Home Malware Programs Rogue Anti-Spyware Programs Windows Turnkey Console

Windows Turnkey Console

Posted: June 4, 2012

Threat Metric

Threat Level: 10/10
Infected PCs: 28
First Seen: June 4, 2012
OS(es) Affected: Windows

Windows Turnkey Console Screenshot 1Windows Turnkey Console is an amusingly accurately-named PC threat, given that, like other FakeVimes-based scamware, Windows Turnkey Console is closer to being your computer's jailer than its savior. While Windows Turnkey Console displays the same types of fraudulent security alerts and inaccurate system scan routines that similar variants of FakeVimes are known for, Windows Turnkey Console may also make direct attempts to cripple your computer's security features. All of Windows Turnkey Console's efforts are focused on getting you to buy its software, but SpywareRemove.com malware research suggest turning an about face and removing Windows Turnkey Console with a reputable anti-malware scanner, since Windows Turnkey Console's mere presence can subject your computer to continuous assault by browser hijacks and program-blocking attacks.

Windows Turnkey Console: the Jailer with Bad Intel for Its Prisoners

Windows Turnkey Console shares the same template as other recent variants of the FakeVimes family of rogue anti-malware scanners. As such, an initial look at Windows Turnkey Console might convince you that Windows Turnkey Console has the answer to all of your computer problems from viruses to phishing sites. Lamentably, though, SpywareRemove.com malware research team has confirmed that Windows Turnkey Console isn't able to provide any sort of accurate security-related information or delete hostile software from your hard drive. Windows Turnkey Console's substitutions for these feats are fake pop-up warnings and other forms of diagnostic information that always alert you to the supposed presence of nonexistent attackers and PC threats (such as keyloggers, Trojans or identity theft attacks).

Along with these fake security efforts, Windows Turnkey Console may also block security-related features of Windows along with a variety of security programs, and SpywareRemove.com malware experts have also seen strong indications that Windows Turnkey Console may indulge itself in browser redirect attacks to promote harmful websites. Some of the main kinds of programs that Windows Turnkey Console can prevent you from using include:

  • Popular brands of anti-virus and anti-malware scanners.
  • The Windows Task Manager (a utility that allows you to view memory processes).
  • The Windows Registry Viewer/Editor.

Enacting a Jailbreak from Windows Turnkey Console's PC Prison

Because many of Windows Turnkey Console's attacks make changes to the Windows Registry, Hosts file and other parts of Windows, SpywareRemove.com malware experts discourage manual attempts to revert Windows Turnkey Console's changes or delete Windows Turnkey Console. Industry-recognized anti-malware programs are able to remove all aspects of a Windows Turnkey Console infection whilst keeping the potential for damage to your operating system absolutely minimized.

You may wish to register or disable Windows Turnkey Console before you run a scan to elicit Windows Turnkey Console's removal. Rogue anti-malware programs from the FakeVimes classification like Windows Turnkey Console are often able to be registered with the free code '0W000-000B0-00T00-E0020.' Disabling Windows Turnkey Console can also be accomplished by using the Windows Safe Mode feature or by booting your OS from a removable media-based source. SpywareRemove.com malware researchers note that analogous techniques can also be put in use to Windows Turnkey Console's clones such as Privacy Guard Pro, PrivacyGuard Pro 2.0, Extra Antivirus, Fast Antivirus 2009, Presto TuneUp, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, Live PC Care, PC Live Guard, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus and Smart Security.

Windows Turnkey Console Screenshot 2Windows Turnkey Console Screenshot 3Windows Turnkey Console Screenshot 4Windows Turnkey Console Screenshot 5Windows Turnkey Console Screenshot 6Windows Turnkey Console Screenshot 7Windows Turnkey Console Screenshot 8Windows Turnkey Console Screenshot 9Windows Turnkey Console Screenshot 10Windows Turnkey Console Screenshot 11Windows Turnkey Console Screenshot 12Windows Turnkey Console Screenshot 13Windows Turnkey Console Screenshot 14

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%APPDATA%\Protector-vkvq.exe File name: Protector-vkvq.exe
Size: 2.28 MB (2287104 bytes)
MD5: f715dd26b55f93d9f03e408213664e9f
Detection count: 68
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: June 4, 2012
%APPDATA%\Protector-ennp.exe File name: Protector-ennp.exe
Size: 2.28 MB (2287104 bytes)
MD5: 1c354ba1535e48e25787905ee5fef9db
Detection count: 45
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: June 4, 2012
%APPDATA%\Protector-rep.exe File name: Protector-rep.exe
Size: 2.08 MB (2083328 bytes)
MD5: 489543ca79af606a49436f37e3897e35
Detection count: 26
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: June 4, 2012
Protector-[RANDOM CHARACTERS].exe File name: Protector-[RANDOM CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore "DisableSR " = '1'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe "Debugger" = 'svchost.exe'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe "Debugger" = 'svchost.exe'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe "Debugger" = 'svchost.exe'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe "Debugger" = 'svchost.exe'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe "Debugger" = 'svchost.exe' HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe "Debugger" = 'svchost.exe'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe "Debugger" = 'svchost.exe'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe "Debugger" = 'svchost.exe'
Loading...