Privacy Protection

By | November 6, 2011 | 1 Comment

If you notice an existence of Security Protection on the computer, better seek help from trusted technician or yet remove it yourself using the guide we prepared on this article. Rogue applications such as Security Protection needs to eliminate from the system urgently.

Do you have an idea what will happen if this rogue program stays resident for long? The consequences are perilous. At first stage of infection, Security Protection promotes itself as computer protection software. Extremely displaying false but convincing warning and alerts, users may positively accept this pretentious application as lawful. In just a matter of minutes, Security Protection will fetch configuration file from a remote server. Victim may not be aware of other dangers that the fake anti-virus is attempting to implement.

Security Protection supplementary configurations mean to obstruct any .EXE files to be executed. Thus, running any anti-virus program to take out this threat is not possible. Additionally, essential tools to carry out troubleshooting are render inoperative. Security Protection immediately closes task manager, registry editor and control panel when attempted to run.

Having this rogue application on the system complicates the operation, or worst, it is certainly useless. Regaining control over the affected computer involves absolute removal of Security Protection. Im-infected.com’s removal guide on this page is prepared to assist our visitors, especially victims of Security Protection, to clean the system and turn it to virus-free once more.

Type Rogue
Sub-Type FakeAV
Systems Affected Windows XP, Windows Vista, Windows 7

What are the Symptoms of Privacy Protection Virus Infection?

When Privacy Protection is installed, it will provide a virus scan that does not need user’s intervention. The rogue software runs on itself. It will produce several threats identified on the computer and advises immediate removal using the licensed version of Privacy Protection.

Other Detection Name for Privacy Protection

BitDefender Trojan.Generic.KD.392989
Comodo Heur.Suspicious
DrWeb Trojan.MulDrop2.54093
Emsisoft DangerousObject.Multi.AMN!A2
F-Secure Trojan.Generic.KD.392989
Kaspersky Trojan.Win32.Jorik.Fraud.hdm
MalwareBytes Anti-Malware Trojan.FakeAlert
Panda Suspicious file
PCTools RogueAntiSpyware.AVGuard
Sophos Sus/UnkPack-C

System Changes

The malware will load using the process:
gtlcuxxpmy.exe or any random characters

Malicious files created by Privacy Protection are the following:
Windows XP
c:\Documents and Settings\(User Name)\Local Settings\Application Data\gtlcuxxpmy.exe
c:\Documents and Settings\(User Name)\Desktop\Privacy Protection.lnk
c:\Documents and Settings\(User Name)\Local Settings\Temp\1.tmp
c:\documents and settings\(User Name)\Local settings\Temp\2.tmp

Windows Vista/ Windows 7
c:\ProgramData\gtlcuxxpmy.exe
c:\Users\(User Name)\Desktop\Privacy Protection.lnk

Privacy Protection will create the following registry entries:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Privacy Protection

One thought on “Privacy Protection

  1. computer

    May I just say what a comfort to find a person that truly knows what they are discussing on the internet.
    You certainly know how to bring a problem to light and make it important.

    More people should check this out and understand this side of your story.
    I can’t believe you aren’t more popular because you definitely possess the gift.

Leave a Reply

Your email address will not be published. Required fields are marked *