1 of 5
Danger level 9
Type: Rogue Anti-Spyware
Common infection symptoms:
  • Block exe files from running
  • Installs itself without permissions
  • Connects to the internet without permission
  • Slow internet connection
  • Annoying Pop-up's
  • Slow Computer
Other mutations known as:
WindowsStabilityAlarm

Windows Stability Alarm

There are many threats facing healthy PCs these days, and the only way to protect your PC from rogue security applications such as Windows Stability Alarm and the threats they pose is to protect your PC with a genuine security tool. This Windows Stability Alarm finds its roots in a long line of equally despised rogue applications, such as Windows Troubles Remover, Windows Protection Servant and Windows Inspection Utility. It also forms part of the now infamous fake Microsoft Security Essentials scam.

Download Spyware Removal Tool to Remove* Windows Stability Alarm
  • Quick & tested solution for Windows Stability Alarm removal.
  • 100% Free Scan for Windows

Windows Stability Alarm will enter the system under suspicious circumstances. It will not alert the user to its presence, and will remain hidden until such time that it is ready to start its attack against the PC. This will happen by the rogue initiating a fake system scan, which will invariably end up informing the user of fake security threats as being present on the system. Windows Stability Alarm is delivered into the system in a variety of ways, most commonly through bogus online malwares scanners, and seditious browser hijackers.

As a further attack on the system, this rogue will spam the user with numerous fake security threats in the form of pop up messages. These will warn the user of the presence of well-known bogus threats such as Unknown Win21/Trojan and Backdoor.Win32.Rbot. Most of the fake alerts will contain calls to action, that when acted upon will facilitate Windows Stability Alarm in its goal to rip the consumer off. Some of the most popular fake alerts read as follows:

System Security Warning
Attempt to modify register key entries is detected. Register entries analysis is recommended.

Warning!
Location: c:\windows\system32\taskmgr.exe
Viruses: Backdoor.Win32.Rbot

Other symptoms associated with this rogue include the user losing his ability to connect to the Internet, as well as being unable to launch any type of executable on the system. This is always done in an effort to keep the user from running or downloading an application which may be able to get rid of Windows Stability Alarm. Users also reported poor system performance, increased erratic system behavior and the random generating and deleting of Desktop items.

At the end of the day you will only be able to take back what is rightfully yours if you destroy Windows Stability Alarm immediately. This can safest be achieved by making use of a properly functioning security tool.

Download Spyware Removal Tool to Remove* Windows Stability Alarm
  • Quick & tested solution for Windows Stability Alarm removal.
  • 100% Free Scan for Windows
disclaimer

How to manually remove Windows Stability Alarm

Files associated with infection (Windows Stability Alarm):

%AppData%\Microsoft\[random].exe

Processes to kill (Windows Stability Alarm):

%AppData%\Microsoft\[random].exe

Remove registry entries (Windows Stability Alarm):

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe "Debugger" = 'svchost.exe'
Disclaimer

Post comment — WE NEED YOUR OPINION!

Comment:
Name:
Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.