Windows Ultimate Booster
Posted: January 28, 2014
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 12 |
First Seen: | January 28, 2014 |
---|---|
Last Seen: | June 26, 2018 |
OS(es) Affected: | Windows |
Windows Ultimate Booster is a common example of rogue anti-malware programs that change their brand names to avoid being identified by casual PC users while keeping everything else about their 'products' the same. Belying its appearance as an anti-malware scanner, Windows Ultimate Booster is unable to find or delete real threats, but will provide fake alerts and fake system scans to the contrary. The intent behind these attacks is to force victims to spend money on Windows Ultimate Booster's 'full version,' but malware researchers recommend the opposite: terminating and then deleting Windows Ultimate Booster with real anti-malware products wherever Windows Ultimate Booster is seen.
Why You Shouldn't Pay the High Cost of this Anti-Malware 'Booster'
Windows Ultimate Booster just is one of a very many individual programs associated with the FakeVimes family of scamware, although Windows Ultimate Booster also bears resemblance to the similar family of FakeRean. Whatever its origins might be, Windows Ultimate Booster is a confirmed fake security product that misleads its victims by providing inaccurate pop-up alerts, in addition to faking scans of your PC, which always return 'infected' results. Similar fake scans also may be used in other kinds of attacks that could install Windows Ultimate Booster through unsafe websites, as is typical for the FakePAV family.
The meat of Windows Ultimate Booster's tactic lies in its attempts to make you believe that registering Windows Ultimate Booster, which, of course, costs money, is the easiest way to block and uninstall all of the threats that Windows Ultimate Booster detects. However, since malware experts easily verified that Windows Ultimate Booster can't detect legitimate PC threats of any stripe, there's no reason to spend your money on Windows Ultimate Booster. Despite its looks, Windows Ultimate Booster should be considered the same as any other threatening program, just like the related Privacy Guard Pro, PrivacyGuard Pro 2.0, Extra Antivirus, Fast Antivirus 2009, Presto TuneUp, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, Live PC Care, PC Live Guard, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus and Smart Security.
The Ultimate Boost... into a Software Lockdown
Although Windows Ultimate Booster's main purpose of existence lies in its fake anti-malware 'features,' malware researchers also have a second reason for being concerned with Windows Ultimate Booster: the fact that Windows Ultimate Booster can block other programs. Windows Ultimate Booster is expected to use this attack primarily for supporting its claims of other programs being compromised by threats, but also may deny you any access to important security tools, such as Task Manager, software updaters or a real anti-malware scanner. This particular symptom of a Windows Ultimate Booster infection makes Windows Ultimate Booster an immediate threat to the security of your computer.
Windows Ultimate Booster blocks other programs by monitoring your memory processes and terminating ones with names on its blacklist. While this is effective, it also allows you to ignore it once Windows Ultimate Booster, itself, has been terminated. Malware researchers recommend that you do so through the Safe Mode feature or through rebooting from an emergency OS, which will render removing Windows Ultimate Booster trivial.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%APPDATA%\svc-mamk.exe
File name: svc-mamk.exeSize: 1.07 MB (1070592 bytes)
MD5: 66ee52202658adec75f352c4a57e4be0
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: January 29, 2014
%AppData%\data.sec
File name: %AppData%\data.secMime Type: unknown/sec
Group: Malware file
Registry Modifications
File name without pathWindows Ultimate Booster.lnkHKEY..\..\{Value}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd "ImagePath" = "123123.sys"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations "LowRiskFileTypes" = ".zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments "SaveZoneInformation" = 1HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "GuardSoftware" = %AppData%\svc-
Additional Information
# | Message |
---|---|
1 | Error System data security is at risk! To prevent potential PC errors, run a full system scan. |
2 | Error Trojan activity detected. System integrity at risk. Full system scan is highly recommended. |
3 | Firewall has blocked a program from accessing the Internet C:\Program Files\Internet Explorer\iexplore.exe is suspected to have infected your PC. This type of virus intercepts entered data and transmits them to a remote server. |
4 | Warning! Identity theft attempt detected Hidden connection IP: xx.xxx.xxx.xxx Target: Microsoft Corporation keys Your IP: 127.0.0.1 |
It is asking for a password I do not know what it is