Threat Database Rogue Anti-Spyware Program Win 7 Internet Security 2012

Win 7 Internet Security 2012

By Domesticus in Rogue Anti-Spyware Program

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 16
First Seen: December 14, 2011
Last Seen: November 15, 2020
OS(es) Affected: Windows

Win 7 Internet Security 2012 Image

Win 7 Internet Security 2012 is a fraudulent security tool that will be installed on the corrupted computer system by simulating as an update for Windows security. When installed successfully, Win 7 Internet Security 2012 will configure itself to run automatically by adding its own entry on Windows registry. Win 7 Internet Security 2012 may gain control of the affected computer and command its operation to reroute a web browser to malicious websites. Win 7 Internet Security 2012 will block your Internet browser too. Each attempt to open a web browser will be accompanied by an alerting report about Trojan-BNK.Win32.Keylogger.gen infection supposedly keeping you from going online and using the Internet services via your web browser. That's tricky as well because there is no such thing as that computer trojan on your computer system. This web browser blocking is a part of the same routine as the already mentioned scanning and ad creating activity.

Win 7 Internet Security 2012 lures PC users and gives an impression of something you can rely on. Win 7 Internet Security 2012 scans your computer system but at the same time does not really check it for potential security threats. It means these reports following each scanner are full of malware infections listed in a long list. Even if you have a brand-new computer system, Win 7 Internet Security 2012 still warns you of numerous viruses in there. Win 7 Internet Security 2012 will be performing its bogus scanning activity with pop-up ads that do not actually reflect the real condition of your PC either. You should not ever trust Win 7 Internet Security 2012 and nor should you agree to its terms when it gets to type of helping you repair the PC and clean it of the imaginary malware threats. So the recommendations from Win 7 Internet Security 2012 to purchase its so-called licensed version should to be rejected. You need to uninstall Win 7 Internet Security 2012 without delay.

Win 7 Internet Security 2012 Video

Tip: Turn your sound ON and watch the video in Full Screen mode.

File System Details

Win 7 Internet Security 2012 may create the following file(s):
# File Name Detections
1. %AppData%\Local\[RANDOM CHARACTERS].exe
2. %AppData%\Local\[RANDOM CHARACTERS]
3. %AllUsersProfile%\[RANDOM CHARACTERS]
4. %Temp%\[RANDOM CHARACTERS]
5. %AppData%\Roaming\Microsoft\Windows\Templates\[RANDOM CHARACTERS]

Registry Details

Win 7 Internet Security 2012 may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Classes\.exe\DefaultIcon “(Default)” = ‘%1? = ‘”%UserProfile%\Local Settings\Application Data\[RANDOM CHARACTERS].exe” /START “%1? %*’
HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas\command “IsolatedCommand” = ‘”%1? %*’
HKEY_CURRENT_USER\Software\Classes\exefile\DefaultIcon “(Default)” = ‘%1?
HKEY_CURRENT_USER\Software\Classes\exefile\shell\runas\command “(Default)” = ‘”%1? %*’
HKEY_CLASSES_ROOT\exefile\shell\open\command “(Default)” = ‘”%UserProfile%\Local Settings\Application Data\[random].exe” /START “%1? %*’
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command “(Default)” = ‘”%UserProfile%\Local Settings\Application Data\[RANDOM CHARACTERS].exe” /START “%Program Files%\Internet Explorer\iexplore.exe”‘
HKEY_CURRENT_USER\Software\Classes\.exe “Content Type” = ‘application/x-msdownload’
HKEY_CURRENT_USER\Software\Classes\.exe\shell\runas\command “(Default)” = ‘”%1? %*’
HKEY_CURRENT_USER\Software\Classes\exefile “Content Type” = ‘application/x-msdownload’
HKEY_CURRENT_USER\Software\Classes\exefile\shell\open\command “IsolatedCommand” = ‘”%1? %*’
HKEY_CLASSES_ROOT\.exe\shell\open\command “(Default)” = ‘”%UserProfile%\Local Settings\Application Data\[RANDOM CHARACTERS].exe” /START “%1? %*’
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command “(Default)” = ‘”%UserProfile%\Local Settings\Application Data\[RANDOM CHARACTERS].exe” /START “%Program Files%\Mozilla Firefox\firefox.exe” -safe-mode’
HKEY_CURRENT_USER\Software\Classes\.exe “(Default)” = ‘exefile’
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command “IsolatedCommand” = ‘”%1? %*’
HKEY_CURRENT_USER\Software\Classes\exefile “(Default)” = ‘Application’
HKEY_CURRENT_USER\Software\Classes\exefile\shell\open\command “(Default)” = ‘”%UserProfile%\Local Settings\Application Data\[RANDOM CHARACTERS].exe” /START “%1? %*’
HKEY_CURRENT_USER\Software\Classes\exefile\shell\runas\command “IsolatedCommand” – ‘”%1? %*’
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command “(Default)” = ‘”%UserProfile%\Local Settings\Application Data\[RANDOM CHARACTERS].exe” /START “%Program Files%\Mozilla Firefox\firefox.exe”‘

Trending

Most Viewed

Loading...