<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3384466804101984323</id><updated>2026-03-05T04:08:44.380+08:00</updated><category term="Removal Guide"/><category term="Removal Tool"/><category term="Popular"/><category term="RFA"/><category term="security"/><category term="Remove Virus"/><category term="System Tool"/><category term="Browser"/><category term="Pen Drive Virus"/><category term="Repair File"/><category term="Safe Mode"/><category term="Virus files"/><category term="AVG"/><category term="Autorun"/><category term="Computer"/><category term="Kill Process"/><category term="Restore Setting"/><category term="Task Manager"/><category term="antivirus"/><category term="Command Prompt"/><category term="Constant"/><category term="Delete File"/><category term="Download"/><category term="Parasite"/><category term="System File"/><category term="Update"/><category term="Windows Defender"/><category term="facebook"/><title type='text'>Free of Virus &amp;amp; Computer Tips</title><subtitle type='html'> </subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/-/Removal+Guide'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/search/label/Removal%20Guide'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/-/Removal+Guide/-/Removal+Guide?start-index=26&amp;max-results=25'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>835</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-4795492276763331785</id><published>2014-04-29T20:00:00.000+08:00</published><updated>2014-04-29T19:20:07.348+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Internet Guard</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;
&lt;img alt=&quot;Remove Windows Internet Guard&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Internet Guard&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; is a fake antivirus that disguises itself to cheat the user that it can detect and remove trojans, viruses, malwares and so on. In fact, Windows Internet Guard WILL SURELY state that there are many malwares, trojans and viruses are detected in the system. All of them are lies! Windows Internet Guard will display this types of fake alert to urge the user to purchase the full version of Windows Internet Guard which cannot detect and remove any kind malware, trojan or virus.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Internet Guard &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; can be removed by stopping all of the processes in random file name, delete all the related files and remove the registry keys stated below.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Windows Internet Guard&lt;/b&gt; provide fake features such as&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Home, Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect the computer from any kind of malware&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Internet Guard&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows Internet Guard Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = &quot;123123.sys&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;GuardSoftware&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/4795492276763331785/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/04/remove-windows-internet-guard.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/4795492276763331785'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/4795492276763331785'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/04/remove-windows-internet-guard.html' title='Remove Windows Internet Guard'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-7921767973794911349</id><published>2014-04-02T09:53:00.002+08:00</published><updated>2014-04-02T09:53:41.792+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Internet Watchdog</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;&lt;img alt=&quot;Remove Windows Internet Watchdog&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Internet Watchdog &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;is a &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;fake antivirus&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; program that look like a legitimate antivirus such as Kaspersky Antivirus which can protect the computer from the attack of viruses, malwares or trojans. However, Windows Internet Watchdog cannot detect and remove any kind of virus, malware or trojan on the computer. When Windows Internet Watchdog is installed in the computer, it will start automatically when Windows boot and then will do a fake scan on the computer and will surely scare the user with pop ups which show that the computer has been infected by a lot of malwares, viruses and trojans. Do not believe any pop ups shown by Windows Internet Watchdog. Windows Internet Watchdog will recommend the user to purchase the full version of Windows Internet Watchdog in order to remove all the detected threats. Do not buy Windows Internet Watchdog as it can do nothing.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Windows Internet Watchdog&lt;/b&gt; provide fake features such as Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect computer from any kind of malwares.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;Windows Internet Watchdog&lt;/b&gt; &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;can be removed by stop processes and kill all files with random name in the hard drives. The user also must remove the autorun setting added by Windows Internet Watchdog. These can be done by using &lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/posts.g?blogID=3384466804101984323&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Internet Watchdog &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows Internet Watchdog Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;MS-SEC&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;ZSFT&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\Software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = 22.sys&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
%UserProfile%\Desktop\Windows Internet Watchdog.lnk&lt;br /&gt;
%AllUsersProfile%\Start Menu\Programs\Windows Internet Watchdog.lnk&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%UserProfile% refers to the current user&#39;s profile folder. By default, this is C:\Documents and Settings\[Current User] for Windows 2000/XP, C:\Users\[Current User] for Windows Vista/7/8, and c:\winnt\profiles\[Current User] for Windows NT.&lt;br /&gt;
&lt;br /&gt;
%AllUsersProfile% refers to the All Users Profile folder. By default, this is C:\Documents and Settings\All Users for Windows 2000/XP and C:\ProgramData\ for Windows Vista, Windows 7, and Windows 8.&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/7921767973794911349/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/04/remove-windows-internet-watchdog.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/7921767973794911349'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/7921767973794911349'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/04/remove-windows-internet-watchdog.html' title='Remove Windows Internet Watchdog'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-5257226848737115693</id><published>2014-03-29T22:44:00.002+08:00</published><updated>2014-03-29T22:44:19.655+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Web Watchdog</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;&lt;img alt=&quot;Remove Windows Web Watchdog&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Web Watchdog &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;is a &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;fake antivirus&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; program that look like a legitimate antivirus such as Kaspersky Antivirus which can protect the computer from the attack of viruses, malwares or trojans. However, Windows Web Watchdog cannot detect and remove any kind of virus, malware or trojan on the computer. When Windows Web Watchdog is installed in the computer, it will start automatically when Windows boot and then will do a fake scan on the computer and will surely scare the user with pop ups which show that the computer has been infected by a lot of malwares, viruses and trojans. Do not believe any pop ups shown by Windows Web Watchdog. Windows Web Watchdog will recommend the user to purchase the full version of Windows Web Watchdog in order to remove all the detected threats. Do not buy Windows Web Watchdog as it can do nothing.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Windows Web Watchdog&lt;/b&gt; provide fake features such as Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect computer from any kind of malwares.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;Windows Web Watchdog&lt;/b&gt; &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;can be removed by stop processes and kill all files with random name in the hard drives. The user also must remove the autorun setting added by Windows Web Watchdog. These can be done by using &lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/posts.g?blogID=3384466804101984323&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Web Watchdog &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows Web Watchdog Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;MS-SEC&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;ZSFT&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\Software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = 22.sys&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
%UserProfile%\Desktop\Windows Web Watchdog.lnk&lt;br /&gt;
%AllUsersProfile%\Start Menu\Programs\Windows Web Watchdog.lnk&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%UserProfile% refers to the current user&#39;s profile folder. By default, this is C:\Documents and Settings\[Current User] for Windows 2000/XP, C:\Users\[Current User] for Windows Vista/7/8, and c:\winnt\profiles\[Current User] for Windows NT.&lt;br /&gt;
&lt;br /&gt;
%AllUsersProfile% refers to the All Users Profile folder. By default, this is C:\Documents and Settings\All Users for Windows 2000/XP and C:\ProgramData\ for Windows Vista, Windows 7, and Windows 8.&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/5257226848737115693/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-web-watchdog.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/5257226848737115693'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/5257226848737115693'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-web-watchdog.html' title='Remove Windows Web Watchdog'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-6815206146630353151</id><published>2014-03-25T10:09:00.001+08:00</published><updated>2014-03-25T10:09:06.615+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows AntiBreach Patrol</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;
&lt;img alt=&quot;Remove Windows AntiBreach Patrol&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows AntiBreach Patrol &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; is a &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;fake antivirus&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; program that cannot detect and remove any kind of virus, malware or trojan. However, Windows AntiBreach Patrol . pretends to be a legitimate antivirus which can protect computers from the attack malwares. Once Windows AntiBreach Patrol  is installed on the computer, it will start automatically when Windows boot. Then Windows AntiBreach Patrol  will do a fake scan on the computer and will definitely scare the user with pop ups which shows that the computer has been infected by a lot of malwares. Windows AntiBreach Patrol  will repeatedly shows the pop ups to urge the user to purchase the full version of Windows AntiBreach Patrol  so that to remove all the threats. However, Windows AntiBreach Patrol  cannot detect and remove any kind of virus, malware and trojan.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows AntiBreach Patrol &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; can be removed by stopping the processes and removing the files ([random].exe) by using &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2010/11/emsisoft-hijackfree.html&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;. Then the user should remove the registry entries added or modified by Windows AntiBreach Patrol  shown in the removal guide below. Windows AntiBreach Patrol  DLL Files should be unregistered too (see removal guide). All files related to Windows AntiBreach Patrol  must be deleted.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Windows AntiBreach Patrol &lt;/b&gt; provide fake feature such as&amp;nbsp;Home, Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect the computer from any kind of malware.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows AntiBreach Patrol &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows AntiBreach Patrol  Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;MS-SEC&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\Software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = 22.sys &lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
%UserProfile%\Desktop\Windows AntiBreach Patrol .lnk&lt;br /&gt;
%AllUsersProfile%\Start Menu\Programs\Windows AntiBreach Patrol .lnk&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%UserProfile% refers to the current user&#39;s profile folder. By default, this is C:\Documents and Settings\[Current User] for Windows 2000/XP, C:\Users\[Current User] for Windows Vista/7/8, and c:\winnt\profiles\[Current User] for Windows NT.&lt;br /&gt;
&lt;br /&gt;
%AllUsersProfile% refers to the All Users Profile folder. By default, this is C:\Documents and Settings\All Users for Windows 2000/XP and C:\ProgramData\ for Windows Vista, Windows 7, and Windows 8.&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/6815206146630353151/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-antibreach-patrol.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/6815206146630353151'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/6815206146630353151'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-antibreach-patrol.html' title='Remove Windows AntiBreach Patrol'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-4799394505476552126</id><published>2014-03-24T21:30:00.000+08:00</published><updated>2014-03-24T19:41:12.012+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Antivirus Patrol</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;
&lt;img alt=&quot;Windows Antivirus Patrol Removal Guide&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Antivirus Patrol&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; is a &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;fake antivirus&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; program that cannot detect and remove any kind of virus, malware or trojan. However, Windows Antivirus Patrol. pretends to be a legitimate antivirus which can protect computers from the attack malwares. Once Windows Antivirus Patrol is installed on the computer, it will start automatically when Windows boot. Then Windows Antivirus Patrol will do a fake scan on the computer and will definitely scare the user with pop ups which shows that the computer has been infected by a lot of malwares. Windows Antivirus Patrol will repeatedly shows the pop ups to urge the user to purchase the full version of Windows Antivirus Patrol so that to remove all the threats. However, Windows Antivirus Patrol cannot detect and remove any kind of virus, malware and trojan.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Antivirus Patrol&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; can be removed by stopping the processes and removing the files ([random].exe) by using &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2010/11/emsisoft-hijackfree.html&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;. Then the user should remove the registry entries added or modified by Windows Antivirus Patrol shown in the removal guide below. Windows Antivirus Patrol DLL Files should be unregistered too (see removal guide). All files related to Windows Antivirus Patrol must be deleted.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Windows Antivirus Patrol&lt;/b&gt; provide fake feature such as&amp;nbsp;Home, Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect the computer from any kind of malware.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Antivirus Patrol&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows Antivirus Patrol Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;MS-SEC&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\Software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = 22.sys &lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
%UserProfile%\Desktop\Windows Antivirus Patrol.lnk&lt;br /&gt;
%AllUsersProfile%\Start Menu\Programs\Windows Antivirus Patrol.lnk&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%UserProfile% refers to the current user&#39;s profile folder. By default, this is C:\Documents and Settings\[Current User] for Windows 2000/XP, C:\Users\[Current User] for Windows Vista/7/8, and c:\winnt\profiles\[Current User] for Windows NT.&lt;br /&gt;
&lt;br /&gt;
%AllUsersProfile% refers to the All Users Profile folder. By default, this is C:\Documents and Settings\All Users for Windows 2000/XP and C:\ProgramData\ for Windows Vista, Windows 7, and Windows 8.&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/4799394505476552126/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-antivirus-patrol.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/4799394505476552126'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/4799394505476552126'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-antivirus-patrol.html' title='Remove Windows Antivirus Patrol'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-1099469801386548165</id><published>2014-03-21T09:23:00.002+08:00</published><updated>2014-03-21T09:23:55.969+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Futurro Antivirus Software</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;&lt;img alt=&quot;Remove Futurro Antivirus Software&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Futurro Antivirus Software&lt;/b&gt; is a &lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;fake antivirus&lt;/a&gt; program which come with a rootkit to prevent many program from running on the computer. Futurro Antivirus Software cannot detect and remove any kind of virus, malware and trojan. What Futurro Antivirus Software can do is displaying fake report to tell the user that the computer has been infected by many malwares, trojans and viruses. Futurro Antivirus Software will urge the user to purchase the full version of Futurro Antivirus Software to remove all the detected malwares, viruses and trojan. Bare in mind that Futurro Antivirus Software CANNOT detect and remove any malware, virus and trojan&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; &lt;b&gt;Futurro Antivirus Software&lt;/b&gt; provide fake features such as System Scan, Protection, Privacy, Update, Settings, etc. All of them cannot protect the computer from any kind of malware.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Futurro Antivirus Software&lt;/b&gt; can be removed by stopping all the processes with random name and name . Then the user has to remove the files of the processes. Finally, the registry settings have to be restored by removing the registry keys stated below.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Futurro Antivirus Software&lt;/b&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Futurro Antivirus Software Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_CURRENT_USER\Software\AVInfo&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;AVSoft&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
c:\Documents and Settings\All Users\Application Data\[random]&lt;br /&gt;
c:\Documents and Settings\All Users\Application Data\[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/1099469801386548165/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-futurro-antivirus-software.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/1099469801386548165'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/1099469801386548165'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-futurro-antivirus-software.html' title='Remove Futurro Antivirus Software'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-75312343605786532</id><published>2014-03-19T06:49:00.003+08:00</published><updated>2014-03-19T06:49:21.622+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Pro Defence Kit</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;
