6/14/2012

How to remove Windows Active Defender virus from the compromissed PC?

Windows Active Defender is rogue software from FakeVimes virus family. This application is classified as a rogue because it deliberately launches unreal scanners and displays falsified scan reports, bombards with fake security alerts, to be short it gains the total control over your computer so that you are unable to use any of your normal applications. The presence of this program usually is a big surprise for the PC owner because the process of installation is carried our invisibly. The badware does not take into account such things as your knowledge or permission. One can catch this infection through hacked web sites that exploit vulnerabilities in your installed software. One can also run into this issue through advertisements that create an illusion of being online anti-malware scanners, which state that some dangerous Trojan is spotted on your computer. If you click “Remove button”, you will be asked to pay for Windows Active Defender full version. Do not make this huge mistake because this program is a scam devoted to be removed immediately upon detection. If you still feel sponsoring the cyber crooks, creators of this rougue, go on reading this entry. We hope you will change your mind.


Windows Active Defender is configured to run every time you start your computer. Once started, it will perform a scan and display false scan results that state that there are many programs on your computer that are infected. If you attempt to use the program to remove any of these so-called infections, though, it will state that you first need to purchase it before being allowed to do so. As all of these scan results are false, or the files do not even exist on your computer, please ignore them. While running, Windows Active Defender will also show fake security alerts from the Windows taskbar that attempts to scare you into thinking that your computer is under attack or is severely infected. Examples of some alerts you may see include:
Error
Trojan activity detected. System data security is at risk.
It is recommended to activate protection and run a full system scan.
Warning
Firewall has blocked a program from accessing the Internet
C:\program files\internet explorer\iexplore.exe
is suspected to have infected your PC. This type of virus intercepts entered data and transmits them to a remote server.
Error
Attempt to modify registry key entries detected. Registry entry analysis is recommended.

Just like the scan results, all of these security alerts are bring no useful information about system security state and should be ignored.

It goes without saying that the program was created to make you think that your computer is infected so that you will then purchase the program. With this said, for no reason should you purchase this program, and if you have, you should contact your credit card company and dispute the charge stating that the program is a scam and a computer virus. To remove Windows Active Defender and related malware, please follow the steps in the removal guide below.

Windows Active Defender malware remover:

malware removal tool

Delete Windows Active Defender files:
%AppData%\NPSWF32.dll
%AppData%\Protector-[rnd].exe
%AppData%\result.db
Delete Windows Active Defender registry entries:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Inspector %AppData%\Protector-[rnd].exe
HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\WarnOnHTTPSToHTTPRedirect 0
HKCU\Software\Microsoft\Windows\CurrentVersion\Settings\ID 4
HKCU\Software\Microsoft\Windows\CurrentVersion\Settings\UID [rnd]
HKCU\Software\Microsoft\Windows\CurrentVersion\Settings\net [date of installation]
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\ConsentPromptBehaviorAdmin 0
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\ConsentPromptBehaviorUser 0
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA 0
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTray.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTray.exe\Debugger svchost.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVCare.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVCare.exe\Debugger svchost.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVENGINE.EXE
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVENGINE.EXE\Debugger svchost.exe

No comments:

Post a Comment