{"id":4277,"date":"2011-04-25T09:00:31","date_gmt":"2011-04-25T16:00:31","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=4277"},"modified":"2018-01-30T12:37:24","modified_gmt":"2018-01-30T19:37:24","slug":"rotw-total-security-and-antivirus-is","status":"publish","type":"post","link":"https://www.webroot.com/blog/2011\/04\/25\/rotw-total-security-and-antivirus-is\/","title":{"rendered":"ROTW: &#8220;Total Security&#8221; and Antivirus IS"},"content":{"rendered":"<p><strong>By Brenden Vaughan and Andrew Brandt<\/strong><\/p>\n<p class=\"getsocial\" style=\"text-align:left;\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2004.png\" alt=\"\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2011\/04\/25\/rotw-total-security-and-antivirus-is\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2014.png\" alt=\"Add to Facebook\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F25%2Frotw-total-security-and-antivirus-is&amp;title=ROTW%3A%20%22Total%20Security%22%20and%20Antivirus%20IS\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2024.png\" alt=\"Add to Digg\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F25%2Frotw-total-security-and-antivirus-is&amp;title=ROTW%3A%20%22Total%20Security%22%20and%20Antivirus%20IS\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2034.png\" alt=\"Add to Del.icio.us\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F25%2Frotw-total-security-and-antivirus-is&amp;title=ROTW%3A%20%22Total%20Security%22%20and%20Antivirus%20IS\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2044.png\" alt=\"Add to Stumbleupon\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F25%2Frotw-total-security-and-antivirus-is&amp;title=ROTW%3A%20%22Total%20Security%22%20and%20Antivirus%20IS\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2054.png\" alt=\"Add to Reddit\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F25%2Frotw-total-security-and-antivirus-is&amp;Title=ROTW%3A%20%22Total%20Security%22%20and%20Antivirus%20IS\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2064.png\" alt=\"Add to Blinklist\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=ROTW%3A%20%22Total%20Security%22%20and%20Antivirus%20IS+%40+http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F25%2Frotw-total-security-and-antivirus-is\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2074.png\" alt=\"Add to Twitter\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http:\/\/blog.webroot.com\/2011\/04\/25\/rotw-total-security-and-antivirus-is\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2084.png\" alt=\"Add to Technorati\" \/><\/a><a title=\"Add to Yahoo Buzz\" href=\"http:\/\/buzz.yahoo.com\/buzz?targetUrl=http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F25%2Frotw-total-security-and-antivirus-is&amp;headline=ROTW%3A%20%22Total%20Security%22%20and%20Antivirus%20IS\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2094.png\" alt=\"Add to Yahoo Buzz\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2011%2F04%2F25%2Frotw-total-security-and-antivirus-is&amp;h=ROTW%3A%20%22Total%20Security%22%20and%20Antivirus%20IS\" rel=\"nofollow\" target=\"_blank\"><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2104.png\" alt=\"Add to Newsvine\" \/><\/a><img decoding=\"async\" style=\"border:0;margin:0;padding:0;\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2114.png\" alt=\"\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/04\/20110425_rotw_antivirus-is-logo.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-4283\" title=\"20110425_rotw_antivirus-is-logo\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/04\/20110425_rotw_antivirus-is-logo.png\" alt=\"\" width=\"209\" height=\"54\" \/><\/a>This week, our support and advanced malware removal (AMR) team did not have a lot of new data to report about rogue security products. The most commonly encountered infection continues to be one of the rogues <a href=\"http:\/\/blog.webroot.com\/2011\/04\/18\/rogues-of-the-week-xp-total-security-and-ms-removal-tool\/\" target=\"_blank\">we reported about last week<\/a>.<\/p>\n<p>While we may refer to it as <strong>XP Total Security<\/strong>, it actually chooses one of a series of names at random, based on the operating system on the victim&#8217;s computer. Last week&#8217;s post contains a more comprehensive list of these names. As previously reported, you can remove the rogue by scanning (with <em>our<\/em> product, not theirs) while the computer is in Safe Mode.<\/p>\n<p>Its main executable has a random, three-character filename, and gets installed into a random, three-character folder inside the Application Data folder for the user who is currently logged on at the time of the infection. The rogue&#8217;s install location is:<\/p>\n<pre> %UserProfile%Local SettingsApplication Data&lt;random&gt;&lt;random&gt;.exe<\/pre>\n<p>AMR reported seeing another rogue called <strong>Antivirus IS<\/strong>. While this is the first time they have mentioned it, Brenden believes it is a bit older, and has been floating around since late last year. Its logo is a blue shield with a single red diagonal stripe; its tagline, &#8220;Innovative protection for your PC,&#8221; is utter nonsense.<br \/>\n<!--more--><br \/>\nIt&#8217;s worth mentioning, as well, that there shouldn&#8217;t be <em>any<\/em> programs in the Application Data folder. Legitimate programs usually create folders inside that directory, and maintain data files, logs, and other files they require inside of those folders. Technically speaking, there are two of these folders for a given user account.<\/p>\n<p>To see what&#8217;s inside each of your Application Data folders, click the Start menu, select Run&#8230;, then type either of the following commands into the text field and hit the Enter key or the OK button. Each will take you to a different folder.<\/p>\n<pre>%appdata%\n%UserProfile%Local SettingsApplication Data<\/pre>\n<p>The directories should be full of other folders, and should not have any executable files in them, though there may be a few stray (harmless) data files or .ini files. Common <strong>legitimate<\/strong> three-character folder names include <strong>Sun<\/strong> (which contains files for Java) or <strong>vlc<\/strong> (used by the popular media player of the same name). There are probably many other legitimate three-letter folder names as well. Don&#8217;t delete anything from these locations unless you know what you&#8217;re doing.<\/p>\n<h3>Antivirus IS<\/h3>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/04\/20110425_rotw_antivirus-is.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-4284\" title=\"20110425_rotw_antivirus-is\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/04\/20110425_rotw_antivirus-is.png?w=300\" alt=\"\" width=\"300\" height=\"228\" \/><\/a><\/p>\n<p>Antivirus IS makes some system modifications that inhibit your ability to use the browser.<\/p>\n<p>The rogue changes your DNS server settings, which permits the rogue&#8217;s operators to direct your computer to sites other than the ones you intend to visit. We were <em>shocked, shocked<\/em> to discover that the DNS servers it points to are in a range of IP addresses assigned to an ISP in Ukraine. It also sets a registry key that disable the Internet Explorer Phishing Filter, and other keys that permit the rogue to act as a local Web proxy on port 5643 of the infected machine, which serves to prevent the browser from visiting certain Web sites.<\/p>\n<p>The following registry keys are some of the ones Antivirus IS created on a research testbed:<\/p>\n<pre>HKEY_LOCAL_MACHINESystemCurrentControlSetServicesTcpipParameters\n NameServer=93.188.163.182,93.188.166.182\n\nHKEY_CURRENT_USERSOFTWAREMicrosoftInternet ExplorerPhishingFilter\n Enabled=0\n\nHKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionrun\n &lt;random&gt;=%UserProfile%Local SettingsApplication Data&lt;random&gt;&lt;random&gt;.exe<\/pre>\n<p>(&lt;random&gt;, in this case, is typically three alphabetic characters chosen at random.)<\/p>\n<p>In the presence of some or all of the above registry settings, the following ones may also be considered harmful. If you manually remove the rogue and fail to remove these keys as well, your browser will not be able to surf the Web until you turn off the local proxy by setting <strong>ProxyEnable<\/strong> to <strong>0<\/strong> (zero):<\/p>\n<pre>HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionInternet Settings\n ProxyEnable=1\n ProxyOverride=&lt;local&gt;\n ProxyServer=127.0.0.1:5643<\/pre>\n<p><em>&#8212; Vaughan<\/em><br \/>\n<a title=\"Webroot blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" alt=\"Webroot blog stats\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Brenden Vaughan and Andrew Brandt This week, our support and advanced malware removal (AMR) team did not have a lot of new data to report about rogue security products. The most commonly encountered infection continues to be one of the rogues we reported about last week. While we may refer to it as XP [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[8441,4811,8421,8417,3769,8445,8423,3483,4241,8447,8451,6567,8453,8437,8449,8435,4893,8443,8439,3471],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4277"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=4277"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4277\/revisions"}],"predecessor-version":[{"id":23851,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/4277\/revisions\/23851"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=4277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=4277"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=4277"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=4277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}