Windows Antibreach Patrol
Posted: March 24, 2014
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 19 |
First Seen: | March 24, 2014 |
---|---|
Last Seen: | January 8, 2020 |
OS(es) Affected: | Windows |
Windows Antibreach Patrol is a fake anti-malware scanner that cons victims out of money through pretending to detect separate threat attacks while also indulging in much of the same behavior that Windows Antibreach Patrol attributes to other threatening programs. Since Windows Antibreach Patrol is a verified threat to any PC that Windows Antibreach Patrol is installed on, all due effort should be made to block Windows Antibreach Patrol and then use appropriate anti-malware tools to remove Windows Antibreach Patrol. Fake online scanners, pop-up warnings and other Web-based attacks are most likely to be involved in Windows Antibreach Patrol's original installation, which may or may not need your consent to occur.
The Consequences of Getting Sucked into the Scamware Patrol
Although many major groups of scamware families have been thoroughly identified by malware experts and other industry professionals, the continual development of fresh variants of fake security products like Windows Antibreach Patrol places new victims in danger on a daily basis. Been a part of the FakeVimes family and having more than a passing resemblance to FakePAV and NameChanger-based threats, Windows Antibreach Patrol continues in their footsteps by displaying inaccurate security information that imitates the threat warnings of legitimate products. In the process of doing so, Windows Antibreach Patrol also attempts to trick its victims out of money by requesting that they purchase its software to fix all detected (and imaginary) problems.
Windows Antibreach Patrol makes no attempts to hide itself, and, in fact, will launch automatically and display its fake system-scanning window whenever Windows starts. However, while doing so, Windows Antibreach Patrol also will launch disguised attacks against your PC, the most important of which malware experts have noted as follows:
- Windows Antibreach Patrol may modify the Registry to cause itself to launch in lieu of unrelated applications. In most cases, Windows Antibreach Patrol limits this attack to redirecting victims from essential security and system maintenance apparatus, such as the Registry Editor or the Task Manager.
- Other applications may also be blocked by Windows Antibreach Patrol, which may monitor your PC's memory processes and close ones that Windows Antibreach Patrol hasn't white-listed. Brands of browsers other than Internet Explorer and several types of social messaging applications are examples of some programs that may be targeted by this attack. However, Windows Antibreach Patrol effectively may restrict your access to almost any software on your PC, until Windows Antibreach Patrol is disabled.
- While blocking other programs through the above attacks, Windows Antibreach Patrol may load fake pop-up warnings that claim that these programs have been compromised by threats. Typical 'cry wolf' pop-ups may include fake detections of high-level threats, such as backdoor Trojans, spyware and/or rootkits.
Even though Windows Antibreach Patrol dresses these attacks up as security features, Windows Antibreach Patrol has no capability to detect real threats, prevent their attacks or remove them from your PC. This holds true whether or not you purchase the equally-fake 'premium' version of Windows Antibreach Patrol, which malware experts strongly advise against doing.
Banishing the Fraud that Breached Your PC
While Windows Antibreach Patrol's attacks are disguised to look identical to the warning messages of firewall utilities and other security products, Windows Antibreach Patrol's presence on your PC is no more helpful than that of any Trojan infection. To deal with Windows Antibreach Patrol's propensity for blocking other software, malware researchers find it best to use standard PC security techniques to disable Windows Antibreach Patrol, and any other threat that may be installed with Windows Antibreach Patrol. With that taken care of, real anti-malware products should be able to detect and uninstall Windows Antibreach Patrol without any issues.
Windows Antibreach Patrol and its many clones tend to be installed through hacked websites, threatening websites and compromised advertising networks that peddle threats as fake software updates. Blocking these updates by disabling scripts and having strong Web security is a relatively painless way of keeping scamware like Windows Antibreach Patrol off your computer.
Related PC threats include but aren't limited to examples like Privacy Guard Pro, PrivacyGuard Pro 2.0, Extra Antivirus, Fast Antivirus 2009, Presto TuneUp, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, Live PC Care, PC Live Guard, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus and Smart Security.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%APPDATA%\svc-uddc.exe
File name: svc-uddc.exeSize: 1.13 MB (1132544 bytes)
MD5: a5a9ced8262157b1a4d464e49957d50c
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: January 8, 2020
Registry Modifications
File name without pathWindows AntiBreach Patrol.lnk
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.