Tuesday, August 14, 2012

Get rid of Windows Safety Series that succeeds in producing errors in running apps and is not meant to deal with real security risks

Windows Safety Series fakes detection of hundreds of viruses, trojans, rootkits. It identifies not a single threat for real. Instead of a tool for infections recognizing, quarantining and deleting, there is another component in the program that fakes, a tool for detecting running processes of applications and for killing those processes. By doing so the malware succeeds in causing software errors and failures to continue running. That is followed by seemingly timely comment saying the application has failed due to notepad error or another imaginary issue.
Remove Windows Safety Series rogue antivirus, for, as you can see, even if you have nerves made of steel to tolerate its silly popups, the malware will not let you run your software products killing their processes every now and then.
The free scanner link supplies Windows Safety Series removal tool and means to detect and exterminate other risks relevant to your PC.


Windows Safety Series activation code (helps removal):
0W000-000B0-00T00-E0020
NOTE: "Activating" Windows Safety Series is not enough. You need to remove related trojans \ rootkits using reliable malware removal solution.
It is important to fix Windows registry after malware removal using safe registry cleaner software.
 
Windows Safety Series manual removal guide:
Delete infected files:
%AppData%\NPSWF32.dll
%AppData%\Protector-[random 3 characters].exe
%AppData%\Protector-[random 4 characters].exe
%AppData%\W34r34mt5h21ef.dat
%AppData%\result.db
%CommonStartMenu%\Programs\Windows Safety Series.lnk
%Desktop%\Windows Safety Series.lnk
Delete Windows Safety Series registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnOnHTTPSToHTTPRedirect” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegedit” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegistryTools” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “ConsentPromptBehaviorAdmin” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “ConsentPromptBehaviorUser” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “EnableLUA” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Inspector”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “net” = “2012-4-27_2″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “UID” = “tovvhgxtud”
HKEY_CURRENT_USER\Software\ASProtect
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\[random].exe

No comments: