Monthly Archive: January 2012

Jan 26

Antivirus Smart Protection Rogue of the FakeVimes Family

Antivirus Smart Protection is a rogue of the FakeVimes Family which comes after the Malware Protection Center clone. The rogue uses the scare tactics of generating pop up fake alerts to get the users infected to purchase the rogue. The FakeVimes rogues also hijacks the hosts file and sets a proxy in the Internet Options, …

Continue reading »

Jan 25

Smart Protection 2012 Rogue of the WinWeb Security Family

Smart Protection 2012 is Rogue of the WinWeb Security Family replaces the Security Sphere 2012 clone. This rogue like so many of today’s rogues, block the running of all other applications and the constant pop ups and re-directs to scare messages designed to scare those infected into purchasing the rogue. Files and Locations: %COMMON_APPDATA%\<random named> .exe …

Continue reading »

Jan 25

Internet Security 2012 Rogue of the Malware Protection Family

Internet Security 2012 is a rogue that is part of the Malware Protection family of rogues that uses fake alert and fake scan results as scare tactics to get the user to purchase the rogue. Associated Internet Security 2012 Files: %COMMON_APPDATA% \isecurity.exe File Location Notes: %Desktop% means that the file is located directly on your desktop. …

Continue reading »

Jan 25

Malware Protection Center Rogue of the FakeVimes Family

Malware Protection Center is a rogue of the FakeVimes Family which replaces the Home Security Solutions. The rogue uses the scare tactics of generating pop up fake alerts to get the users infected to purchase the rogue. The FakeVimes rogues also at times hijacks the hosts file and sets a proxy in the Internet Options, …

Continue reading »

Jan 17

Internet Security Guard of the FakeVimes Family

Internet Security Guard is a rogue of the FakeVimes Family which replaces the Home Security Solutions. The rogue uses the scare tactics of generating pop up fake alerts to get the users infected to purchase the rogue. The FakeVimes rogues also hijacks the hosts file and sets a proxy in the Internet Options, Connections, Lan …

Continue reading »