Home Malware Programs Rogue Anti-Virus Programs Personal Protector 2013

Personal Protector 2013

Posted: November 20, 2012

Threat Metric

Ranking: 1,852
Threat Level: 2/10
Infected PCs: 135,057
First Seen: November 20, 2012
Last Seen: October 17, 2023
OS(es) Affected: Windows

Personal Protector 2013 is a member of the FakeSpyguard family, a small family of rogue anti-malware programs that display inaccurate system alerts to scam you into purchasing their valueless security software. Personal Protector 2013, like its cousins, routinely uses other Trojans to coordinate its attacks, displays a variety of fake security pop-ups, fakes scans of your PC and pretends to detect infections from harmless files (some of which Personal Protector 2013 creates itself). Since Personal Protector 2013 is the exact opposite of what you'd want from a good anti-malware scanner, SpywareRemove.com malware experts recommend that you trash Personal Protector 2013 with a real anti-malware product of your choice if you ever do see Personal Protector 2013 on your computer.

Personal Protector 2013's Treachery-Laced Idea of What Constitutes Protection

Personal Protector 2013 is one of several variants of scamware that are emergent from FakeSpyGuard, with other examples including (but not restricted to) SpyGuard, Spyware Guard 2008, Spyware Guard 2009, Rogue.System Guard 2009 and Personal Guard 2009. However, the differences between Personal Protector 2013 and its relatives are primarily aesthetic quirks, and all members of Personal Protector 2013's family are considered to be the same type of fake anti-malware program with the same arsenal of attacks.

SpywareRemove.com malware researchers have traced out various functions confirmed to be part of Personal Protector 2013's capabilities. These functions all are dedicated to displaying fake system information to mislead you about your PC's health as explained below:

  • Personal Protector 2013 conceals some of its components, such as Trojan:Win32/Boolwark.A, with names that are reminiscent of normal Windows files (like the ubiquitous Svchost.exe file).
  • Personal Protector 2013's Registry changes allow Personal Protector 2013 to launch with Windows automatically.
  • Personal Protector 2013 creates several junk files that are named after Windows components (Regedit.exe, etc). These files can't harm your computer and don't have any purpose except to be scapegoats when Personal Protector 2013 pretends to detect malware on your PC.
  • Personal Protector 2013 displays several types of fake system alerts in a pop-up format. Some of these alerts are designed to imitate the appearance of the Windows Security Center.
  • Lastly, Personal Protector 2013 will simulate scans of your hard drive and pretend to detect threats (as previously noted in its 'junk file' function).

Stonewalling Personal Protector 2013's Attempts to Snatch Your Wallet

With all of these plentiful attack features that don't benefit your computer, it should be easy to tell that there's no advantage to having Personal Protector 2013 installed. The same goes for purchasing Personal Protector 2013, which SpywareRemove.com malware experts strongly discourage as an utter waste of money that's not required for removing Personal Protector 2013 or restoring your PC's health. Similar warnings also apply to other members of Personal Protector 2013's family – which usually are visually determinable as being Personal Protector 2013's relatives due to their strong layout similarities.

Removing Personal Protector 2013 with a legitimate anti-malware program will have the best chance of attending to all of Personal Protector 2013's diverse components and system changes. Because Personal Protector 2013 includes many files that are named similar to Windows components and also makes significant changes to your Registry, manual deletion of Personal Protector 2013 is discouraged except in cases of a last resort.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%AppData%\[RANDOM CHARACTERS].exe File name: %AppData%\[RANDOM CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%CommonPrograms\%Personal Protector 2013\Personal Protector 2013.lnk File name: %CommonPrograms\%Personal Protector 2013\Personal Protector 2013.lnk
File type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%CommonPrograms%\Personal Protector 2013 File name: %CommonPrograms%\Personal Protector 2013
Group: Malware file
%CommonPrograms%\Personal Protector 2013\Uninstall Personal Protector 2013.lnk File name: %CommonPrograms%\Personal Protector 2013\Uninstall Personal Protector 2013.lnk
File type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%Desktopdir%\Personal Protector 2013.lnk File name: %Desktopdir%\Personal Protector 2013.lnk
File type: Shortcut
Mime Type: unknown/lnk
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Classes\exefile\shell\open\command "(Default)" = '"%AppData%[RANDOM CHARACTERS].exe" /START "%1" %*'HKEY_CURRENT_USER\Software\Classes\.exe DefaultIcon "(Default)" = '%1' = '"%AppData%[RANDOM CHARACTERS].exe" /START "%1" %*'HKEY_CURRENT_USER\Software\Classes\.exe "(Default)" = 'exefile'HKEY_CLASSES_ROOT\exefile\shell\open\command "(Default)" = ''"%AppData%[RANDOM CHARACTERS].exe" /START "%1" %*'HKEY_CLASSES_ROOT\.exe\shell\open\command "(Default)" = '"%AppData%[RANDOM CHARACTERS].exe" /START "%1" %*'

Additional Information

The following URL's were detected:
dopansearor.com
Loading...