Trojan-BNK.Win32.Keylogger.gen fake virus infection

Trojan-BNK.Win32.Keylogger.gen is the bogus PC threat that does not exist in real cyber world. The warning about your computer being infected with this type of malware is originated by rogue and not by the legitimate anti-virus software. If your computer is infected with one of many Multirogue 2012 fake anti-viruses the chances are that you would eventually encounter this fictitious warning. At present time there are at least 15 variations of such fake anti-viruses previously described by us in more details. When one of such malware samples penetrates into the PC with compromised security it would commence its malicious activity immediately. Of course, the malware’s infiltration is carried out without consideration of your own opinion whether you want to install it or not. This very feature is typical to all rogue security applications, including the ones belonging to the Braviax malware clan.

Trojan-BNK.Win32.keylogger.gen scam
Trojan-BNK.Win32.keylogger.gen infection

Once the rogue is successfully and completely installed it would make all the provisions in order to be started together with Windows. Then the hoax starts its brainwashing campaign by first initiating the fictitious scan of your computer. After the scan is over the virus would prepare the detailed report regarding various forms, types and kinds of threats supposedly detected by it during the scan. This scary approach is aimed to make you really nervous about the condition of your system. This is how the rogue intends to prompt you into purchasing its licensed version, promising you to remove all those fake threats after you obtain the registration code of the full commercial version of this fake anti-virus. Purchasing this code would not save your computer and would not make it cleaner. This would make your wallet thinner and bank account balance lower, but surely this would not render anti-virus protection for your machine. The malware is simply incapable of detecting or deleting real security threats, so paying funds for it is the total waste of your money. Another annoying feature of this virus is that it would terminate all your attempts to remove the rogue. If you have any powerful anti-viruses and aim to use them for removal of Multirogue 2012 virus this malware would prevent you from launching the remover, saying that the file you are going to open is infected with Trojan-BNK.Win32.Keylogger.gen. So, any software you aim to launch would be reported as the one that is infected with Trojan-BNK.Win32.Keylogger.gen bogus threat. The virus even tells that your browsers like Internet Explorer, Opera, Google Chrome and Mozilla Firefox, all of them, are contaminated with this unknown Trojan. Of course, such information cannot be referred to as true one.

You must remove the real threat causing Trojan-BNK.Win32.Keylogger.gen fake virus warning to appear. For this purpose you may download, install and run GridinSoft Trojan Killer. After the scan is over you must delete all detected infections. There are special tricks how you can launch Trojan Killer and prevent the rogue blockage. They are described in more details below, so please read the instructions carefully and follow them step-by-step. The video guide to help you get rid of this malady is also with watching. If you experience any problems deleting this scam please make sure to contact us at once, without delay.

MultiRogue 2012 virus family automatic remover:

Tricks to download and run GridinSoft Trojan Killer in spite of the blockage on the part of MultiRogue 2012 virus

  1. If you cannot download GridinSoft Trojan Killer due to such attempts being blocked by the rogue you may amend your PC time to 7-8 days in the future and then restart your system. After that you may reset the date to correct time. After this, download, install and run Trojan Killer to remove all threats.
  2. If you already have GridinSoft Trojan Killer installed you may right-click its desktop shortcut and run it as Administrator. This should also help you bypass the blockage on the part of virus.

MultiRogue 2012 virus removal video:

MultiRogue 2012 manual removal guide:

Delete MultiRogue 2012 files:
%UserProfile%\Local Settings\Application Data\opRSK
%UserProfile%\Local Settings\Application Data\pw.exe
%UserProfile%\Local Settings\Application Data\vz.exe
%UserProfile%\Local Settings\Application Data\MSASCui.exe
Delete MultiRogue 2012 registry entries:
HKCU\Software\Classes\.exe\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “%1” %*
HKCU\Software\Classes\pezfile\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “%1” %*
HKCU\Software\Classes\.exe\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\vz.exe” /START “%1” %*
HKCU\Software\Classes\pezfile\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\vz.exe” /START “%1” %*
HKCR\.exe\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “%1” %*
HKCR\pezfile\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “%1” %*
HKCR\.exe\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\vz.exe” /START “%1” %*
HKCR\pezfile\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\vz.exe” /START “%1” %*
HKLM\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “C:\Program Files\Mozilla Firefox\firefox.exe”
HKLM\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “C:\Program Files\Mozilla Firefox\firefox.exe” -safe-mode
HKLM\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\pw.exe” /START “C:\Program Files\Internet Explorer\iexplore.exe”
HKLM\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\vz.exe” /START “C:\Program Files\Mozilla Firefox\firefox.exe”
HKLM\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command “(Default)” = “%UserProfile%\Local Settings\Application Data\vz.exe” /START “C:\Program Files\Mozilla Firefox\firefox.exe” -safe-mode
HKLM\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command “(Default)” = “%UserProfile%\Local Settings\Application Data\vz.exe” /START “C:\Program Files\Internet Explorer\iexplore.exe”
HKLM\SOFTWARE\Microsoft\Security Center “AntiVirusOverride” = “1”
HKLM\SOFTWARE\Microsoft\Security Center “FirewallOverride” = “1”

10 thoughts on “Trojan-BNK.Win32.Keylogger.gen fake virus infection

  1. I cannot get your software to load. I use “run as administrator” and the trojan is blocking the wizard. I have full admin rights to my machine.

  2. It worked! I had to re-set the clock as detailed within your tricks description. However when I restarted the computer I could not set my windows update to automatic! I have now carried out a system restore and everything seems to be running fine.
    Thanks again!

Leave a Comment