Friday, June 22, 2012

Get rid of Windows Advanced Toolkit counterfeit

Windows Advanced Toolkit is no exception to the market of antispyware. Alas, it represents prevailing trend.
Counterfeiting is nothing that complicated as making real things. No surprise the quantity of phony antivirus products exceeds in times that of the true.
Remove Windows Advanced Toolkit as but another case of a product made to look like an antivirus and to behave just like a virus.
Free scanner available here is a right choice for you to get your PC protected by genuine security solution that is going to execute Windows Advanced Toolkit removal upon completing examination of your computer memory so that both the bogus system utility and real threats could be hunted down. 



Windows Advanced Toolkit activation code (helps removal):
0W000-000B0-00T00-E0020
NOTE: "Activating" Windows Advanced Toolkit is not enough. You need to remove related trojans \ rootkits using reliable malware removal solution.
It is important to fix Windows registry after Windows Advanced Toolkit malware removal using safe registry cleaner software.

Windows Advanced Toolkit manual removal guide:



Delete infected files:
%AppData%\NPSWF32.dll
%AppData%\Protector-[random 3 characters].exe
%AppData%\Protector-[random 4 characters].exe
%AppData%\W34r34mt5h21ef.dat
%AppData%\result.db
%CommonStartMenu%\Programs\Windows Advanced Toolkit.lnk
%Desktop%\Windows Advanced Toolkit.lnk
Delete Windows Advanced Toolkitregistry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnOnHTTPSToHTTPRedirect” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegedit” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegistryTools” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “ConsentPromptBehaviorAdmin” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “ConsentPromptBehaviorUser” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “EnableLUA” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Inspector”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “net” = “2012-4-27_2″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “UID” = “tovvhgxtud”
HKEY_CURRENT_USER\Software\ASProtect
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\[random].exe

No comments: