Sunday, April 15, 2012

Remove Windows Protection Unit that produces scary security reports without even trying to detect a single threat

Windows Protection Unit installs its components by means of rootkit to aggravate their extermination and enable their launching in the most inappropriate moments.
For every computer system hosting the program, its scanner readily detects a host of threats.
However, detection is not an appropriate definition. It has nothing to do with the infections specified by the adware. All the so called threats are merely a set of scary names extracted from reports of genuine security solution. The counterfeit does not detect any viruses simply referring to random denominations for tricky purposes.
Get rid of Windows Protection Unit and do not try manually deleting the items mentioned in its fakes scanners, if the rogue provides a path. Such a reckless action will most likely delete some critical system or program files so that you will need to fix system or software errors. Removal of Windows Protection Unit is available with free scanner that you can instantly load here. 



Manual removal directions:
Delete infected files:
%appdata%\npswf32.dll
%appdata%\Inspector-[rnd].exe
%desktopdir%\Windows Protection Unit.lnk
%commonprograms%\Windows Protection Unit.lnk
Delete Windows Protection Unit registry entries:
 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnOnHTTPSToHTTPRedirect” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegedit” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegistryTools” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Inspector”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “ID” = 4
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “net” = 2012-2-20_1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\{random}.exe

No comments: