Home Malware Programs Rogue Anti-Spyware Programs Windows Update

Windows Update

Posted: March 28, 2011

Unlike the real Windows program by the same name, the malware Windows Update is a clone of other rogue defragmenter programs that similarly try to pass themselves off as Windows utilities. Like these other rogue security applications, Windows Update is malware that isn't affiliated with Microsoft and has no benevolent functions to offer you. The heralds of Windows Update infection are large numbers of fake system errors and other messages that try to convince you that your PC is under attack by many different malware problems. All apparent infections are nonexistent - Windows Update only wants to steal your money in return for Windows Update's fake services. Instead of giving your credit card over to the criminals behind this threat, you should remove Windows Update through actual Windows security programs.

Windows Update is One Update You Have No Need Of

This fake Windows Update can be installed as part of a bundled software infection, bluntly forced onto your hard drive by drive-by download code hosted on malicious sites or dropped as a payload by Trojan infections. Windows Update will attempt to look like a normal Windows program, but your PC will be immediately bombarded by positively horrific error messages that make it fairly obvious that Windows Update is actually a fraud.

Possible error pop-ups include but aren't restricted to:

Critical Error
RAM memory usage is critically high. RAM memory failure.

Critical Error!
Damaged hard drive clusters detected. Private data is at risk.

Critical Error
Hard Drive not found. Missing hard drive
.

In addition to false error messages that are used to cajole you into a fraudulent registration process, Windows Update has a few other and more malicious tricks. Windows Update will run automatically with Windows due to adding startup Registry entries and will not present an option to disable this auto-launch. Even closing Windows Update may not stop Windows Update from remaining active as a hidden memory process.

Another known attack used by Windows Update, as well as Windows Update's clones, is to alter Windows Explorer to display folders improperly. Folders may appear empty or have the wrong files in them - this isn't an indication of their actual contents, but rather, just a sign that Windows Update is attacking your ability to see these files in the default Windows environment.

Wiping Out the Fake Update Proposed by Windows Update

Windows Update is closely related to Windows Recovery, Windows Repair, Windows Safemode and other rogue security programs themed in a similar manner. These rogue security programs use the same attacks and basic interfaces but may not be detected in the same ways. Keeping your anti-malware programs updated will insure that your scanners can detect Windows Update and all other variants of this threat.

Deleting Windows Update requires the removal of .dll files and bad Windows Registry entries - these items are difficult to remove manually, and should be left to an anti-malware scanner. Before you try to delete Windows Update, you should first make certain Windows Update isn't running even as a memory process. If Windows Update is still active when you scan, the scan will likely fail to get rid of Windows Update even if all infections appear to be successfully deleted.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 %Documents and Settings%\[User Name]\Desktop\Windows Update.lnk
    2 %Documents and Settings%\[User Name]\Start Menu\Programs\Windows Update
    3 %Documents and Settings%\[User Name]\Start Menu\Programs\Windows Update\Uninstall Windows Update.lnk
    4 %Documents and Settings%\[User Name]\Start Menu\Programs\Windows Update\Windows Update.lnk
    5 %Documents and Settings%\All Users\Application Data\[random]
    6 %Documents and Settings%\All Users\Application Data\[random].dll
    7 %Documents and Settings%\All Users\Application Data\[random].exe

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download "CheckExeSignatures" = 'no'HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main "Use FormSuggest" = 'yes'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnonBadCertRecving" = '0'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations "LowRiskFileTypes" = '/{hq:/s's:/ogn:/uyu:/dyd:/c'u:/bnl:/ble:/sdf:/lrh:/iul:/iulm:/fhg:/clq:/kqf:/'wh:/lqf:/lqdf:/lnw:/lq2:/l2t:/v'w:/rbs:'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments "SaveZoneInformation" = '1'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = '1'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[random]"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[random].exe"

Related Posts

Loading...