"Rogue" software is an antivirus or antispyware program that tricks users into buying or installing it, usually by infecting a user's computer, or by pretending the computer is infected.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
This program is the "demo" version of a rogue antispyware application. It attempts to convince the user to "upgrade" and purchase the full version of the software by making the user believe that their computer system is riddled with malware; the malware would, of course, only be removed if the user purchases the full version of the program.See also the rogue antispyware description.
Upon execution, this rogue antispyware displays this End User License Agreement (EULA):
Supposedly, the user must accept it before the software will install onto the system. If the user does not accept the EULA, it will not pretend to scan the system and display fake output. It will, however, still create the following registry keys:
Create these files:
It queries this website:
If the user does agree to the EULA, the program does all the above, and in addition will pretend to scan the system:
After the scan, it will display these files, which are supposedly on the computer system. In reality, these files are taken from a predefined list located in C:\Program Files\VirusRemover2008\Viruses.bdt.
If the user closes this window, the rogue will display this notification box to remind the user that the system is still infected:
Create these directories:
Creates these mutexes:
Attempts to download files from:
Sets these values:
Creates these keys:
Ask questions in our Community .
Check the user guide for instructions.
Submit a Sample
Submit a file or URL for analysis.