useful when dealing with malware.
FakeVimes programs can also bypass the Windows firewall, connect to a remote server and make dangerous changes to the Windows Registry. Recent members of the Rogue:Win32/FakeVimes family, particularly in 2012, have been known to be bundled with a rootkit component. This means that, while malware researchers have been able to update security software in order to deal with Rogue:Win32/FakeVimes infections, the rootkit component makes the Rogue:Win32/FakeVimes infection undetectable. In these cases, an anti-rootkit application may be necessary before trying to remove the Rogue:Win32/FakeVimes infection itself.
15 security vendors flagged this file as malicious.
|NOD32||a variant of Win32/Kryptik.GUW|
SpyHunter Detects & Remove FakeVimes
File System Details
Detections: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.