Home Malware Programs Rogue Anti-Spyware Programs Volcano Security Suite

Volcano Security Suite

Posted: October 27, 2009

Threat Metric

Threat Level: 10/10
Infected PCs: 58
First Seen: December 1, 2009
OS(es) Affected: Windows

Volcano Security Suite is a rogue antispyware program that uses a fake scanner to lure its victims into taking part in fraudulent transactions. When executed, Volcano Security Suite pretends to scan the computer and delivers a predefined list of infections that aren't there. Volcano Security Suite program is not going to get rid of the spyware on your computer but might expose you to more security threats.

When VolcanoSecuritySuite is installed, it configures itself to run automatically each time a user turns on the computer. Volcano Security Suite is a variant from other well known rogue software products such as Cyber Security, Soft Cop, and Personal Guard 2009. Volcano Security Suite is a counterfeit, unwanted program and is recommended to be removed immediately.

Aliases

Suspicious file [Panda]Mal/EncPk-LH [Sophos]a variant of Win32/Kryptik.AYL [NOD32]Trojan:Win32/FakeVimes [Microsoft]Trojan.Win32.FakeAV [Ikarus]Heur.Suspicious [Comodo]Trojan.Win32.FakeAV!IK [a-squared]

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Volcano Security Suite may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

* See Free Trial offer below. EULA and Privacy/Cookie Policy.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



setup[1].exe File name: setup[1].exe
Size: 129.02 KB (129024 bytes)
MD5: ce00e954e1c8218c14e4643a0c87d387
Detection count: 82
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: December 11, 2009
VS884.exe File name: VS884.exe
Size: 2.6 MB (2603521 bytes)
MD5: 8a91d481af28374d4ff8b5f40e5d6005
Detection count: 81
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: December 11, 2009
VS9f7.exe File name: VS9f7.exe
Size: 2.56 MB (2564609 bytes)
MD5: 6a5f49215b0aa779f48d832ced0276c1
Detection count: 8
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: December 11, 2009

Additional Information

The following cookies were detected:
smart-virus-eliminator
The following messages's were detected:
# Message
1System alert
Potentially harmful programs have been detected on your system and need to be dealt with immediately. Click here to
remove them with Volcano Security Suite.
2Warning! Your computer is infected Warning! Found!
Threat detected:
File name: LEGACY_TRUSTWARRIORSVC

Loading...
Spywareremove.com uses cookies to provide you with a better browsing experience and analyze how users navigate and utilize the Site. By using this Site or clicking on "OK", you consent to the use of cookies. Learn more.