TrustNinja

TrustNinja (also known as Trust Ninja) is a fake optimization tool presented as a useful program in order to gain the trust of the user. TrustNinja that is a member of the FakeSmoke family, must be installed manually, and once active, begins display fake infection results in order to trick the user into believing that the computer has been compromised. The user is then prompted to purchase the commercial version of TrustNinja in order to combat these threats or fix the various problems.

The family of TrustNinja has various members, all of them clones of TrustNinja. These members include WiniFighter, WiniShield, SaveKeep, SaveKeeper, SoftSafeness, TrustWarrior, WiniGuard, SecurityFighter, Security Soldier, SecureVeteran, Secure Warrior, Trust Cop, Safe Fighter, Trust Soldier, Virus Protector, BlockDefense, Security Soldier, SaveDefense, SystemCop.

SpyHunter Detects & Remove TrustNinja

File System Details

TrustNinja may create the following file(s):
# File Name MD5 Detections
1. %ProgramFiles%\TrustNinja Software\TrustNinja\uninstall.exe
2. %ProgramFiles%\TrustNinja Software\TrustNinja\TrustNinjaSvc.exe
3. %Temp%\nsm2.tmp\nsSCM.dll
4. %ProgramFiles%\TrustNinja Software\TrustNinja\TrustNinja.exe
5. %Temp%\nsm2.tmp\nsProcess.dll
6. %ProgramFiles%\TrustNinja Software\TrustNinja\data.bin
7. %Documents and Settings%\All Users\Start Menu\Programs\TrustNinja\2 Homepage.lnk
8. TrustNinja
9. %ProgramFiles%\TrustNinja Software\TrustNinja
10. %Documents and Settings%\All Users\Start Menu\Programs\TrustNinja\1 TrustNinja.lnk
11. %Program Files%\TrustNinja Software
12. %Documents and Settings%\All Users\Desktop\TrustNinja.lnk
13. %ProgramFiles%\TrustNinja Software\TrustNinja\license.txt
14. %Documents and Settings%\All Users\Start Menu\Programs\TrustNinja\3 Uninstall.lnk
15. %ProgramFiles%\TrustNinja Software
16. TrustNinja.exe c9f6764aede6c4384af2d50bf00e6da8 0
17. TrustNinjaSvc.exe e92f901fb0a487d9aac6ae40b8e05d56 0

Registry Details

TrustNinja may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\TrustNinja
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “TrustNinja”
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_TRUSTNINJASVC\0000\Control
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TrustNinjaSvc\Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TrustNinjaSvc\Enum
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\TrustNinja
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TrustNinjaSvc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_TRUSTNINJASVC\0000
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_TRUSTNINJASVC\0000\Control
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TrustNinjaSvc\Security
HKEY_CURRENT_USER\Software\TrustNinja
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TrustNinjaSvc
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_TRUSTNINJASVC
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_TRUSTNINJASVC\0000
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TrustNinjaSvc\Enum
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_TRUSTNINJASVC

URLs

TrustNinja may call the following URLs:

akeoqpxcer.com
probanitos.com
trustninja.com

1 Comment

Hey, subtle must be your middle name. Great post!

Trending

Most Viewed

Loading...