Home Malware Programs Rogue Anti-Spyware Programs Windows Web Combat

Windows Web Combat

Posted: July 12, 2012

Threat Metric

Threat Level: 2/10
Infected PCs: 24
First Seen: July 12, 2012
OS(es) Affected: Windows

Windows Web Combat Screenshot 1With all the outer looks of a real anti-malware program but none of the genuine anti-malware features that a reputable brand would boast, Windows Web Combat is a good example of looks being deceiving for little-known software. Since SpywareRemove.com malware research team has identified Windows Web Combat, not only as a rogue anti-malware scanner, but as an explicit member of the FakeVimes family of the same, you should be prepared for the possibility of unwarranted security changes, browser redirects and blocked security applications with any Windows Web Combat infection. Nonetheless, Windows Web Combat's most common and easily-detected symptoms are the various fake warnings and scans that Windows Web Combat uses to create a mockup of countless PC threats attacking your computer, and Windows Web Combat's security information should never be considered accurate or purchase-worthy.

Windows Web Combat and the Battle for Control Over Your Computer

Windows Web Combat is unable to provide any of the anti-malware features that Windows Web Combat claims are worth your money, although its external appearance may initially obfuscate this. As scamware that launches right along with Windows, Windows Web Combat will display its fake pop-up alerts for phishing attacks, identity theft, Trojan infections and other PC threats without any regard for their accuracy or lack of such. Likewise, Windows Web Combat may also look as though Windows Web Combat can scan your PC, but its scanner results are predefined to include inaccurate lists of infections, as well as the scan results presented by its many clones which have among them Privacy Guard Pro, PrivacyGuard Pro 2.0, Extra Antivirus, Fast Antivirus 2009, Presto TuneUp, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, Live PC Care, PC Live Guard, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus and Smart Security.

However, fake security features should be the least of your concerns in any Windows Web Combat infection, given that SpywareRemove.com malware experts have also spotted this class of rogue anti-malware programs using more severe attacks than simple pop-ups and simulated scans. Any infection by Windows Web Combat can also include such possible attacks as:

  • Applications that are blocked under fraudulent pretenses. Blocked programs can include various types of security software, such as firewall utilities, anti-virus scanners, memory-monitoring tools and baseline Windows applications. Windows Web Combat may simply prevent the application from being run, or Windows Web Combat may delete Registry entries that are necessary for the application to function even if Windows Web Combat is disabled.
  • Browser redirects that promote malicious sites or sites with questionable reputations. SpywareRemove.com malware researchers have found that online search-related redirects are particularly probable with Windows Web Combat and similar FakeVimes infections.
  • Security settings that are changed to heighten your PC's susceptibility to future attacks from other PC threats besides Windows Web Combat. These changes can include browser settings that are changed in negative ways, as well as disabled Windows features like the UAC.

Knocking Windows Web Combat Out of the Ring for the Sake of Your PC's Safety

Contrary to its numerous protests, Windows Web Combat can be removed without registering Windows Web Combat, and SpywareRemove.com malware researchers strongly encourage this in lieu of spending any money whatsoever on Windows Web Combat. Despite this, the code '0W000-000B0-00T00-E0020' can be used for free if you still deem registering Windows Web Combat necessary or useful for deleting Windows Web Combat in the long term. Disabling Windows Web Combat entirely is also generally encouraged before you attempt to remove Windows Web Combat, and this can be done by, for example, booting your PC from a removable data storage device.

Windows Web Combat, like all FakeVimes-based PC threats, can be removed by qualified anti-malware products. Because Windows Web Combat is a recent addition to the FakeVimes family, your anti-malware software may require database updates before it can detect Windows Web Combat perfectly, although, in most cases, basic heuristic methods should suffice.

Windows Web Combat Screenshot 2Windows Web Combat Screenshot 3Windows Web Combat Screenshot 4Windows Web Combat Screenshot 5Windows Web Combat Screenshot 6Windows Web Combat Screenshot 7Windows Web Combat Screenshot 8Windows Web Combat Screenshot 9Windows Web Combat Screenshot 10Windows Web Combat Screenshot 11Windows Web Combat Screenshot 12Windows Web Combat Screenshot 13

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



Protector-[rnd].exe in %AppData% folder File name: Protector-[rnd].exe in %AppData% folder
Mime Type: unknown/exe in %AppData% folder
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\WarnOnHTTPSToHTTPRedirect 0HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\ConsentPromptBehaviorAdmin 0HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings\net [date of installation]HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings\UID [rnd]HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings\ID 4HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA 0HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\ConsentPromptBehaviorUser 0HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTray.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVENGINE.EXE\Debugger svchost.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVENGINE.EXEHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVCare.exe\Debugger svchost.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVCare.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTray.exe\Debugger svchost.exe

One Comment

Loading...