There is no way to tell if malware did this or if the user has so we opt to help less knowledgeable users assuming that expert users will see the detection , understand it and add it to the ignore list .
The first sentence's implication ("steal windows") does not necessarily follow from the second sentence. Not everyone who uses a tool which is sometimes used by crackers is a cracker. Some might even be security people themselves.
The fact is, Windows' activation system is fairly braindead. Among the things it doesn't handle well are major hardware upgrades, and transferring of licenses from one system to another - the latter of which is a right of the end user as a corollary to the "doctrine of first sale", and has been upheld repeatedly by the courts in explicit repudiation of licensing clauses which may try to prohibit it.
AntiWPA does not prevent updates. I've got a computer which has been running AntiWPA 3.3 for a couple of years now, in order to make use of the Windows XP Professional license from an earlier laptop which had died (the license key/COA is sitting on the desk in front of me, still attached to the plastic memory cover from the old laptop). It has never had any trouble obtaining updates, and receives the same set of updates as other computers I have which do not run AntiWPA and were activated the normal way.
A user carefully installing AntiWPA for the purpose of making legitimate use of their legal rights is no more likely to infect their system with other malware than a user who has activated the usual way. In fact, they are probably less likely to have malware, as they have shown enough of a modicum of computer savvy to search out and vet AntiWPA and decide it is the appropriate tool for their needs. They might in fact even have read the publicly-available source code, tested it in a sandbox, and continued to monitor its activity after installation to make sure it isn't doing anything wayward.
The simple fact is, labeling AntiWPA as "Trojan.I.Stole.Windows" is both technically incorrect and legally questionable (and, be aware, there are jurisdictions where knowingly making a false accusation of criminality is itself a criminal act), not to mention inappropriately snarky.
Note that I didn't say the clauses were "illegal" (which would imply an actual law was passed making it a crime simply to write a license which attempted to apply such limitations); what the courts have repeatedly said is that such clauses are not legally enforceable, that if it looks like a purchase, it is a purchase, and that, as such, "licensing" terms cannot abrogate the rights that come with making a purchase. It's just that you're unlikely to get Microsoft people to admit as such, including many of the people you might talk to when calling to change the license - many will still pressure you to get a new license (at the very least burning up your time and running up your phone bill for this supposedly "FREE" call). It's along the same lines as their moving the COA/license key to unremovable stickers on the cases of the computers (instead of a card at the front of the software packet that comes with the computer, where they used to be) - they hope that if they make it difficult enough to actually carry out what is your legal right, you'll give in and do it their way even if they can't actually legally force you to do so. And maybe they even hope that somewhere down the line some court will actually side with them (and completely change the nature of consumer law) - but it hasn't happened yet.
Look, if Malwarebytes wants to keep identifying AntiWPA using a misleading label, it's entirely within your rights to do so, just as it's within Microsoft's rights (in a legal, if not moral, sense) to prod users to follow license terms that aren't legally enforceable. Just realize that the justification for doing so is far more political than technical.
I agree with you that licenses should be legally migrated to a new system, it's what's fair in my opinion. But the reason we are detecting this isn't for the cases that someone foregoes a call to MS to get a new activation key because they don't have the time to deal with them, it's for the cases (that are far more common in my experience) where a user is attempting to activate a license that either does not belong to them on their own computer, or to activate a single license on multiple computers, both of which are examples of theft, and the reason MS created this clause in their EULA and the Windows Activation technology to begin with.
Should things be better for the user vs the way they are now? Certainly, I gladly concede that and I agree with you that it should not be so difficult to activate Windows on a different PC when you've removed it from the old PC. But that doesn't mean that I'm personally willing to violate the EULA that I agreed to when I first installed Windows, regardless of the legallity of it.
If you look at fair usage rights with digital media it falls along the same lines. As a consumer you have the right to make a single backup copy of any media you purchase, yet there is a law (that is actually upheld in courts unfortunately) that you can not break the encryption on encrypted copy protected media, thus overriding your right to make a backup copy.
In my opinion that should not be the case, I'm personally on the side of the consumer and I do see your point, but given the volume of pirated keys and hacks being used out there because people aren't willing to pay for Windows far outweighs those willing to track down the tool you used simply in order to do something more legitimate with it like install it on a new PC after having removed it from another, it is my opinion that this detection should remain.
Naming AntiWPA as "Trojan.I.Stole.Windows" is both technically incorrect and legally questionable. antiwpa.dll is not a Trojan, but a very useful tool to validate windows and make it a legitimate copy so the user will be able to receive updates,and activate their copy of windows.In fact, we should be thankful to the guys who made this program possible.I quote this passage from someone who also post on this topic,he say's that:
Well sir, actually you're technically wrong and you're misinformed about your assumptions. antiwpa.dll is not a harmful entry on your windows.It's not a Trojan or a virus that other people says it is.but rather a modification tool to pass all WGA Checks and make your copy of windows legitimate.Because Microsoft only allows Genuine Windows to receive updates,patches and freebies for those "who Legally bought their software as based on EULA included on every software package.
The discussion and conflicts regarding its functionality and legality will only go on and on,but in short, i would like to point out clearly that this is not a worm,a trojan or a virus that other spoke of and make assumptions without having any technical proof,It's not a malware that will spread and multiply on your system registry as others think of,but a very useful tool for others who cant afford to buy original copies of windows and for IT enthusiast who who would like to explore its capabilities.but in legality,it clearly violates the EULA on Microsoft.It's not harmful or dangerous as it may be,but always remember,use it at your own risk.(antiwpa.dll is not a threat on your system,scan it with ESET Smart Security 4 and Windows Defender,you will see.but Microsoft Security Essentials detects it as a malicious code on your windows.but aside from that,it won't bring any conflicts or pop ups on your system)
You are misinformed (or misinforming). The dll in question tricks the OS into thinking it has booted into safemode without networking thus triggering the activation bypass fail safe. It makes nothing legitimate, but you likely already knew that.
Windows XP PRO SP3 x86 Retail DVD AntiWPA Activator. 1 Year-in Xp Sp3 Antiwpa Activator X86 32 Bit And X64 64 Bit AntiWPA3. Cmd-1..Windows XP Home Edition SP3 Retail x86 Activation software pc 4 years0 MB 00. 3 days ago. AntiWAT v3.5.1 [Based in AntiWPA 3.5.0] [x64 and x86.Anti Product Operating system(s): Windows XP / XP 64 bit / Vista / Vista 64 bit / 7 / 7. Windows 7 I went on. c:WINDOWSsystem32antiwpa.dll (PUP. feeling good today .Activate Win XP SP3 Professional 32 bit and 64bit versions using these Windows XP XP Home Edition SP3 x86 Retail DVD AntiWPA Activator REZMAN1984 .Keygen, Patch, Activation Pack Contents: Vista SP1 (Best) All x86 & x64 Activation v2.1.3. Vista SP1 All XP: Windows AntiWPA Fix for 32-64 bit. Windows Downloads Genuine Validation Number Windows Bit Keys XP Pro SP3 OEM Key.This way can fix "30 days left for activation". More TUTorials: - Windows XP .xp sp3 [antiwpa] activator x86 (32-bit) and x64 (64-bit) ///infe[FullDownload].rar breaking bad saison 4 french torrent CloneDVD 7.0.0.10 crack.Xp Sp3 Antiwpa Activator X86 32 Bit And X64 64 Bit 4 download locations. Download Direct Xp Sp3 Antiwpa Activator X86 32 Bit And X64 64 Bit: Sponsored .Xp Sp3 Antiwpa Activator X86 32 Bit And X64 64 Bit 3 download locations. Download Direct Xp Sp3 Antiwpa Activator X86 32 Bit And X64 64 Bit: Sponsored .Download XP SP3 [AntiWPA] Activator x86 (32 bit) and x64 (64 bit) torrent or any other torrent from Other Applications category..Download XP SP3 [AntiWPA] Activator x86 (32-bit) and x64 (64-bit) ///INFE torrent or any other torrent from the Applications Windows. Direct download via
7fc3f7cf58