Threat Database Rogue Anti-Spyware Program System Antivirus Microsoft 2011

System Antivirus Microsoft 2011

By ESGI Advisor in Rogue Anti-Spyware Program

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 20
First Seen: August 31, 2011
Last Seen: October 27, 2020
OS(es) Affected: Windows

System Antivirus Microsoft 2011 is a malicious Russian ransomware that attacks mainly Russian PC users; however, other Internet may also get infected by it if they're looking for some Russian porn on the web. System Antivirus Microsoft 2011 is able to block infected PC users from accessing their files and software programs until they pay a fee via the SMS text message ($17). The main key is to require unlock the corrupted PC and regain access. System Antivirus Microsoft 2011 declares that your machine was blocked because you were downloading/watching illegitimate videos. System Antivirus Microsoft 2011 also states that if you don't pay the ransom, you system files will be deleted. System Antivirus Microsoft 2011 is delivered via fraudulent porn websites. If your PC has been corrupted by System Antivirus Microsoft 2011, you can either enter a valid serial number or uninstall it manually. However, a valid serial number might not always work because attackers change it very often; besides, the phone numbers will work only in Russia. ESG's security analysts highly recommend you to remove System Antivirus Microsoft 2011 as soon as possible to avoid PC damage and financial losses.

SpyHunter Detects & Remove System Antivirus Microsoft 2011

File System Details

System Antivirus Microsoft 2011 may create the following file(s):
# File Name MD5 Detections
1. bc12568a-6ed4-4930-8d66-c4df8613f682.tmp 08725ffa2d3f4d93389e589f81c5e657 16
2. [SET OF RANDOM CHARACTERS].exe

Registry Details

System Antivirus Microsoft 2011 may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ "Shell" = "[SET OF RANDOM CHARACTERS].exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ Shell" = "[SET OF RANDOM CHARACTERS].exe"

Trending

Most Viewed

Loading...