APCProtect is a rogue antispyware program that installed through the use of trojans that come from fake online malware scanners or misleading websites that ask users to install a fake codec or a fake flash player update needed to watch a video online.
When the trojan is started, it will download and install APCProtect onto your computer and set it to run automatically when Windows starts. The trojan will also create numerous files with random names in Windows and Windows\System32 folders that made to appear as infections, but in reality all of them are harmless.
When running, APCProtect will start a scan and list a variety of infections to make you think that your computer is infected with a lot of spyware, worms, trojans and other viruses. However, it won’t remove those infections unless you first purchase the program. Of course, this is a scam, important to know that the rogue lists previously created files as threats to make you think that your computer in danger. However, you should ignore the scan results!.
Last, but not least, the trojan that installs APCProtect will install a variant of trojan FakeAlert. When installed, the trojan will display a screen that looks like legitimate Windows Security Center with one exception, it will suggest you to register the fake antispyware program. The trojan will also display a lot of alerts from Windows task bar. An example:
Spyware Alert!
Your computer is infected with spyware. It could damage your
critical files or expose your private data on the Internet. Click
here to register your copy of APCProtect and remove spyware
threats from your PC.
Like false scan results, all of these alerts are fake and should be ignored! APCProtect is designed with one purpose to trick you into purchasing so-called “full” version of the program.
If you find that your computer is infected with this malware, then most importantly, do not purchase it! Use the removal guide below to remove APCProtect and any associated malware from your computer for free.
More screen shoots of APCProtect
Symptoms in a HijackThis Log
O4 – HKCU\..\Run: [
Spyware software are surreptitiously installed on user`s computer to collect information about computer’s configuration, user`s private information, user’s activity without his consent. Spyware may also change Windows settings, download and install other malicious programs without the user’s knowledge.
.exeO4 – HKCU\..\Run: [APCProtect.exe] C:\Program Files\APCProtect Software\APCProtect\APCProtect.exe
Use the following instructions to remove APCProtect (Uninstall instructions)
Download MalwareBytes Anti-malware (MBAM). Once downloaded, close all programs and windows on your computer.
Double-click on the icon on your desktop named mbam-setup.exe. This will start the installation of MalwareBytes Anti-malware onto your computer. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing, make sure a checkmark is placed next to “Update Malwarebytes’ Anti-Malware” and Launch “Malwarebytes’ Anti-Malware”. Then click Finish.
MalwareBytes Anti-malware will now automatically start and you will see a message stating that you should update the program before performing a scan. If an update is found, it will download and install the latest version.
As MalwareBytes Anti-malware will automatically update itself after the install, you can press the OK button to close that box and you will now be at the main menu. You will see window similar to the one below.
Malwarebytes Anti-Malware Window
Make sure the “Perform quick scan” option is selected and then click on the Scan button to start scanning your computer for APCProtect infection. This procedure can take some time, so please be patient.
When the scan is finished a message box will appear that it has completed scanning successfully. Click OK. Now click “Show Results”. You will see a list of infected items similar as shown below.
Note: list of infected items may be different than what is shown in the image below.
Malwarebytes Anti-malware, list of infected items
Make sure all entries have a checkmark at their far left and click “Remove Selected” button to remove APCProtect. MalwareBytes Anti-malware will now remove all of associated APCProtect files and registry keys and add them to the programs’ quarantine. When MalwareBytes Anti-malware has finished removing the infection, a log will open in Notepad and you may be prompted to Restart.
Note: if you need help with the instructions, then post your questions in our Spyware Removal forum.
APCProtect creates the following files and folders
C:\Documents and Settings\All Users\Start Menu\Programs\APCProtect
C:\Program Files\APCProtect Software
C:\Program Files\APCProtect Software\APCProtect
C:\WINDOWS\system32\
Spyware software are surreptitiously installed on user`s computer to collect information about computer’s configuration, user`s private information, user’s activity without his consent. Spyware may also change Windows settings, download and install other malicious programs without the user’s knowledge.
.exeC:\Program Files\APCProtect Software\APCProtect\APCProtect.exe
C:\Documents and Settings\All Users\Start Menu\Programs\APCProtect\1 APCProtect.lnk
C:\Documents and Settings\All Users\Start Menu\Programs\APCProtect\2 Homepage.lnk
C:\Documents and Settings\All Users\Start Menu\Programs\APCProtect\3 Uninstall.lnk
C:\Program Files\APCProtect Software\APCProtect\uninstall.exe
C:\Documents and Settings\All Users\Desktop\APCProtect.lnk
APCProtect creates the following registry keys and values
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\APCProtect
HKEY_LOCAL_MACHINE\SOFTWARE\APCProtect
HKEY_CURRENT_USER\SOFTWARE\APCProtect
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
Spyware can do the following:
1. gather information about user habits of use of the Internet, what sites are visited most frequently (known as “tracking software”);
2. record keystrokes (keyloggers) and make a screenshots (screen scraper) and send collected data to the creator of the spyware;
3. remotely control user computer (remote control software) – backdoor, botnets, droneware;
4. download and run on user computer an additional malware;
5. analyze the state of security systems, scan an open ports, and look for vulnerabilities to crack passwords;
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\APCProtect.exe