Monday, July 16, 2012

Get rid of Windows Premium Defender as another detector of intentional false positives

Windows Premium Defender is a malicious program. It is designed to cheat credulous users by drawing their attention to intentional false positives.
Intentional false positives are infections reported by fake antivirus products. The reports are groundless in terms there is no threat recognition effort, method and event behind them.
Removal of Windows Premium Defender  malware is required to put an end to the intrusive and deceptive messages. Besides, the malware harms computer system so that its extermination is also a measure aimed at preventing damage to your PC.
Free scanner recommended by experts as a method to remove Windows Premium Defender  malware is available here. Please note uninstalling is not an effective technique for deleting the rogue.


Windows Premium Defender activation code (helps removal):
0W000-000B0-00T00-E0020
NOTE: "Activating" Windows Premium Defender is not enough. You need to remove related trojans \ rootkits using reliable malware removal solution.
It is important to fix Windows registry after malware removal using safe registry cleaner software.
 
Windows Premium Defender manual removal guide:
Delete infected files:
%AppData%\NPSWF32.dll
%AppData%\Protector-[random 3 characters].exe
%AppData%\Protector-[random 4 characters].exe
%AppData%\W34r34mt5h21ef.dat
%AppData%\result.db
%CommonStartMenu%\Programs\Windows Premium Defender.lnk
%Desktop%\Windows Premium Defender.lnk
Delete Windows Premium Defender registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnOnHTTPSToHTTPRedirect” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegedit” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegistryTools” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “ConsentPromptBehaviorAdmin” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “ConsentPromptBehaviorUser” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “EnableLUA” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Inspector”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “net” = “2012-4-27_2″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “UID” = “tovvhgxtud”
HKEY_CURRENT_USER\Software\ASProtect
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\[random].exe

No comments: