Monday, August 13, 2012

Get rid of Windows Secure Workstation – ensure compete extermination of the sneaky trojan

Windows Secure Workstation mislead people with fake threat notifications. It is a fake antispyware concocted by hackers to get on user’s nerves. With this application running on your PC, you operating system is extremely vulnerable to actual viruses.
The fake antispyware consists of two basic sets of components. The first one is meant to generate various nag screens, that is, to imitate antivirus by introducing user into relevant program interface.
In the meantime, the second one is in charge of integrating the fake antivirus into computer system and blocking processes of other programs. In particular, the rogue is known to kill processes of harmless applications stating the problem is caused by threats it has reported.
It is important to remove Windows Secure Workstation in such a way as to embrace both sets of its components. Proceed to the procedure ensuring exhausting removal of Windows Secure Workstation – click here to start free scan.


Windows Secure Workstation activation code (helps removal):
0W000-000B0-00T00-E0020
NOTE: "Activating" Windows Secure Workstation is not enough. You need to remove related trojans \ rootkits using reliable malware removal solution.
It is important to fix Windows registry after malware removal using safe registry cleaner software.
 
Windows Secure Workstation manual removal guide:
Delete infected files:
%AppData%\NPSWF32.dll
%AppData%\Protector-[random 3 characters].exe
%AppData%\Protector-[random 4 characters].exe
%AppData%\W34r34mt5h21ef.dat
%AppData%\result.db
%CommonStartMenu%\Programs\Windows Secure Workstation.lnk
%Desktop%\Windows Secure Workstation.lnk
Delete Windows Secure Workstation registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnOnHTTPSToHTTPRedirect” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegedit” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegistryTools” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “ConsentPromptBehaviorAdmin” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “ConsentPromptBehaviorUser” = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “EnableLUA” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Inspector”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “net” = “2012-4-27_2″
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “UID” = “tovvhgxtud”
HKEY_CURRENT_USER\Software\ASProtect
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\[random].exe

No comments: