Sunday, October 11, 2009

Windows Enterprise Defender Removal Instructions

Windows Enterprise Defender is the latest rogue security tool. Windows Enterprise Defender does not monitor host system for infections at all. Instead of that, it either creates them during its installation or, even simpler, scares users with imaginary names. Windows Enterprise Defender is often described as malware downloaded and installed by trojan. We must add to this description of Windows Enterprise Defender downloading technique the fact that there are lots of ads online prompting users to download and install trial version of Windows Enterprise Defender. Therefore, another way for Windows Enterprise Defender to get installed is online ads duping users to download its demo or to get the full version at once for which they need to pay. You need to get rid of Windows Enterprise Defender even if you believe you can afford one-time bribe of few dozens dollars just to make this annoying thing quiet. If you settle the fee, then you will be prompted in even more annoying way to pay for updates, life-time service or another counterfeit. Click here to stop the trickery through the safe and fast Windows Enterprise Defender removal.

Windows Enterprise Defender screenshot:


Windows Enterprise Defender removal tool:

Windows Enterprise Defender manual removal instructions:
Delete Windows Enterprise Defender files:

83.mof
mozcrt19.dll
sqlite3.dll
unins000.dat
WED.ico
WindowsEDefender.exe
WEDDSys\vd952342.bd
wed.cfg
Windows Enterprise Defender.lnk
cookies.sqlite
cb.sys
ddv.dll
eb.sys
energy.exe
pal.sys
PE.drv
ppal.exe
tempdoc.tmp
search.xml
Delete Windows Enterprise Defender registry entries:
HKEY_CLASSES_ROOT\CLSID\{3F2BBC05-40DF-11D2-9455-00104BC936FF}
HKEY_CLASSES_ROOT\WindowsEDefender.DocHostUIHandler
HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\SearchScopes "URL" => "http://search-gala.com/?&uid=7&q={searchTerms}"
HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\SearchScopes "URL"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform "[xSP_2:61a6083b6194a2314e3dd54cf9615e36_7]"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform "876902803"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "Windows Enterprise Defender"

No comments: