Home Malware Programs Trojans Internet Antivirus

Internet Antivirus

Posted: August 11, 2008

Threat Metric

Threat Level: 9/10
Infected PCs: 103
First Seen: July 24, 2009
Last Seen: April 30, 2022
OS(es) Affected: Windows

ScreenshotInternet Antivirus, also known as IA or InternetAntivirus, is a rogue anti-spyware program that installs in your computer system with the help of Trojan Zlob or other malicious methods. You may have also downloaded Internet Antivirus from a rogue website thinking it would remove your spyware threats. Once Internet Antivirus' trial version is installed, it will run a fake system scan to generate a list of spyware results that are supposedly found in your system. Along with this scan, popups and fake system alert messages may appear to "inform" you about your supposed infections.

If you click on any of these messages, you'll be redirected to InternetAntivirus' rogue website to further download Internet Antivirus' licensed version. Internet Antivirus.com will promote Internet Antivirus as a legit software, do not be tricked by its malicious tactics.

ScreenshotScreenshotScreenshotScreenshotScreenshotScreenshot

Aliases

Trj/Ufraie.A [Panda]Generic22.AMCB [AVG]W32/EncPk.ZV!tr [Fortinet]Trojan-Dropper.Win32.TDSS [Ikarus]Dropper/Win32.TDSS [AhnLab-V3]TrojanDownloader:Win32/Ufraie.A [Microsoft]Win32/FraudPack.F!generic [eTrust-Vet]TR/Crypt.XPACK.Gen3 [AntiVir]Trojan.DownLoader2.43734 [DrWeb]Troj/Agent-RMI [Sophos]Trojan.Generic.KD.215722 [BitDefender]Trojan-Dropper.Win32.TDSS.amfl [Kaspersky]Trojan.TDSS-6339 [ClamAV]Win32:Zboter-E [Wrm] [Avast]W32/Trojan3.COJ [F-Prot]
More aliases (364)

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%LOCALAPPDATA%\Microsoft\Windows\onby.exe File name: onby.exe
Size: 142.33 KB (142336 bytes)
MD5: 5406486ebc0c8dc85a529991528150fe
Detection count: 92
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%\Microsoft\Windows
Group: Malware file
Last Updated: December 8, 2010
%USERPROFILE%\Local Settings\Application Data\Google\Chrome\Application\5.0.375.55\Resources\Inspector\byby.exe File name: byby.exe
Size: 146.94 KB (146944 bytes)
MD5: 923e4dd75e6e95af075e53ad95caad2d
Detection count: 73
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Local Settings\Application Data\Google\Chrome\Application\5.0.375.55\Resources\Inspector
Group: Malware file
Last Updated: December 7, 2010
%USERPROFILE%\Documents\My Videos\oroutthe.exe File name: oroutthe.exe
Size: 146.94 KB (146944 bytes)
MD5: 53cba4a4b2497640f190b89c9a19d94d
Detection count: 55
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Documents\My Videos
Group: Malware file
Last Updated: December 7, 2010
%USERPROFILE%\Local Settings\Application Data\Google\Custom Buttons_\offor.exe File name: offor.exe
Size: 146.94 KB (146944 bytes)
MD5: c5f4f5419929908ef34aaab64c5e7fd6
Detection count: 53
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Local Settings\Application Data\Google\Custom Buttons_
Group: Malware file
Last Updated: December 7, 2010
%USERPROFILE%\Configuraci??n local\Datos de programa\Microsoft\Windows\services.exe File name: services.exe
Size: 195.58 KB (195584 bytes)
MD5: edfffb062a7ac43f9f2c0a07764f3783
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Configuraci??n local\Datos de programa\Microsoft\Windows
Group: Malware file
Last Updated: December 21, 2010
%USERPROFILE%\My Documents\windows_update_AccbhBBCAcfJeJe.exe File name: windows_update_AccbhBBCAcfJeJe.exe
Size: 44.03 KB (44032 bytes)
MD5: d50cfa45002ee42327d84512ab1bc03c
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\My Documents
Group: Malware file
Last Updated: December 8, 2010
%LOCALAPPDATA%\Microsoft\Messenger\micisukth@hotmail.it\ObjectStore\CustomEmoticons\inor.exe File name: inor.exe
Size: 138.75 KB (138752 bytes)
MD5: 96bb91fd480a33723d97f12f977d90f4
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%\Microsoft\Messenger\micisukth@hotmail.it\ObjectStore\CustomEmoticons
Group: Malware file
Last Updated: December 8, 2010
%USERPROFILE%\Local Settings\Application Data\Google\Custom Buttons\Overrides\atat.exe File name: atat.exe
Size: 171.52 KB (171520 bytes)
MD5: 8d811ca0c5074ba1b1c18a64f0a240ba
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Local Settings\Application Data\Google\Custom Buttons\Overrides
Group: Malware file
Last Updated: December 8, 2010
%WINDIR%\system32\config\systemprofile\Lokale Einstellungen\Anwendungsdaten\Microsoft\forforthe.exe File name: forforthe.exe
Size: 128.51 KB (128512 bytes)
MD5: c59cbddbbd80b60632b8568a77d20d42
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32\config\systemprofile\Lokale Einstellungen\Anwendungsdaten\Microsoft
Group: Malware file
Last Updated: December 7, 2010
%PROGRAMFILES%\install.exe File name: install.exe
Size: 39.42 KB (39424 bytes)
MD5: 70bd1cad0e6b7f84b8ca61c851bd1cfd
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%
Group: Malware file
Last Updated: December 8, 2010
%LOCALAPPDATA%\Microsoft\Windows\outor.exe File name: outor.exe
Size: 146.43 KB (146432 bytes)
MD5: a7f21b45d44fe8fb39cb4196785ddc19
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %LOCALAPPDATA%\Microsoft\Windows
Group: Malware file
Last Updated: December 7, 2010

More files

Related Posts

One Comment

  • Anne Cole says:

    Thank you for the instructions. Since I never Down loaded this anti virus it is a real bother and it keeps popping up in some of the worst places. If it is this much trouble with out a down load it must be hell for the ones that do a down load. Thank you again. Anne Cole

Loading...