&lt;img alt=&quot;Remove Windows Pro Defence Kit&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Pro Defence Kit&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; is a &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;fake antivirus&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; program that cannot detect and remove any kind of virus, malware or trojan. However, Windows Pro Defence Kit. pretends to be a legitimate antivirus which can protect computers from the attack malwares. Once Windows Pro Defence Kit is installed on the computer, it will start automatically when Windows boot. Then Windows Pro Defence Kit will do a fake scan on the computer and will definitely scare the user with pop ups which shows that the computer has been infected by a lot of malwares. Windows Pro Defence Kit will repeatedly shows the pop ups to urge the user to purchase the full version of Windows Pro Defence Kit so that to remove all the threats. However, Windows Pro Defence Kit cannot detect and remove any kind of virus, malware and trojan.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Pro Defence Kit&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; can be removed by stopping the processes and removing the files ([random].exe) by using &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2010/11/emsisoft-hijackfree.html&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;. Then the user should remove the registry entries added or modified by Windows Pro Defence Kit shown in the removal guide below. Windows Pro Defence Kit DLL Files should be unregistered too (see removal guide). All files related to Windows Pro Defence Kit must be deleted.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Windows Pro Defence Kit&lt;/b&gt; provide fake feature such as&amp;nbsp;Home, Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect the computer from any kind of malware.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Pro Defence Kit&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows Pro Defence Kit Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;MS-SEC&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\Software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = 22.sys &lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
%UserProfile%\Desktop\Windows Pro Defence Kit.lnk&lt;br /&gt;
%AllUsersProfile%\Start Menu\Programs\Windows Pro Defence Kit.lnk&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%UserProfile% refers to the current user&#39;s profile folder. By default, this is C:\Documents and Settings\[Current User] for Windows 2000/XP, C:\Users\[Current User] for Windows Vista/7/8, and c:\winnt\profiles\[Current User] for Windows NT.&lt;br /&gt;
&lt;br /&gt;
%AllUsersProfile% refers to the All Users Profile folder. By default, this is C:\Documents and Settings\All Users for Windows 2000/XP and C:\ProgramData\ for Windows Vista, Windows 7, and Windows 8.&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/75312343605786532/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-pro-defence-kit.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/75312343605786532'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/75312343605786532'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-pro-defence-kit.html' title='Remove Windows Pro Defence Kit'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-2982990005474070811</id><published>2014-03-15T08:38:00.002+08:00</published><updated>2014-03-15T08:38:58.007+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Defence Master</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;&lt;img alt=&quot;Remove Windows Defence Master&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Defence Master&lt;/b&gt; is a fake antivirus which will infect the computer after a Trojan opens a backdoor on the computer. Normally this program is installed to the computer without the permission of the users when they visit some websites. Windows Defence Master start automatically when the computer boot. It will scan the infected computer and shows that the computer has been infected by many malwares. In fact, the computer is infected by itself! Then, Windows Defence Master will persuade the user to purchase the license in order to activate it. This fake antivirus should be removed immediately.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt; &lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Defence Master&lt;/b&gt;&amp;nbsp;provide fake features such as Home, Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect computer from any kind of malware.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt; &lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Defence Master&lt;/b&gt; can be removed by stopping its processes [random].exe and the user should remember to kill the file. The registry settings should be restored by following the removal guide below.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Defence Master&lt;/b&gt; must be removed from your computer immediately!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Removal Guide&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = &quot;123123.sys&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;GuardSoftware&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt; &lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/2982990005474070811/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-defence-master.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/2982990005474070811'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/2982990005474070811'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-defence-master.html' title='Remove Windows Defence Master'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-684528061061027769</id><published>2014-03-11T23:05:00.000+08:00</published><updated>2014-03-11T23:05:04.241+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Security Master</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;
&lt;img alt=&quot;Remove Windows Security Master&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Security Master&lt;/b&gt; is a fake antivirus program created to urge the user to buy the full version of Windows Security Master in order to earn some profit. Don&#39;t ever purchase it as it is a cheat! Windows Security Master install itself into the computer without confirmation of the users and it start automatically when the windows boot. Windows Security Master produce fake virus warning alert consistently to force the user to buy the full version so that to remove the malwares. We must uninstall Windows Security Master as it bring nothing but provide a lot of rubbish into the computer.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Security Master&lt;/b&gt; provide fake features such as Perform Scan, Internet Security, Personal Security, Proactive Defense, Firewall, Configuration, Complete PC Protection, &amp;nbsp;Automating Updating, Protection against bank account fraud, Self-protection from malware, Update Now, Scan Now etc. All of them cannot protect the computer from any kind of malware.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Security Master &lt;/b&gt;can be removed by using &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2010/11/emsisoft-hijackfree.html&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; to stop the processes and kill the files from the hard drive. Then, the user has to restore the registry entries added and modified by Windows Security Master. Finally, all the file related to Windows Security Master must be deleted from the hard drive. All of them has been shown in the removal guide below.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Security Master&lt;/b&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;Windows Security Master Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = &quot;123123.sys&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;GuardSoftware&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/684528061061027769/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-security-master.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/684528061061027769'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/684528061061027769'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-security-master.html' title='Remove Windows Security Master'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-3539295882888421850</id><published>2014-03-09T08:30:00.002+08:00</published><updated>2014-03-09T08:30:54.816+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Defence Unit</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;
&lt;img alt=&quot;Remove Windows Defence Unit&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Defence Unit&lt;/b&gt; is a fake antivirus which will infect the computer after a Trojan opens a backdoor on the computer. Normally this program is installed to the computer without the permission of the users when they visit some websites. Windows Defence Unit start automatically when the computer boot. It will scan the infected computer and shows that the computer has been infected by many malwares. In fact, the computer is infected by itself! Then, Windows Defence Unit will persuade the user to purchase the license in order to activate it. This fake antivirus should be removed immediately.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt; &lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Defence Unit&lt;/b&gt;&amp;nbsp;provide fake features such as Home, Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect computer from any kind of malware.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt; &lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Defence Unit&lt;/b&gt; can be removed by stopping its processes [random].exe and the user should remember to kill the file. The registry settings should be restored by following the removal guide below.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Defence Unit&lt;/b&gt; must be removed from your computer immediately!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Removal Guide&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = &quot;123123.sys&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;GuardSoftware&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/3539295882888421850/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-defence-unit.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/3539295882888421850'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/3539295882888421850'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-defence-unit.html' title='Remove Windows Defence Unit'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-560460017363897750</id><published>2014-03-06T10:03:00.000+08:00</published><updated>2014-03-06T10:03:00.058+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Protection Booster</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;
&lt;img alt=&quot;Remove Windows Protection Booster&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Protection Booster&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; is a fake antivirus that disguises itself to cheat the user that it can detect and remove trojans, viruses, malwares and so on. In fact, Windows Protection Booster WILL SURELY state that there are many malwares, trojans and viruses are detected in the system. All of them are lies! Windows Protection Booster will display this types of fake alert to urge the user to purchase the full version of Windows Protection Booster which cannot detect and remove any kind malware, trojan or virus.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Protection Booster &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; can be removed by stopping all of the processes in random file name, delete all the related files and remove the registry keys stated below.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Windows Protection Booster&lt;/b&gt; provide fake features such as&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Home, Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect the computer from any kind of malware&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Protection Booster&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows Protection Booster Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = &quot;123123.sys&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;GuardSoftware&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/560460017363897750/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-protection-booster.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/560460017363897750'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/560460017363897750'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-protection-booster.html' title='Remove Windows Protection Booster'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-3288165280154158874</id><published>2014-03-02T08:04:00.000+08:00</published><updated>2014-03-02T08:04:05.295+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows AntiVirus Booster</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;&lt;img alt=&quot;Windows AntiVirus Booster Removal Guide&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Windows AntiVirus Booster&lt;/b&gt; is a &lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;fake antivirus&lt;/a&gt; program which come with a rootkit to prevent many program from running on the computer. Windows AntiVirus Booster cannot detect and remove any kind of virus, malware and trojan. What Windows AntiVirus Booster can do is displaying fake report to tell the user that the computer has been infected by many malwares, trojans and viruses. Windows AntiVirus Booster will urge the user to purchase the full version of Windows AntiVirus Booster to remove all the detected malwares, viruses and trojan. Bare in mind that Windows AntiVirus Booster CANNOT detect and remove any malware, virus and trojan&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;b&gt;Windows AntiVirus Booster&lt;/b&gt; provide fake features such as Home, Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect the computer from any kind of malware.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows AntiVirus Booster&lt;/b&gt; can be removed by stopping all the processes with random name and name . Then the user has to remove the files of the processes. Finally, the registry settings have to be restored by removing the registry keys stated below.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows AntiVirus Booster&lt;/b&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows AntiVirus Booster Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = &quot;123123.sys&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;GuardSoftware&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0 &lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/3288165280154158874/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-antivirus-booster.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/3288165280154158874'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/3288165280154158874'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-antivirus-booster.html' title='Remove Windows AntiVirus Booster'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-7619640921941761377</id><published>2014-03-01T08:38:00.002+08:00</published><updated>2014-03-01T08:38:34.242+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Antivirus Helper</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;
&lt;img alt=&quot;Remove Windows Antivirus Helper&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Antivirus Helper &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;is a &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;fake antivirus&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; program that look like a legitimate antivirus such as Kaspersky Antivirus which can protect the computer from the attack of viruses, malwares or trojans. However, Windows Antivirus Helper cannot detect and remove any kind of virus, malware or trojan on the computer. When Windows Antivirus Helper is installed in the computer, it will start automatically when Windows boot and then will do a fake scan on the computer and will surely scare the user with pop ups which show that the computer has been infected by a lot of malwares, viruses and trojans. Do not believe any pop ups shown by Windows Antivirus Helper. Windows Antivirus Helper will recommend the user to purchase the full version of Windows Antivirus Helper in order to remove all the detected threats. Do not buy Windows Antivirus Helper as it can do nothing.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Windows Antivirus Helper&lt;/b&gt; provide fake features such as Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect computer from any kind of malwares.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;Windows Antivirus Helper&lt;/b&gt; &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;can be removed by stop processes and kill all files with random name in the hard drives. The user also must remove the autorun setting added by Windows Antivirus Helper. These can be done by using &lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/posts.g?blogID=3384466804101984323&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Antivirus Helper &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows Antivirus Helper Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;MS-SEC&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;ZSFT&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\Software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = 22.sys&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
%UserProfile%\Desktop\Windows Antivirus Helper.lnk&lt;br /&gt;
%AllUsersProfile%\Start Menu\Programs\Windows Antivirus Helper.lnk&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%UserProfile% refers to the current user&#39;s profile folder. By default, this is C:\Documents and Settings\[Current User] for Windows 2000/XP, C:\Users\[Current User] for Windows Vista/7/8, and c:\winnt\profiles\[Current User] for Windows NT.&lt;br /&gt;
&lt;br /&gt;
%AllUsersProfile% refers to the All Users Profile folder. By default, this is C:\Documents and Settings\All Users for Windows 2000/XP and C:\ProgramData\ for Windows Vista, Windows 7, and Windows 8.&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/7619640921941761377/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-antivirus-helper.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/7619640921941761377'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/7619640921941761377'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/03/remove-windows-antivirus-helper.html' title='Remove Windows Antivirus Helper'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-8951267091792080338</id><published>2014-02-23T20:37:00.000+08:00</published><updated>2014-02-23T20:37:49.995+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Antivirus Suite</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;&lt;img alt=&quot;Windows Antivirus Suite Removal Guide&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Antivirus Suite&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; is a &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;fake antivirus&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; program that cannot detect and remove any kind of virus, malware or trojan. However, Windows Antivirus Suite. pretends to be a legitimate antivirus which can protect computers from the attack malwares. Once Windows Antivirus Suite is installed on the computer, it will start automatically when Windows boot. Then Windows Antivirus Suite will do a fake scan on the computer and will definitely scare the user with pop ups which shows that the computer has been infected by a lot of malwares. Windows Antivirus Suite will repeatedly shows the pop ups to urge the user to purchase the full version of Windows Antivirus Suite so that to remove all the threats. However, Windows Antivirus Suite cannot detect and remove any kind of virus, malware and trojan.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Antivirus Suite&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; can be removed by stopping the processes and removing the files ([random].exe) by using &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2010/11/emsisoft-hijackfree.html&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;. Then the user should remove the registry entries added or modified by Windows Antivirus Suite shown in the removal guide below. Windows Antivirus Suite DLL Files should be unregistered too (see removal guide). All files related to Windows Antivirus Suite must be deleted.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: large;&quot;&gt;Windows Antivirus Suite provide fake feature such as&amp;nbsp;Home, Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect the computer from any kind of malware.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Antivirus Suite&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows Antivirus Suite Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;MS-SEC&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\Software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = 22.sys &lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
%UserProfile%\Desktop\Windows Antivirus Suite.lnk&lt;br /&gt;
%AllUsersProfile%\Start Menu\Programs\Windows Antivirus Suite.lnk&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%UserProfile% refers to the current user&#39;s profile folder. By default, this is C:\Documents and Settings\[Current User] for Windows 2000/XP, C:\Users\[Current User] for Windows Vista/7/8, and c:\winnt\profiles\[Current User] for Windows NT.&lt;br /&gt;
&lt;br /&gt;
%AllUsersProfile% refers to the All Users Profile folder. By default, this is C:\Documents and Settings\All Users for Windows 2000/XP and C:\ProgramData\ for Windows Vista, Windows 7, and Windows 8.&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/8951267091792080338/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/02/remove-windows-antivirus-suite.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/8951267091792080338'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/8951267091792080338'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/02/remove-windows-antivirus-suite.html' title='Remove Windows Antivirus Suite'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-5687709828234053432</id><published>2014-02-23T20:33:00.002+08:00</published><updated>2014-03-19T06:47:25.649+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows AntiBreach Suite</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;
&lt;img alt=&quot;Windows AntiBreach Suite Removal Guide&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows AntiBreach Suite&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; is a &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;fake antivirus&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; program that cannot detect and remove any kind of virus, malware or trojan. However, Windows AntiBreach Suite. pretends to be a legitimate antivirus which can protect computers from the attack malwares. Once Windows AntiBreach Suite is installed on the computer, it will start automatically when Windows boot. Then Windows AntiBreach Suite will do a fake scan on the computer and will definitely scare the user with pop ups which shows that the computer has been infected by a lot of malwares. Windows AntiBreach Suite will repeatedly shows the pop ups to urge the user to purchase the full version of Windows AntiBreach Suite so that to remove all the threats. However, Windows AntiBreach Suite cannot detect and remove any kind of virus, malware and trojan.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows AntiBreach Suite&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; can be removed by stopping the processes and removing the files ([random].exe) by using &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2010/11/emsisoft-hijackfree.html&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;. Then the user should remove the registry entries added or modified by Windows AntiBreach Suite shown in the removal guide below. Windows AntiBreach Suite DLL Files should be unregistered too (see removal guide). All files related to Windows AntiBreach Suite must be deleted.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Windows AntiBreach Suite&lt;/b&gt; provide fake feature such as&amp;nbsp;Home, Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect the computer from any kind of malware.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows AntiBreach Suite&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows AntiBreach Suite Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;MS-SEC&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\Software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = 22.sys &lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
%UserProfile%\Desktop\Windows AntiBreach Suite.lnk&lt;br /&gt;
%AllUsersProfile%\Start Menu\Programs\Windows AntiBreach Suite.lnk&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%UserProfile% refers to the current user&#39;s profile folder. By default, this is C:\Documents and Settings\[Current User] for Windows 2000/XP, C:\Users\[Current User] for Windows Vista/7/8, and c:\winnt\profiles\[Current User] for Windows NT.&lt;br /&gt;
&lt;br /&gt;
%AllUsersProfile% refers to the All Users Profile folder. By default, this is C:\Documents and Settings\All Users for Windows 2000/XP and C:\ProgramData\ for Windows Vista, Windows 7, and Windows 8.&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/5687709828234053432/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/02/remove-windows-antibreach-suite.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/5687709828234053432'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/5687709828234053432'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/02/remove-windows-antibreach-suite.html' title='Remove Windows AntiBreach Suite'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-694807193959579266</id><published>2014-02-23T20:31:00.001+08:00</published><updated>2014-02-23T20:31:53.056+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows AntiBreach Helper</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;
&lt;img alt=&quot;Windows AntiBreach Helper Removal Guide&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows AntiBreach Helper&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; is a &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;fake antivirus&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; program that cannot detect and remove any kind of virus, malware or trojan. However, Windows AntiBreach Helper. pretends to be a legitimate antivirus which can protect computers from the attack malwares. Once Windows AntiBreach Helper is installed on the computer, it will start automatically when Windows boot. Then Windows AntiBreach Helper will do a fake scan on the computer and will definitely scare the user with pop ups which shows that the computer has been infected by a lot of malwares. Windows AntiBreach Helper will repeatedly shows the pop ups to urge the user to purchase the full version of Windows AntiBreach Helper so that to remove all the threats. However, Windows AntiBreach Helper cannot detect and remove any kind of virus, malware and trojan.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows AntiBreach Helper&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; can be removed by stopping the processes and removing the files ([random].exe) by using &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2010/11/emsisoft-hijackfree.html&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;. Then the user should remove the registry entries added or modified by Windows AntiBreach Helper shown in the removal guide below. Windows AntiBreach Helper DLL Files should be unregistered too (see removal guide). All files related to Windows AntiBreach Helper must be deleted.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: large;&quot;&gt;Windows AntiBreach Helper provide fake feature such as&amp;nbsp;Home, Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect the computer from any kind of malware.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows AntiBreach Helper&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows AntiBreach Helper Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;MS-SEC&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\Software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = 22.sys &lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
%UserProfile%\Desktop\Windows AntiBreach Helper.lnk&lt;br /&gt;
%AllUsersProfile%\Start Menu\Programs\Windows AntiBreach Helper.lnk&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%UserProfile% refers to the current user&#39;s profile folder. By default, this is C:\Documents and Settings\[Current User] for Windows 2000/XP, C:\Users\[Current User] for Windows Vista/7/8, and c:\winnt\profiles\[Current User] for Windows NT.&lt;br /&gt;
&lt;br /&gt;
%AllUsersProfile% refers to the All Users Profile folder. By default, this is C:\Documents and Settings\All Users for Windows 2000/XP and C:\ProgramData\ for Windows Vista, Windows 7, and Windows 8.&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/694807193959579266/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/02/remove-windows-antibreach-helper.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/694807193959579266'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/694807193959579266'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/02/remove-windows-antibreach-helper.html' title='Remove Windows AntiBreach Helper'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-1644006750489223055</id><published>2014-02-15T09:08:00.002+08:00</published><updated>2014-02-15T09:08:45.951+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows AntiBreach Tool</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;
&lt;img alt=&quot;Remove Windows AntiBreach Tool&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows AntiBreach Tool &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;is a &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;fake antivirus&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; program that look like a legitimate antivirus such as Kaspersky Antivirus which can protect the computer from the attack of viruses, malwares or trojans. However, Windows AntiBreach Tool cannot detect and remove any kind of virus, malware or trojan on the computer. When Windows AntiBreach Tool is installed in the computer, it will start automatically when Windows boot and then will do a fake scan on the computer and will surely scare the user with pop ups which show that the computer has been infected by a lot of malwares, viruses and trojans. Do not believe any pop ups shown by Windows AntiBreach Tool. Windows AntiBreach Tool will recommend the user to purchase the full version of Windows AntiBreach Tool in order to remove all the detected threats. Do not buy Windows AntiBreach Tool as it can do nothing.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Windows AntiBreach Tool&lt;/b&gt; provide fake features such as&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Firewall, Automatic Update, Antivirus Protection, Anti-Phising, Advanced Process Control, Autorun Manager, Service Manager, All-in-one Suite, Quick Scan, Deep Scan, Custom Scan etc. All of them cannot protect the computer from any kind of malware.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;Windows AntiBreach Tool&lt;/b&gt; &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;can be removed by stop processes and kill all files with random name in the hard drives. The user also must remove the autorun setting added by Windows AntiBreach Tool. These can be done by using &lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/posts.g?blogID=3384466804101984323&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows AntiBreach Tool &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows AntiBreach Tool Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = &quot;123123.sys&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;PrSft&quot;=%AppData%\svc-[random].exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/1644006750489223055/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/02/remove-windows-antibreach-tool.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/1644006750489223055'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/1644006750489223055'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/02/remove-windows-antibreach-tool.html' title='Remove Windows AntiBreach Tool'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-7073967872850852724</id><published>2014-02-11T09:25:00.002+08:00</published><updated>2014-02-11T09:25:05.695+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Paramount Protection</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;&lt;img alt=&quot;Remove Windows Paramount Protection&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Paramount Protection&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; is a fake antivirus program which intend to urge the user whose computer is infected by Windows Paramount Protection to purchase the full version of Windows Paramount Protection. Windows Paramount Protection produces fake alert in order to cheat the user. Windows Paramount Protection installs into the computer without the confirmation of the user and configure itself to start automatically when windows boot. Windows Paramount Protection will then scan the computer and state that there are many malware in the computer and ask the user to purchase full version of Windows Paramount Protection to remove all the malwares.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Paramount Protection&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; provide fake features such as Firewall, Automatic Update, Antivirus Protection, Anti-Phising, Advanced Process Control, Autorun Manager, Service Manager, All-in-one Suite, Quick Scan, Deep Scan, Custom Scan etc. All of them cannot protect the computer from any kind of malware.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Windows Paramount Protection&lt;/b&gt; is a scareware program from the Rogue.FakeVimes family of computer infections. This program is considered a rogue anti-spyware program because it does not allow you to access your Windows desktop, automatically terminates legitimate applications, and displays false scan results and security alerts that are designed to scare you into purchasing the program. This program will also be configured to start automatically before your Windows desktop is shown, which makes your computer unusable until the infection is removed. Windows Paramount Protection is distributed through web sites that display a fake online virus scanner that states your computer is infected and then prompts you to download the installation file. This infection is also promoted by hacked web sites that contain exploit code that tries to install the infection on your computer without your permission or knowledge.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b style=&quot;font-size: x-large;&quot;&gt;Windows Paramount Protection&lt;/b&gt;&lt;span style=&quot;font-size: large;&quot;&gt; can be removed by stopping its processes &lt;/span&gt;&lt;random and=&quot;&quot; be=&quot;&quot; below.=&quot;&quot; by=&quot;&quot; cleaning=&quot;&quot; exe=&quot;&quot; file.=&quot;&quot; following=&quot;&quot; guide=&quot;&quot; kill=&quot;&quot; registry=&quot;&quot; remember=&quot;&quot; removal=&quot;&quot; restored=&quot;&quot; settings=&quot;&quot; should=&quot;&quot; span=&quot;&quot; the=&quot;&quot; to=&quot;&quot; toolkit.exe=&quot;&quot; user=&quot;&quot; windows=&quot;&quot;&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;b style=&quot;font-size: x-large;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Paramount Protection&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style=&quot;font-size: x-large;&quot;&gt;Windows Paramount Protection Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = &quot;123123.sys&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;PrSft&quot;=%AppData%\svc-&lt;random&gt;.exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-&lt;random&gt;.exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders ad Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
&lt;br /&gt;
File Location Notes:&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;/random&gt;&lt;/random&gt;&lt;/random&gt;&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/7073967872850852724/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/02/remove-windows-paramount-protection.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/7073967872850852724'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/7073967872850852724'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/02/remove-windows-paramount-protection.html' title='Remove Windows Paramount Protection'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-3727777435015523214</id><published>2014-02-11T09:24:00.003+08:00</published><updated>2014-02-11T09:24:45.735+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Antivirus Master</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;&lt;img alt=&quot;Remove Windows Antivirus Master&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Antivirus Master&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; is a fake antivirus program which intend to urge the user whose computer is infected by Windows Antivirus Master to purchase the full version of Windows Antivirus Master. Windows Antivirus Master produces fake alert in order to cheat the user. Windows Antivirus Master installs into the computer without the confirmation of the user and configure itself to start automatically when windows boot. Windows Antivirus Master will then scan the computer and state that there are many malware in the computer and ask the user to purchase full version of Windows Antivirus Master to remove all the malwares.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Antivirus Master&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; provide fake features such as Firewall, Automatic Update, Antivirus Protection, Anti-Phising, Advanced Process Control, Autorun Manager, Service Manager, All-in-one Suite, Quick Scan, Deep Scan, Custom Scan etc. All of them cannot protect the computer from any kind of malware.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Windows Antivirus Master&lt;/b&gt; is a scareware program from the Rogue.FakeVimes family of computer infections. This program is considered a rogue anti-spyware program because it does not allow you to access your Windows desktop, automatically terminates legitimate applications, and displays false scan results and security alerts that are designed to scare you into purchasing the program. This program will also be configured to start automatically before your Windows desktop is shown, which makes your computer unusable until the infection is removed. Windows Antivirus Master is distributed through web sites that display a fake online virus scanner that states your computer is infected and then prompts you to download the installation file. This infection is also promoted by hacked web sites that contain exploit code that tries to install the infection on your computer without your permission or knowledge.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b style=&quot;font-size: x-large;&quot;&gt;Windows Antivirus Master&lt;/b&gt;&lt;span style=&quot;font-size: large;&quot;&gt; can be removed by stopping its processes &lt;/span&gt;&lt;random and=&quot;&quot; be=&quot;&quot; below.=&quot;&quot; by=&quot;&quot; cleaning=&quot;&quot; exe=&quot;&quot; file.=&quot;&quot; following=&quot;&quot; guide=&quot;&quot; kill=&quot;&quot; registry=&quot;&quot; remember=&quot;&quot; removal=&quot;&quot; restored=&quot;&quot; settings=&quot;&quot; should=&quot;&quot; span=&quot;&quot; the=&quot;&quot; to=&quot;&quot; toolkit.exe=&quot;&quot; user=&quot;&quot; windows=&quot;&quot;&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;b style=&quot;font-size: x-large;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Antivirus Master&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style=&quot;font-size: x-large;&quot;&gt;Windows Antivirus Master Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = &quot;123123.sys&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;PrSft&quot;=%AppData%\svc-&lt;random&gt;.exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-&lt;random&gt;.exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders ad Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
&lt;br /&gt;
File Location Notes:&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;/random&gt;&lt;/random&gt;&lt;/random&gt;&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/3727777435015523214/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/02/remove-windows-antivirus-master.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/3727777435015523214'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/3727777435015523214'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/02/remove-windows-antivirus-master.html' title='Remove Windows Antivirus Master'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-6332291694701491354</id><published>2014-02-04T08:44:00.003+08:00</published><updated>2014-02-04T08:44:32.595+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Safety Master</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;
&lt;img alt=&quot;Remove Windows Safety Master&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Safety Master&lt;/b&gt; is a fake antivirus program created to urge the user to buy the full version of Windows Safety Master in order to earn some profit. Don&#39;t ever buy it as it is a cheat! Windows Safety Master install itself into the computer without confirmation of the users and it start automatically when the windows boot. Windows Safety Master produce fake virus warning alert consistently to force the user to purchase the full version so that to remove the malwares. Windows Safety Master is nothing more than a scam and plagiarized antispyware program&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Safety Master&lt;/b&gt;&amp;nbsp;provide fake features such as Home, Firewall, Automatic updates, &amp;nbsp;Antivirus Protection, &amp;nbsp;Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect the computer from any kind of malware.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Safety Master &lt;/b&gt;can be removed by using &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2010/11/emsisoft-hijackfree.html&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; to stop the processes and kill the files from the hard drive. Then, the user has to restore the registry entries added and modified by Windows Safety Master. Finally, all the file related to Windows Safety Master must be deleted from the hard drive. All of them has been shown in the removal guide below.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Windows Safety Master&lt;/b&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;b&gt;Windows Safety Master Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = &quot;123123.sys&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;GuardSoftware&quot; = %AppData%\svc-&lt;random&gt;.exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-&lt;random&gt;.exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;/random&gt;&lt;/random&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/6332291694701491354/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/02/remove-windows-safety-master.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/6332291694701491354'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/6332291694701491354'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/02/remove-windows-safety-master.html' title='Remove Windows Safety Master'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-4236230347708557825</id><published>2014-01-28T10:05:00.001+08:00</published><updated>2014-01-28T10:05:14.913+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Ultimate Booster</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;&lt;img alt=&quot;Windows Ultimate Booster Removal Guide&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Windows Ultimate Booster&lt;/b&gt; is a &lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;fake antivirus&lt;/a&gt; program which come with a rootkit to prevent many program from running on the computer. Windows Ultimate Booster cannot detect and remove any kind of virus, malware and trojan. What Windows Ultimate Booster can do is displaying fake report to tell the user that the computer has been infected by many malwares, trojans and viruses. Windows Ultimate Booster will urge the user to purchase the full version of Windows Ultimate Booster to remove all the detected malwares, viruses and trojan. Bare in mind that Windows Ultimate Booster CANNOT detect and remove any malware, virus and trojan&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;b&gt;Windows Ultimate Booster&lt;/b&gt; provide fake features such as Home, Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect the computer from any kind of malware.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows Ultimate Booster&lt;/b&gt; can be removed by stopping all the processes with random name and name . Then the user has to remove the files of the processes. Finally, the registry settings have to be restored by removing the registry keys stated below.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows Ultimate Booster&lt;/b&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows Ultimate Booster Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = &quot;123123.sys&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;GuardSoftware&quot; = %AppData%\svc-[random].exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\svc-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0 &lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-[random].exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/4236230347708557825/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/01/remove-windows-ultimate-booster.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/4236230347708557825'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/4236230347708557825'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/01/remove-windows-ultimate-booster.html' title='Remove Windows Ultimate Booster'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-9100595571225307300</id><published>2014-01-22T20:28:00.002+08:00</published><updated>2014-01-22T20:28:44.670+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><category scheme="http://www.blogger.com/atom/ns#" term="RFA"/><title type='text'>Remove Windows Prime Accelerator</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;&lt;img alt=&quot;Windows Prime Accelerator Removal Guide&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Prime Accelerator&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; is a &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;fake antivirus&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; program that cannot detect and remove any kind of virus, malware or trojan. However, Windows Prime Accelerator. pretends to be a legitimate antivirus which can protect computers from the attack malwares. Once Windows Prime Accelerator is installed on the computer, it will start automatically when Windows boot. Then Windows Prime Accelerator will do a fake scan on the computer and will definitely scare the user with pop ups which shows that the computer has been infected by a lot of malwares. Windows Prime Accelerator will repeatedly shows the pop ups to urge the user to purchase the full version of Windows Prime Accelerator so that to remove all the threats. However, Windows Prime Accelerator cannot detect and remove any kind of virus, malware and trojan.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Prime Accelerator&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; can be removed by stopping the processes and removing the files ([random].exe) by using &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2010/11/emsisoft-hijackfree.html&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;. Then the user should remove the registry entries added or modified by Windows Prime Accelerator shown in the removal guide below. Windows Prime Accelerator DLL Files should be unregistered too (see removal guide). All files related to Windows Prime Accelerator must be deleted.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: large;&quot;&gt;Windows Prime Accelerator provide fake feature such as&amp;nbsp;Home, Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect the computer from any kind of malware.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Prime Accelerator&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows Prime Accelerator Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-lefx.exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = &quot;123123.sys&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;GuardSoftware&quot; = %AppData%\svc-lefx.exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\safe-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-lefx.exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/9100595571225307300/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/01/remove-windows-prime-accelerator.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/9100595571225307300'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/9100595571225307300'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/01/remove-windows-prime-accelerator.html' title='Remove Windows Prime Accelerator'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-2959075053846010772</id><published>2014-01-15T18:00:00.002+08:00</published><updated>2014-01-15T18:00:14.568+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Prime Booster</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;
&lt;img alt=&quot;Windows Prime Booster Removal Guide&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Prime Booster&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; is a &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;fake antivirus&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; program that cannot detect and remove any kind of virus, malware or trojan. However, Windows Prime Booster. pretends to be a legitimate antivirus which can protect computers from the attack malwares. Once Windows Prime Booster is installed on the computer, it will start automatically when Windows boot. Then Windows Prime Booster will do a fake scan on the computer and will definitely scare the user with pop ups which shows that the computer has been infected by a lot of malwares. Windows Prime Booster will repeatedly shows the pop ups to urge the user to purchase the full version of Windows Prime Booster so that to remove all the threats. However, Windows Prime Booster cannot detect and remove any kind of virus, malware and trojan.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Prime Booster&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; can be removed by stopping the processes and removing the files ([random].exe) by using &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2010/11/emsisoft-hijackfree.html&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;. Then the user should remove the registry entries added or modified by Windows Prime Booster shown in the removal guide below. Windows Prime Booster DLL Files should be unregistered too (see removal guide). All files related to Windows Prime Booster must be deleted.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Windows Prime Booster&lt;/b&gt; provide fake feature such as&amp;nbsp;Home, Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect the computer from any kind of malware.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Prime Booster&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows Prime Booster Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
safe-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = &quot;1&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\safe-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = &quot;0&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = &quot;0&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = &quot;0&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = &quot;0&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\safe-[random].exe&lt;br /&gt;
%AppData%\result1.db&lt;br /&gt;
%UserProfile%\Desktop\Windows Prime Booster.lnk&lt;br /&gt;
%CommonStartMenu%\Programs\Windows Prime Booster.lnk&lt;br /&gt;
&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%UserProfile% refers to the current user&#39;s profile folder. By default, this is C:\Documents and Settings\[Current User] for Windows 2000/XP, C:\Users\[Current User] for Windows Vista/7/8, and c:\winnt\profiles\[Current User] for Windows NT.&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;br /&gt;
%CommonStartMenu% refers to the Windows Start Menu for All Users. Any programs or files located in the All Users Start menu will appear in the Start Menu for all user accounts on the computer. For Windows XP, Vista, NT, 2000 and 2003 it refers to C:\Documents and Settings\All Users\Start Menu\, and for Windows Vista, Windows 7, and Windows 8 it is C:\ProgramData\Microsoft\Windows\Start Menu\.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/2959075053846010772/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/01/remove-windows-prime-booster.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/2959075053846010772'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/2959075053846010772'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/01/remove-windows-prime-booster.html' title='Remove Windows Prime Booster'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-1634375182290949435</id><published>2014-01-15T17:55:00.003+08:00</published><updated>2014-01-15T17:55:30.317+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><category scheme="http://www.blogger.com/atom/ns#" term="RFA"/><title type='text'>Remove Windows Prime Shield</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;
&lt;img alt=&quot;Windows Prime Shield Removal Guide&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Prime Shield&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; is a &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;fake antivirus&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; program that cannot detect and remove any kind of virus, malware or trojan. However, Windows Prime Shield. pretends to be a legitimate antivirus which can protect computers from the attack malwares. Once Windows Prime Shield is installed on the computer, it will start automatically when Windows boot. Then Windows Prime Shield will do a fake scan on the computer and will definitely scare the user with pop ups which shows that the computer has been infected by a lot of malwares. Windows Prime Shield will repeatedly shows the pop ups to urge the user to purchase the full version of Windows Prime Shield so that to remove all the threats. However, Windows Prime Shield cannot detect and remove any kind of virus, malware and trojan.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Prime Shield&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; can be removed by stopping the processes and removing the files ([random].exe) by using &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2010/11/emsisoft-hijackfree.html&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Emsisoft HiJackFree&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;. Then the user should remove the registry entries added or modified by Windows Prime Shield shown in the removal guide below. Windows Prime Shield DLL Files should be unregistered too (see removal guide). All files related to Windows Prime Shield must be deleted.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span style=&quot;font-size: large;&quot;&gt;Windows Prime Shield provide fake feature such as&amp;nbsp;Home, Firewall, Automatic updates, Antivirus Protection, Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect the computer from any kind of malware.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Prime Shield&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows Prime Shield Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
svc-lefx.exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd&lt;br /&gt;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd &quot;ImagePath&quot; = &quot;123123.sys&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run &quot;GuardSoftware&quot; = %AppData%\svc-lefx.exe&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\safe-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\svc-lefx.exe&lt;br /&gt;
%AppData%\data.sec&lt;br /&gt;
&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/1634375182290949435/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/01/remove-windows-prime-shield.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/1634375182290949435'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/1634375182290949435'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/01/remove-windows-prime-shield.html' title='Remove Windows Prime Shield'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3384466804101984323.post-4589674996906104817</id><published>2014-01-11T11:38:00.002+08:00</published><updated>2014-01-11T11:38:33.524+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Removal Guide"/><title type='text'>Remove Windows Virtual Protector</title><content type='html'>&lt;div style=&quot;float: right;&quot;&gt;&lt;img alt=&quot;Remove Windows Virtual Protector&quot; src=&quot;http://olzen.info/rfa.png&quot; /&gt;&lt;/div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Virtual Protector&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; is a &lt;/span&gt;&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/05/remove-fake-antivirus-10.html#fa&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;fake antivirus&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; program that is mainly created to urge the user to buy the full version of Windows Virtual Protector by producing fake scan result. Windows Virtual Protector installs in the computer and will start automatically when windows boot. Then, Windows Virtual Protector will scan the computer and produce fake result that the computer is infected by malwares. Do not ever believe the result, all of them is a lie. Do not activate Windows Virtual Protector as it is not a real antivirus, but just want to cheat your money only. Windows Virtual Protector copy the interface of a well-known security program.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;float: left;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Virtual Protector&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; can be uninstalled by by stopping all processes with random name and also kill its files. Then, all registry entries added and modified by Vaccine Clean must be cleared by using Windows Registry Editor.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Windows Virtual Protector&lt;/b&gt; is a fake rogue anti-spyware program that is part of the Fake Microsoft Security Essentials infection. When this infection is installed on a computer it will display a fake Microsoft Security Essentials alert that states that it has detected an Unknown Win32/Trojan on the computer.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Virtual Protector&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&amp;nbsp;provide fake features such as&amp;nbsp;Home, Firewall, Automatic updates,  Antivirus Protection,  Anti-Phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-One Suite, Quick Scan, Deep Scan, Custom Scan, History, Settings, etc. All of them cannot protect the computer from any kind of malware&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt;Windows Virtual Protector&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: large;&quot;&gt; should be removed immediately!&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;Windows Virtual Protector Removal Guide&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;Kill Process&lt;/u&gt;&lt;br /&gt;
(&lt;a href=&quot;http://freeofvirus.blogspot.com/2009/02/how-to-kill-process-effectively.html&quot; target=&quot;_blank&quot;&gt;How to kill a process effectively?&lt;/a&gt;)&lt;br /&gt;
guard-[random].exe&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Delete Registry&lt;/u&gt;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations &quot;LowRiskFileTypes&quot; = &quot;.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;&quot;&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments &quot;SaveZoneInformation&quot; = 1&lt;br /&gt;
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon &quot;Shell&quot; = &quot;%AppData%\guard-[random].exe&quot;&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorAdmin&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;ConsentPromptBehaviorUser&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableLUA&quot; = 0&lt;br /&gt;
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system &quot;EnableVirtualization&quot; = 0 &lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Remove Folders and Files&lt;/u&gt;&lt;br /&gt;
%AppData%\guard-[random].exe&lt;br /&gt;
%AppData%\result1.db&lt;br /&gt;
&lt;br /&gt;
File Location Notes:&lt;br /&gt;
&lt;br /&gt;
%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\[Current User]\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\[Current User]\AppData\Roaming.&lt;br /&gt;
&lt;br /&gt;
&lt;div id=&quot;postads&quot;&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://freeofvirus.blogspot.com/feeds/4589674996906104817/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://freeofvirus.blogspot.com/2014/01/remove-windows-virtual-protector.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/4589674996906104817'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3384466804101984323/posts/default/4589674996906104817'/><link rel='alternate' type='text/html' href='http://freeofvirus.blogspot.com/2014/01/remove-windows-virtual-protector.html' title='Remove Windows Virtual Protector'/><author><name>Olzen</name><uri>http://www.blogger.com/profile/08667460576433825151</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq8Gf4NzlIqMTTuQFps3UQfpKoQ9w_S75tZcZ7yLqkg7hyBLl3YdbSBwaVOwNfcFdWG1EnXU2Pdu1g2f9-_gvU1PmcY9Hxkx6BKwWtxEgRvi0f92ur3OASHNVObIhxSH8/s220/me2.JPG'/></author><thr:total>0</thr:total></entry></feed>