Home Malware Programs Rogue Anti-Spyware Programs Windows Secure Surfer

Windows Secure Surfer

Posted: May 13, 2012

Threat Metric

Threat Level: 2/10
Infected PCs: 611
First Seen: May 13, 2012
Last Seen: October 22, 2021
OS(es) Affected: Windows

Windows Secure Surfer Screenshot 1Windows Secure Surfer is a new variant of Win32/FakeVimes (also known as Rogue.FakeVimes), a group of rogue anti-spyware programs that display fraudulent security info alongside attacks against your computer's real security features. Because a Windows Secure Surfer infection can include such functions as browser redirects to malicious sites or attempts to block your security software, SpywareRemove.com malware researchers suggest removing Windows Secure Surfer immediately and with an appropriate choice of anti-malware software. Until you've deleted Windows Secure Surfer, your PC will also be forced to sit through system scans with fake results and a wide range of fake popup alerts that should all be ignored as parts of Windows Secure Surfer's clumsy and deceitful self-marketing campaign.

Riding Windows Secure Surfer's Waves Right to Deceit, Theft and Loss of Personal Information

Windows Secure Surfer, like every other member of its family, may look like an anti-spyware scanner with a whole parcel's worth of extra security features, but Windows Secure Surfer's real ability to find or remove PC threats is utterly nonexistent. To cover up for this deficiency, Windows Secure Surfer displays constant popup warnings about various attacks (such as identity theft or unauthorized network activity), along with fake infection alerts that identify PC threats that aren't on your hard drive. SpywareRemove.com malware analysts, of course, suggest ignoring all of the above, and focusing on finding a way to remove Windows Secure Surfer safely – preferably with legitimate anti-malware software.

Similar precautions also apply to rogue anti-spyware products that are clones of Windows Secure Surfer, such as Privacy Guard Pro, PrivacyGuard Pro 2.0, Extra Antivirus, Fast Antivirus 2009, Presto TuneUp, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, Live PC Care, PC Live Guard, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus and Smart Security. If Windows Secure Surfer or a relative of infects your PC, you may find it convenient to fake registration with the FakeVimes family code '0W000-000B0-00T00-E0020.' While this fake registration can cause some of Windows Secure Surfer's attacks to be mitigated, you shouldn't attempt to purchase a 'real' registration code for Windows Secure Surfer, which will put your money and sensitive data in criminal possession.

How Being Lazy About Kicking Windows Secure Surfer Off of Your Ride Can Come Back to Haunt You

Without a doubt, the definitive characteristics of a Windows Secure Surfer infection are its fake security displays. However, SpywareRemove.com malware analysts have also found reasons to warn, in particular, about other security-related attacks that Windows Secure Surfer and its family have been known to launch. Some typical FakeVimes-based attacks can also extend to:

  • Launching Windows Secure Surfer without your consent and keeping it open even after you try to close it.
  • Blocking your real security programs, along with Windows utilities like Task Manager or the Registry Editor.
  • Disabled Windows security functions, notably including the UAC.
  • Redirecting your browser, particularly during online searches.


Windows Secure Surfer Screenshot 2Windows Secure Surfer Screenshot 3Windows Secure Surfer Screenshot 4Windows Secure Surfer Screenshot 5Windows Secure Surfer Screenshot 6Windows Secure Surfer Screenshot 7Windows Secure Surfer Screenshot 8Windows Secure Surfer Screenshot 9Windows Secure Surfer Screenshot 10

Aliases

Trojan.Win32.FakeAV [Ikarus]Dropper/Win32.Romeo [AhnLab-V3]Trojan-Dropper.Win32.Dapato.awui [Kaspersky]Win32/Adware.WintionalityChecker.AF [NOD32]Artemis!6C9B169944DA [McAfee-GW-Edition]FakeAlert-PJ.gen.aw [McAfee]Suspicious file [Panda]TR/Fraud.Gen8 [AntiVir]PUA.Packed.ASPack [ClamAV]VirusDoctor!gen11 [Symantec]a variant of Win32/Adware.WintionalityChecker.AF [NOD32]

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%APPDATA%\Protector-lmsj.exe File name: Protector-lmsj.exe
Size: 2.36 MB (2361856 bytes)
MD5: 19e8b88e36599bd658144a35f40032a2
Detection count: 93
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: May 14, 2012
%APPDATA%\Protector-ynmo.exe File name: Protector-ynmo.exe
Size: 1.93 MB (1933824 bytes)
MD5: 59479eeb90e7b3837f4b280d83a718f2
Detection count: 39
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: August 30, 2012
Protector-bafo.exe File name: Protector-bafo.exe
Size: 2.23 MB (2232320 bytes)
MD5: 536e60a0eaaa1f73b812579d9f6032ed
Detection count: 22
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 14, 2012
%APPDATA%\Protector-nqtk.exe File name: Protector-nqtk.exe
Size: 2.2 MB (2209792 bytes)
MD5: 7002bf2c7805b903261a03e863aa3db7
Detection count: 15
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: May 14, 2012
%APPDATA%\Protector-cubv.exe File name: Protector-cubv.exe
Size: 2.28 MB (2280960 bytes)
MD5: 6c9b169944da72ab4baa95e1bd7b1b9c
Detection count: 10
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: August 30, 2012
%AppData%\NPSWF32.dll File name: %AppData%\NPSWF32.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%AppData%\Protector-[RANDOM 3 CHARACTERS].exe File name: %AppData%\Protector-[RANDOM 3 CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%AppData%\Protector-[RANDOM 4 CHARACTERS].exe File name: %AppData%\Protector-[RANDOM 4 CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%AppData%\result.db File name: %AppData%\result.db
Mime Type: unknown/db
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = 0HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegedit" = 0HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegistryTools" = 0HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = 0HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "net" = "2012-5-13_4"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "UID" = "hspbkebjqj"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorAdmin" = 0HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorUser" = 0HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "EnableLUA" = 0HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\ASProtectHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmdagent.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gator.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AlphaAV.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkwctl9.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpost.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ozn695m5.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\padmin.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\normist.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\otfix.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\prmt.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsched.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\panixk.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\patch.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MalwareRemoval.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\prizesurfer.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\..{RunKeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Inspector"

Additional Information

The following messages's were detected:
# Message
1Error
Attempt to modify Registry key entries detected.
Registry entry analysis recommended.
2Error
Trojan activity detected. System data security is at risk. It is recommended to activate protection and run a full system scan.
3Warning
Firewall has blocked a program from accessing the Internet
C:\program files\internet explorer\iexplore.exe
is suspected to have infected your PC. This type of virus intercepts entered data and transmits them to a remote server.

Loading...