Home Malware Programs Rogue Anti-Spyware Programs Windows Security Master

Windows Security Master

Posted: March 11, 2014

Threat Metric

Threat Level: 10/10
Infected PCs: 12
First Seen: March 11, 2014
Last Seen: January 8, 2020
OS(es) Affected: Windows


Windows Security Master Screenshot 1The ongoing saga of fake anti-malware products now continues with Windows Security Master, which is designed to look like a Windows security suite – but has no functioning security features. As fraudulent software, Windows Security Master is capable of displaying system warnings and alerts to warn you about the supposed presence of other, high-level PC threats while Windows Security Master requests that you purchase its premium version to expedite their removal from your machine. Those incautious enough to pay the Windows Security Master's fee quickly will discover that Windows Security Master doesn't have any security features at all, and malware researchers find removing Windows Security Master to be the safest response possible.

The Master of Disguise Poses as a Windows Security Master

Although malware researchers undertake examinations of new members of scamware families as a matter of habit, these families update themselves with minor variants, such as Windows Security Master, just as frequently. Although Windows Security Master has a new name and uses the same skin and major functions as previous variants of NameChanger and FakePAV scamware, Windows Security Master belongs to the FakeVimes family and its many clones include Privacy Guard Pro, PrivacyGuard Pro 2.0, Extra Antivirus, Fast Antivirus 2009, Presto TuneUp, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, Live PC Care, PC Live Guard, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus and Smart Security. Because their skins are partially based on legitimate Windows software, victims are expected to be confused into believing that Windows Security Master and its kin are legitimate products, when they are actually threats.

Normal installation methods for Windows Security Master infections include the exploitation of Trojan droppers and Trojan downloaders, along with compromised Web scripts that may warn you about your PC supposedly requiring a security download for disinfection. Regardless of how Windows Security Master may have gotten onto your PC, Windows Security Master will continuously display inaccurate system warnings, detect fake threats through its 'system scans' and even block other applications.

The latter is of most interest to malware researchers, who have seen Windows Security Master target everything from instant messengers to the essential security programs. Disabling Windows Security Master, as noted below, should be enough to regain access to most programs, although some Registry changes also may need to be removed before your computer regains full accessibility to all software.

The Price that's Paid for Fake Security

As you might have guessed, Windows Security Master's attacks simply are foreplay meant to pull you into purchasing its software to 'disinfect' your PC, even though the paid version of Windows Security Master is no more effective at safeguarding your computer than its free version. Malware researchers do find it safe to use freely-available codes to fake Windows Security Master's registration, but urge you to avoid giving any money or personal information away in Windows Security Master-related transactions. Whether or not you register Windows Security Master, deleting Windows Security Master always should be your overriding priority.

Windows Security Master, like so many of its fellow rogue anti-malware scanners, does have a history of interfering with the security products best equipped to remove Windows Security Master. Disabling Windows Security Master before uninstalling Windows Security Master is encouraged, whether you do so with Safe Mode or by restarting your PC from an external OS. USB devices are the most common means of loading a separate OS, and easily will support emergency backup operating systems, which will let you use the anti-malware tools of your preference to delete Windows Security Master once and for all.

Windows Security Master Screenshot 2Windows Security Master Screenshot 3Windows Security Master Screenshot 4Windows Security Master Screenshot 5Windows Security Master Screenshot 6Windows Security Master Screenshot 7Windows Security Master Screenshot 8Windows Security Master Screenshot 9Windows Security Master Screenshot 10Windows Security Master Screenshot 11Windows Security Master Screenshot 12Windows Security Master Screenshot 13Windows Security Master Screenshot 14Windows Security Master Screenshot 15Windows Security Master Screenshot 16Windows Security Master Screenshot 17Windows Security Master Screenshot 18Windows Security Master Screenshot 19Windows Security Master Screenshot 20Windows Security Master Screenshot 21Windows Security Master Screenshot 22Windows Security Master Screenshot 23Windows Security Master Screenshot 24Windows Security Master Screenshot 25Windows Security Master Screenshot 26Windows Security Master Screenshot 27Windows Security Master Screenshot 28

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%APPDATA%\svc-cepg.exe File name: svc-cepg.exe
Size: 1.06 MB (1062912 bytes)
MD5: e68ccaf6f6edb51b012701e720d5a558
Detection count: 13
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: January 8, 2020

Related Posts

Loading...