Home Malware Programs Rogue Anti-Virus Programs Windows Secure Kit 2012

Windows Secure Kit 2012

Posted: March 5, 2012

Threat Metric

Threat Level: 2/10
Infected PCs: 21
First Seen: March 5, 2012
OS(es) Affected: Windows

Windows Secure Kit 2012 is a fake anti-malware scanner that is part of the WinWeb Security family and creates inaccurate diagnostics messages (such as scanner results and pop-up alerts) as a form of marketing for its own software. Because Windows Secure Kit 2012 and closely related types of scamware have been found to promote themselves via both browser hijackers and misleading advertisements, SpywareRemove.com malware researchers recommend that you use strong security settings to prevent your web browser by being attacked by Windows Secure Kit 2012-affiliated PC threats. If you do notice Windows Secure Kit 2012's unmistakable presence as an unwanted addition to your computer, you should avoid falling for its purchase offers and, instead, remove Windows Secure Kit 2012 with a legitimate anti-malware product.

Windows Secure Kit 2012: An Unscrupulous Marketer Three Times Over

Windows Secure Kit 2012 may attempt to convince you of its legitimacy as an anti-malware program, but all warnings, alerts and other messages from Windows Secure Kit 2012 will provide inaccurate detection information and Windows Secure Kit 2012's security features are essentially nonfunctional. SpywareRemove.com malware experts also note Windows Secure Kit 2012's strong resemblance to preexisting types of fake anti-malware applications, including Windows Secure Kit 2011, Apple Web Security and Windows Web Security. This small family of rogue anti-malware products can be delivered onto your PC via the following means:

  • Malicious advertisements that redirect you to a hostile site for promoting Windows Secure Kit 2012 and its ilk. Such advertisements often take the form of fake prize offers, such as 'You've won a free iPod.'
  • Browser hijackers that redirect your web browser without your consent; in most cases, these redirect attacks are a sign that your PC already is infected and should be attended to via suitable anti-malware software.

Two samples of common errors that are used by members of the Windows Secure Kit 2012 family are noted below for your reference.

"[Rogue anti-malware program's name] has found critical process activity on your PC and will perform fast scan of system files!"

Windows Security Alert
To help protect your computer, [Rogue anti-malware program's name] have detected Trojans and ready to remove them.
Trojan-Downloader.Win32.Lipler.bkue
XF.Lugunay!dam
Win32.Sality
Banker.MGB
Win32/Conficker.AE
[et al.]

The Security That Windows Secure Kit 2012 Can't Bust

As long as you avoid giving in to temptation and don't offer up your financial information to Windows Secure Kit 2012 on a platter, long term harm from a Windows Secure Kit 2012 infection should be nonexistent. Since SpywareRemove.com malware research team hasn't noted Windows Secure Kit 2012 as having any exceptional defenses, you can remove Windows Secure Kit 2012 with a competent anti-malware application – provided that you disable Windows Secure Kit 2012 and related PC threats via Safe Mode or other methods before you scan your PC. Spending money on Windows Secure Kit 2012 is never the answer, since Windows Secure Kit 2012's many warnings are fake and other issues that you may experience with your PC are almost certain to be due to Windows Secure Kit 2012 or related PC threats such as Antivirus Security, System Security, AntiSpyware Pro 2009, Total Security, Total Security 2009, Security Tool, Trojan.RogueAV.a.gen, System Adware Scanner 2010, FakeAlert-KW.e, Advanced Security Tool 2010, System Tool 2011, MS Removal Tool, Antivirus Center, Security Shield, Personal Shield Pro, Advanced PC Shield 2012, Security Sphere 2012 and Futurro Antivirus.

Unlike the average example of fake anti-malware software, however, Windows Secure Kit 2012 family-based variants have been noted to attack both Windows and Mac operating systems. SpywareRemove.com malware researchers note that this further emphasizes the necessity of safe web-browsing habits and possession of appropriate security software.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%CommonAppData%{random}{random}.exe File name: %CommonAppData%{random}{random}.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunOnce ?{random}?

One Comment

Loading...