Home Malware Programs Rogue Anti-Spyware Programs Windows Active Guard

Windows Active Guard

Posted: July 23, 2012

Threat Metric

Threat Level: 2/10
Infected PCs: 5
First Seen: July 23, 2012
Last Seen: April 23, 2023
OS(es) Affected: Windows

Windows Active Guard Screenshot 1Windows Active Guard's features may look like anti-malware and online safety functions that could preserve your PC's wellbeing, but SpywareRemove.com malware experts better know Windows Active Guard as a rogue anti-malware program from FakeVimes. While Windows Active Guard does have an ample supply of security alerts and functions that look as though they can detect and thwart various types of PC threats, Windows Active Guard's security information is always fraudulent, and Windows Active Guard never makes a true effort to provide the features that Windows Active Guard prides itself on possessing. Because Windows Active Guard and other members of FakeVimes are also noted for anti-security characteristics (such as blocking unrelated applications arbitrarily), deleting Windows Active Guard as soon as you can make your way to a legitimate anti-malware brand of software is strongly advised.

Windows Active Guard – a Toxic Defense from a Typical Piece of Scamware

As a fake anti-malware scanner, Windows Active Guard may put up a strong showing of defending your computer from live attacks or ongoing infections, but SpywareRemove.com malware researchers have confirmed that Windows Active Guard can't find or remove any PC threat regardless of origin. Windows Active Guard infections are identifiable posthaste by the rapid-speed series of fake pop-up warnings that Windows Active Guard displays, supposedly on behalf of protecting your computer, although the alerts contained in these pop-ups always are fake. Some of these error messages may imitate normal Windows notifications, imply that OS components are damaged or claim (with inaccuracy) that specific types of high-level PC threats are on your hard drive. Alongside Windows Active Guard's pop-ups, you can also expect to be forced to endure equally fraudulent system scans that always show poor results.

Windows Active Guard's intention with this fake security information is to encourage you to purchase a registry key that will empower Windows Active Guard to remove all of these PC threats... that Windows Active Guard, of course, made up in the first place. While using a freely-distributed code to register Windows Active Guard can help make removing Windows Active Guard less tedious than usual, SpywareRemove.com malware analysts strongly warn against spending actual money on Windows Active Guard or any other member of scamware from the FakeVimes family.

Even a passing familiarity with the FakeVimes category of rogue anti-malware programs should allow you to detect Windows Active Guard as soon as Windows Active Guard displays itself, since Windows Active Guard includes characteristic traits such as an 'Advanced Process Control,' 'All-in-one Suite' and overall features that are copied from outdated versions of Microsoft's Windows Security Center. Similar rogue anti-malware programs from Windows Active Guard's family include Privacy Guard Pro, PrivacyGuard Pro 2.0, Extra Antivirus, Fast Antivirus 2009, Presto TuneUp, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, Live PC Care, PC Live Guard, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus and Smart Security.

The Importance of Having Your Own Guard Against Windows Active Guard

Even once you realize that Windows Active Guard's security alerts can be ignored in perfect safety, Windows Active Guard is still capable of being a danger to your PC. High-priority attacks by Windows Active Guard that cause SpywareRemove.com malware experts to recommend Windows Active Guard's immediate removal by real anti-malware software can include such functions as:

  • Browser hijacks that alter your online searches or redirect you to unusual websites.
  • Blocked security-related programs.
  • Damaged and deleted Registry entries that can be used to prevent programs from launching or attack your computer's security features (such as the UAC or browser protection against malicious file downloads).


Windows Active Guard Screenshot 2Windows Active Guard Screenshot 3Windows Active Guard Screenshot 4Windows Active Guard Screenshot 5Windows Active Guard Screenshot 6Windows Active Guard Screenshot 7Windows Active Guard Screenshot 8Windows Active Guard Screenshot 9Windows Active Guard Screenshot 10Windows Active Guard Screenshot 11Windows Active Guard Screenshot 12

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%AppData%\Protector-[RANDOM CHARACTERS].exe File name: %AppData%\Protector-[RANDOM CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Inspector %AppData%\Protector-[RANDOM CHARACTERS].exe File name: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Inspector %AppData%\Protector-[RANDOM CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings\UID [RANDOM CHARACTERS] File name: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings\UID [RANDOM CHARACTERS]
Group: Malware file
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings\ID 4 File name: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings\ID 4
Group: Malware file
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\WarnOnHTTPSToHTTPRedirect 0 File name: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\WarnOnHTTPSToHTTPRedirect 0
Group: Malware file
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVCare.exe File name: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVCare.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings\net [date of installation] File name: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings\net [date of installation]
Group: Malware file
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA 0 File name: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA 0
Group: Malware file
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTray.exe File name: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTray.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\system\ConsentPromptBehaviorAdmin 0 File name: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\system\ConsentPromptBehaviorAdmin 0
Group: Malware file
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\system\ConsentPromptBehaviorUser 0 File name: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\system\ConsentPromptBehaviorUser 0
Group: Malware file
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVCare.exe\Debugger svchost.exe File name: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVCare.exe\Debugger svchost.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVENGINE.EXE File name: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVENGINE.EXE
File type: Executable File
Mime Type: unknown/EXE
Group: Malware file
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVENGINE.EXE\Debugger svchost.exe File name: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVENGINE.EXE\Debugger svchost.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTray.exe\Debugger svchost.exe File name: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTray.exe\Debugger svchost.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Additional Information

The following URL's were detected:
.bytemarkup.xyz
The following messages's were detected:
# Message
1Error Attempt to modify Registry key entries detected. Registry entry analysis recommended. Warning! Spambot detected! Attention! A spambot sending viruses from your e-mail has been detected on your PC.
2Warning Firewall has blocked a program from accessing the Internet C:\program files\internet explorer\iexplore.exe is suspected to have infected your PC. This type of virus intercepts entered data and transmits them to a remote server.

One Comment

  • Eva says:

    hi!,I could not boot my PC into any safe mode or delete any of the malware files. going go try an alternative. thanks.

Loading...