Windows Protection Unit is a rogue anti-spyware program with aim to scare you into thinking that your computer is infected and to make you buy useless security product. If your computer is infected with this rogue anti-spyware program, don't purchase it! It is a scam and has nothing to do with genuine antivirus software. Instead, remove Windows Protection Unit from your computer as soon as possible and do not allow it to download additional malware. The rogue anti-spyware program is usually promoted through the use of trojans, fake online anti-malware scanners and hacked websites. Once your computer is infected with either trojan downloaders or scareware, you will be flooded with fake security alerts and notifications from Windows task bar claiming that your computer is seriously infected and that you must use Windows Protection Unit in order to clean your computer.
When running,Windows Protection Unit will start a fake system scan and report many non-existent infections. The scan is fabricated from start untill end, these infections are all fake and don't actually exist. The truth is that this program is unable neither to detect nor to delete any kind of infections. To make things worse, Windows Protection Unit will constantly display pop-ups and security warnings very similar to those shown by Windows Security Center. These alerts will state that your computer is infected with malware, e.g. spyware, trojans or even viruses. All this undesirable behavior is done only to trick you into purchasing Windows Protection Unit.
Firewall has blocked a program from accessing the Internet.
Windows Media Player Resources
C:\Windows\system32\dllcache\wmploc.dll is suspected to have infected your PC. This type of virus intercepts entered data and transmits them to a remote server.
Keylogger activity detected. System information security is at risk.
It is recommended to activate protection and run a full system scan.
Software without a digital signature detected.
Your system files are at risk. We strongly advise you to activate your protection.
What is more, this rogue anti-spyware program hijacks Internet Explorer and redirects the users to malicious websites that promote Windows Protection Unit or other malware. In some cases, this virus modifies Windows HOST file and blocks certain websites in order to protect itself from being removed. As you can see, this program is harmful and must be removed upon detection. The removal guide below provides all information required to remove Windows Protection Unit from your computer. We strongly recommend you to use malware removal software given below.
The latest parasite names used by FakeVimes:
Windows Protection Unit manual removal:
Delete registry values:
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings "WarnOnHTTPSToHTTPRedirect" = 0
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem "DisableRegedit" = 0
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem "DisableRegistryTools" = 0
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem "DisableTaskMgr" = 0
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionSettings "ID" = 0
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionSettings "net" = "2012-2-17_2"
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionSettings "UID" = "rudbxijemb"
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options_avp32.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options_avpcc.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution OptionsashDisp.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsdivx.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsmostat.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionsplatin.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionstapinstall.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Optionszapsetup3001.exe