Thursday, May 10, 2012

Get rid of Windows Pro Solutions as the skins of an alleged utility conceals sneaky trojan

Windows Pro Solutions is an aggressive trojan in the skins of a system utility. The program hails from the labs of hackers and is carried by trojans into target computers. Browser hijackers and online redirects are in use to draw potential victims to the page that impersonates online computer inspection for threats. Since the scanner is a fake it has no problem to report a long list of infections in several minutes or even seconds. An astonished visitor becomes an actual victim of the malware upon loading it into computer system.
As you can see, hackers masterminding the counterfeit apply both suggestive routines (fake online scanner) and trojans and worms for surreptitious installation to succeed in introducing a copy of the program into computers.
Remove Windows Pro Solutions adware, even if you have been scared by its deceptive online scanner to manually install the application. Otherwise, in addition to the adware extermination, you need to eradicate trojan or worm or another type infection that has been used as its installer.
Click here to ensure Windows Pro Solutions removal and total disinfection of your PC according to the free scan results.

Windows Pro Solutions screenshots:


Screenshots from EmiSoft antimalware blog

Windows Pro Solutions activation code (helps removal):
0W000-000B0-00T00-E0020
NOTE: "Activating" Windows Pro Solutions is not enough. You need to remove related trojans \ rootkits using reliable malware removal solution.
It is important to fix Windows registry after Windows Pro Solutions malware removal using safe registry cleaner software.
Windows Pro Solutions manual removal guide:

Delete infected files:
%AppData%\NPSWF32.dll
%AppData%\Protector-[random 3 characters].exe
%AppData%\Protector-[random 4 characters].exe
%AppData%\W34r34mt5h21ef.dat
%AppData%\result.db
%CommonStartMenu%\Programs\Windows Pro Solutions.lnk
%Desktop%\Windows Pro Solutions.lnk
Delete Windows Pro Solutions registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnOnHTTPSToHTTPRedirect” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegedit” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegistryTools” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “ConsentPromptBehaviorAdmin” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “ConsentPromptBehaviorUser” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “EnableLUA” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Inspector”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “net” = “2012-4-27_2″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “UID” = “tovvhgxtud”
HKEY_CURRENT_USER\Software\ASProtect
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\[random].exe

No comments: