Friday, May 27, 2011

Windows Custom Settings Remover

Windows Custom Settings bounces users to download and install it, then it again applies scaring tactics to rob users of certain amount of money. The robbery is performed under the guise of security software activation.
Online scanners advising users to download the program are merely popups. The dreadful  picture of  computer system state they present is merely a sort of scary movie. However, while users is watching it the website attempts to introduce the fake security tool using system vulnerabilities. If your browser is adjusted to accept all cookies, the adware is likely to promptly slip into computer memory without user’s consent. However, the idea of hackers is to manifest a  respect to your choice  so that even in case the adware has been downloaded in no agreement with you, installation wizard will be offered to you  a dozen of times. You can never be certain though whether the adware is already within your computer system as the installation dialog   keeps appearing in both cases. 
Get rid of Windows Custom Settings, if it  is already installed or pretends seeking your agreement on its installation. Reliable Windows Custom Settings removal method based on free scanner is available here


Windows Custom Settings screenshot:




Windows Custom Settings remover:


Windows Custom Settings manual removal guide:
Delete infected files:
%UserProfile%\Application Data\Microsoft\.exe
Delete infected registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe "Debugger" = 'svchost.exe'
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = '0'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = '0'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore "DisableSR " = '1'

No comments: