Home Malware Programs Rogue Anti-Spyware Programs Windows Virtual Angel

Windows Virtual Angel

Posted: July 11, 2012

Threat Metric

Ranking: 8,060
Threat Level: 2/10
Infected PCs: 55,491
First Seen: July 11, 2012
Last Seen: October 6, 2023
OS(es) Affected: Windows

Windows Virtual Angel Screenshot 1More of a barely-disguised devil than a divine messenger, Windows Virtual Angel is another example of fake anti-malware software from Win32/FakeVimes, and like its relatives, Windows Virtual Angel does its best to portray itself as having security and anti-malware features that aren't truly in evidence. Even though Windows Virtual Angel may warn you about attacks against Windows components, attempts to steal personal information and a virtual rogues' gallery of high-level PC threats, SpywareRemove.com malware researchers note that Windows Virtual Angel doesn't have any ability to detect or remove real infections of any type. Since Windows Virtual Angel's seemingly angelic qualities also include the potential for browser redirect attacks and blocking your legitimate security applications, SpywareRemove.com malware researchers recommend that you disinfect Windows Virtual Angel as quickly as is reasonable.

Windows Virtual Angel – Swinging a Halo That's on Loan from Fellow Succubi

As a recently-emerged member of FakeVimes scamware, Windows Virtual Angel is visually cloned from other well-known types of fake anti-malware programs, such as Privacy Guard Pro, PrivacyGuard Pro 2.0, Extra Antivirus, Fast Antivirus 2009, Presto TuneUp, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, Live PC Care, PC Live Guard, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus and Smart Security. Besides an appearance that's reminiscent of (the now outdated) Windows Security Center, Windows Virtual Angel and its relatives are easily identifiable by the inclusion of fake features like anti-phishing protection and a faux memory monitor that's labeled the Advanced Process Control. Prominent visual symptoms of Windows Virtual Angel being active include fraudulent pop-up warnings and system scans that display nonexistent infections for high-level PC threats (such as technically-identified rootkits and banking Trojans).

To the end of stealing your money with your own permission for the deed, Windows Virtual Angel will launch with Windows and create a constant appearance of your PC being under assault from numerous PC threats. Even though Windows Virtual Angel will indicate that the easiest solution to your troubles would be to buy its full version for a complete disinfection, SpywareRemove.com malware researchers recommend against this as a pointless expenditure of money for nonfunctional security software. Despite this, if you have any hint that it could help with deleting Windows Virtual Angel, you may wish to register Windows Virtual Angel for free with the code '0W000-000B0-00T00-E0020.'

Counting the Tally of This Fake Angel's Sins

Windows Virtual Angel can also be involved in other PC issues besides its attempt at playing itself off as a security program. Standard attacks from FakeVimes-related PC threats like Windows Virtual Angel that SpywareRemove.com malware researchers have confirmed include:

  • Programs being blocked from memory. This forces them to terminate and prevents you from accessing them while Windows Virtual Angel is active, although no permanent damage to the related software is incurred.
  • Deleted Registry entries for various programs, especially security-related ones (such as memory monitors or anti-virus scanners). This will require you to restore your Registry, repair it or reinstall the affected program before Windows Virtual Angel can launch again.
  • Online search redirects to potentially harmful websites. This can include changes to your search results.
  • Registry-based setting changes that make your PC vulnerable to other attacks. One such attack by Windows Virtual Angel that's easily-observed is its capability for disabling the Windows UAC.

In light of all this, SpywareRemove.com malware researchers strongly suggest sending Windows Virtual Angel to the PC equivalent of the underworld (AKA the Recycle Bin) with a suitable anti-malware product as soon as you can access such software.

Windows Virtual Angel Screenshot 2Windows Virtual Angel Screenshot 3Windows Virtual Angel Screenshot 4Windows Virtual Angel Screenshot 5Windows Virtual Angel Screenshot 6Windows Virtual Angel Screenshot 7Windows Virtual Angel Screenshot 8Windows Virtual Angel Screenshot 9Windows Virtual Angel Screenshot 10Windows Virtual Angel Screenshot 11

Aliases

Adware:Win32/AdRotator [Microsoft]Generic Malware [Panda]Trojan-Dropper.Win32.Dapato [Ikarus]Mal/Generic-L [Sophos]Trojan [K7AntiVirus]Generic Dropper!1wj [McAfee]TrojanDropper.Dapato.biww [CAT-QuickHeal]Generic5.GDY [AVG]Adware/Zwangi.AKH [AntiVir]Gen:Variant.Adware.Ezula.1 [BitDefender]Heur.Packed.Unknown [Comodo]UDS:DangerousObject.Multi.Generic [Kaspersky]W32/Rimecud!a [McAfee]Dropper.Generic6.AAWD [AVG]W32/Dapato.BIWW!tr [Fortinet]
More aliases (136)

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%WINDIR%\system32\svdir\nsb.exe File name: nsb.exe
Size: 5.29 MB (5296128 bytes)
MD5: 3bfa6d51cad9d20f3b6652267049ae34
Detection count: 293
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\system32\svdir
Group: Malware file
Last Updated: March 18, 2015
%WINDIR%\S-1-5-21-0075150617-0772129065-402540000-4697\king.exe File name: king.exe
Size: 124.92 KB (124928 bytes)
MD5: 854eb5d1ae012c8d321283e534434e54
Detection count: 80
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\S-1-5-21-0075150617-0772129065-402540000-4697
Group: Malware file
Last Updated: March 31, 2014
%PROGRAMFILES%\WBX\wbx.exe File name: wbx.exe
Size: 15.05 MB (15056896 bytes)
MD5: 40bae78163393df1b5e2e4f15d02bff7
Detection count: 75
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\WBX
Group: Malware file
Last Updated: August 15, 2014
%WINDIR%\svcnet2\svcnet2.exe File name: svcnet2.exe
Size: 438.78 KB (438784 bytes)
MD5: 0daf54185b5e34b05114a14736d60958
Detection count: 49
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\svcnet2
Group: Malware file
Last Updated: March 21, 2016
%WINDIR%\system32\f078b911.dll File name: f078b911.dll
Size: 1.68 MB (1682944 bytes)
MD5: ff69cebb0bc9f4470a4521848a2b0054
Detection count: 30
File type: Dynamic link library
Mime Type: unknown/dll
Path: %WINDIR%\system32
Group: Malware file
Last Updated: August 6, 2012
C:\Windows\system32\8f6d65c8.dll File name: 8f6d65c8.dll
Size: 3.24 MB (3240448 bytes)
MD5: a7bba136915c6d3b453a8a8a6902de86
Detection count: 19
File type: Dynamic link library
Mime Type: unknown/dll
Path: C:\Windows\system32\8f6d65c8.dll
Group: Malware file
Last Updated: July 24, 2021
%APPDATA%\Alps\Alps.exe File name: Alps.exe
Size: 73.21 KB (73216 bytes)
MD5: e76b6d1d349876630d9afec425c8fbe4
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Alps
Group: Malware file
Last Updated: August 6, 2012
%ALLUSERSPROFILE%\Local Settings\Temp\msajhywpc.exe File name: msajhywpc.exe
Size: 29.18 KB (29184 bytes)
MD5: 7baeb6702fc9660dce84de246551cc02
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %ALLUSERSPROFILE%\Local Settings\Temp
Group: Malware file
Last Updated: August 6, 2012
%AppData%\Protector-[RANDOM CHARACTERS].exe File name: %AppData%\Protector-[RANDOM CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\Protector-hayq.exe File name: Protector-hayq.exe
Size: 1.84 MB (1845760 bytes)
MD5: 0623d69f6be79d3b0233d623466cdb69
Detection count: 0
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: July 12, 2012

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegistryTools" = 0HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = 0HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = 0HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegedit" = 0HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "net" = "2012-2-17_2"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "UID" = "rudbxijemb"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "ID" = 0HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Inspector"HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ERROR_PAGE_BYPASS_ZONE_CHECK_FOR_HTTPS_KB954312HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avp32.exeHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\divx.exeHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mostat.exeHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\platin.exeHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tapinstall.exeHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpcc.exeHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashDisp.exeHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zapsetup3001.exe

Additional Information

The following URL's were detected:
x1heref1le1x.com
The following messages's were detected:
# Message
1Error Attempt to modify registry key entries detected. Registry entry analysis is recommended.
2Error Potential malware detected It is recommended to activate the protection and perform a thorough system scan to remove the malware.
3Warning Firewall has blocked a program from accessing the Internet Windows XP USER API Clien: DLL User32.dll User32.dll is suspended to have infected your PC. This type of virus intercepts entered data and transmits them to a remote server. Recommended: Please click “Prevent attack” button to prevent all attacks and protect your PC.

Loading...