Friday, August 31, 2012

Get rid of Win 8 Security System and its advanced kernel mode protection

Win 8 Security System enjoys a protection provided by advanced kernel mode trojan. While pretending to secure computer system against viruses, worms, trojans etc. the rogue is guarded by the program of a sort it claims to stand against.
Remove Win 8 Security System as yet another malware that fakes antimalware activities. It delivers a nice-looking GUI and promptly informs user of affected PC on a number of threats to deal with. Actually, the faking of threat detection begins prior to its invasion onto computers, as most of the users infect their PCs manually upon their web-surfing redirecting to pages dressed up as online threat recognizing centers. Those misleading and fake scanners instantly assess any PC as badly infected and force visitors into installing a solution that proves to be dangerous malware and counterfeit supported by yet more harmful rootkit.
Removal of Win 8 Security System is only available upon extermination of rootkit that executes a payload of hiding the fraudware and other threats. Comprehensive disinfection of your computer system covering the fake, its allies and any other infection is available here (free scanner).




Win 8 Security System activation code (helps removal):
8F42D6E3-FD18
NOTE: "Activating" Win 8 Security System is not enough. You need to remove related trojans \ rootkits using reliable malware removal solution.
It is important to fix Windows registry after malware removal using safe registry cleaner software.
Win 8 Security System manual removal guide:

Delete infected files:
%LocalAppData%\.exe
%StartMenu%\Programs\Win 8 Security System\
%StartMenu%\Programs\Win 8 Security System\Buy Win 8 Security System.lnk
%StartMenu%\Programs\Win 8 Security System\Launch Win 8 Security System.lnk
%System%\drivers\.sys
%UserProfile%\Desktop\Buy Win 8 Security System.lnk 
Delete Win 8 Security System registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\Range1 "*" = 1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\Range1 ":Range" = "127.0.0.1"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ".exe"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet\Enum\Root\LEGACY_

No comments: