Threat Database Rogue Anti-Spyware Program Windows Protection Alarm

Windows Protection Alarm

By ESGI Advisor in Rogue Anti-Spyware Program

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 15
First Seen: June 7, 2011
Last Seen: January 8, 2020
OS(es) Affected: Windows

Windows Protection Alarm Image

Windows Protection Alarm is a rogue anti-spyware application designed by hackers for the main purposes of extorting money from computer users. Windows Protection Alarm is able to do this by mimicking the look and feel of trusted security applications. Additionally, Windows Protection Alarm will render several fake alert messages and system scan results that attempt to make a computer user believe that their PC is infected with all types of malware. As a solution, a paid-for version of Windows Protection Alarm is offered to remove the detected threats but Windows Protection Alarm is unable to satisfy its promise because it is basically a hacker tool specifically designed to trick users out of money. In other words, purchasing Windows Protection Alarm will do absolutely nothing for a computer user seeking to rid their system of malware.

It would be best to safely remove Windows Protection Alarm with a trusted spyware removal tool or take the necessary actions to manually detect and remove all Windows Protection Alarm related files from an infected PC.

SpyHunter Detects & Remove Windows Protection Alarm

File System Details

Windows Protection Alarm may create the following file(s):
# File Name MD5 Detections
1. mwlhkc.exe bdf036b6db0157147c701b2f1b286f0b 1
2. %UserProfile%\Application Data\Microsoft\[random].exe

Registry Details

Windows Protection Alarm may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe "Debugger" = 'svchost.exe'
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = '0'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore "DisableSR " = '1'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = '0'

Trending

Most Viewed

Loading...