FakeSmoke
Posted: December 1, 2010
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 258 |
First Seen: | December 1, 2010 |
---|---|
OS(es) Affected: | Windows |
FakeSmoke, also known by Rogue:Win32/FakeSmoke, is a classification of scamware programs that use a combination of fake Windows Security Centers and fake anti-malware programs to attack your PC with fraudulent warning messages. Rogue anti-virus applications from the FakeSmoke family aren't capable of detecting actual viruses, but will, instead, create alerts about non-present PC threats as an excuse to ask you to spend money in a registration process. SpywareRemove.com malware researchers discourage buying FakeSmoke products, even if you're doing so to remove them, since deleting FakeSmoke scamware can be handled by appropriately competent anti-malware scanners. This group of rogue AV programs, like most such subgroups, encompasses programs that use a wide range of names to avoid detection, and you should try to identify FakeSmoke scamware with appropriate software as well as by noting their common symptoms.
FakeSmoke: Leading to a Real Fire of a Security Crisis
FakeSmoke products rotate through a range of different names that allow them to promote themselves in the form of independent and supposedly effective anti-virus products. Examples of FakeSmoke aliases include WinBlueSoft, WiniFighter, TrustNinja, Soft Soldier, SystemCop, SaveArmor, SoftVeteran, BlockKeeper, SiteVillain and even the rather questionably-named LinkSafeness. Other than their names, these programs have minimal differences and you should expect attacks like the ones noted below from any type of FakeSmoke scamware:
- A fake Windows Security Center. Although FakeSmoke's Security Center looks identical to the actual Windows Security Center, its positive features are nonexistent. This fraudulent Security Center has no purpose except to create fake alerts that encourage you to buy or use FakeSmoke products.
- An accompanying (and, of course, fraudulent) anti-virus scanner. SpywareRemove.com malware analysts don't advise you to spend any time trying to make a FakeSmoke scanner work, since its results will always turn up nonexistent Trojans, viruses and other PC threats that aren't on your computer at all.
- Fraudulent error messages that can take a variety of different formats. They may be based on one of the programs mentioned above, appear in the form of a toolbar notification or look like an alert from your operating system. Errors may warn you about viruses, Trojans or (especially) spyware.
Clearing the Air and Getting FakeSmoke Out of Your PC
FakeSmoke scamware will alter your Windows Registry, hide their components in the Windows folder and may use random names. These characteristics make manual removal of FakeSmoke products to be less ideal by comparison to automated deletion by qualified anti-malware scanners. However, you may need to use Safe Mode or other methods to disable FakeSmoke before FakeSmoke can be deleted completely.
SpywareRemove.com malware research team encourages you to ignore any error messages that appear to be similar to the following examples, which are all confirmed fake-outs from FakeSmoke-based PC threats:
Attention: DANGER!
[FakeSmoke rogue program's name] has detected [random number] Critical SPYWARE Objects while scanning the system.
Infiltration Alert!
Your computer is being attacked by an Internet Virus. It could be a password-stealing attack, a Trojan-dropper or similar.
Spyware Alert!
Your computer is infected with spyware. It could damage your critical files or expose your private data on the Internet. Click here to register your copy of [FakeSmoke rogue program's name] and remove spyware threats from your PC.
Your computer is infected by spyware – threat have been found while scanning your files and registry. It is strongly recommended that you disinfect your PC and activate Realtime protection against future instrusions.
Your computer is under great risk! Malware applications are still running. This will lead to the leak of personal date and system collapse.
Aliases
More aliases (78)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%WINDIR%\system32\fbn46.tmp
File name: fbn46.tmpSize: 467.45 KB (467456 bytes)
MD5: 1bd24f3b3bc23fe578ac533359d93779
Detection count: 190
File type: Temporary File
Mime Type: unknown/tmp
Path: %WINDIR%\system32
Group: Malware file
Last Updated: December 1, 2010
aBpYoQKtT.dll
File name: aBpYoQKtT.dllSize: 1.67 MB (1678336 bytes)
MD5: 2c019ec0d78438ac96f80ad38a030a02
Detection count: 59
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 9, 2010
%WINDIR%\system32\cez2B.tmp
File name: cez2B.tmpSize: 431.1 KB (431104 bytes)
MD5: 05f89f6b0e80845d24e3a25ff0f986a6
Detection count: 9
File type: Temporary File
Mime Type: unknown/tmp
Path: %WINDIR%\system32
Group: Malware file
Last Updated: December 7, 2010
aoVJNpWtJ.dll
File name: aoVJNpWtJ.dllSize: 1.69 MB (1690112 bytes)
MD5: e85975b410e2908d38ae9bf3665718e5
Detection count: 7
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: December 16, 2010
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.