Sunday, May 6, 2012

Remove Windows Advanced User Patch fake antivirus

Windows Advanced User Patch is typically installed through security backdoors and malicious downloads.
This software informs user of the challenge posed by virus and on which the antivirus has responded by setting itself to the above configuration.It reassures user that user’s action is not required in that connection, but very soon another alert is generated which claims to perform some action which involves user’s money as user is asked to buy upgrades necessary to deal with virus removal or to extend activation, or just to activate, the security program which is faked by trojan.
The trojan has many ways to infiltrate into computer system. Experts have investigated fake flash-player update trickery. In course of that scam, the trojan is downloaded and installed instead of requested update.
Windows Advanced User Patch removal is not limited to deletion of the "software"only. To properly remove Windows Advanced User Patch misleading popups, cover the entire trojan by malware detection and extermination facility available here (free scanner).



Windows Advanced User Patch activation code (helps removal):
0W000-000B0-00T00-E0020
NOTE: "Activating" Windows Advanced User Patch is not enough. You need to remove related trojans \ rootkits using reliable malware removal solution.
It is important to fix Windows registry after Windows Advanced User Patch malware removal using safe registry cleaner software.
 
Windows Advanced User Patch manual removal guide:

Delete infected files:
%AppData%\NPSWF32.dll
%AppData%\Protector-[random 3 characters].exe
%AppData%\Protector-[random 4 characters].exe
%AppData%\W34r34mt5h21ef.dat
%AppData%\result.db
%CommonStartMenu%\Programs\Windows Safety Checkpoint.lnk
%Desktop%\Windows Safety Checkpoint.lnk
Delete Windows Internet Booster registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnOnHTTPSToHTTPRedirect” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegedit” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegistryTools” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “ConsentPromptBehaviorAdmin” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “ConsentPromptBehaviorUser” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “EnableLUA” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Inspector”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “net” = “2012-4-27_2″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “UID” = “tovvhgxtud”
HKEY_CURRENT_USER\Software\ASProtect
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\[random].exe

No comments: