Windows attacks preventor is specially designed to look like a firewall, but it is just a fraud, which is pretty clear to many people. However, some innocent people think of it a real firewall and download it. Windows Attacks Preventor, by breaching a computer’s security system, finds its way into the computer. Once it has entered in a computer system, nothing stops it to install itself. After the installation, the program shows the user a list of infected files and continuous security alerts. An inexperienced user will believe on it and asks the tool to clean the viruses. The tool will ask to upgrade the version so that the viruses can be cleaned completely. If you will upgrade the windows attacks preventor version, it still cannot remove the viruses as these files do not exist in reality.

You should remove the windows attacks preventor instantly. The presence of this rogue application in your system will make your system open to other viruses and spywares instead of protecting it.

Remove Windows Attacks Preventor processes

  1. Press ALT+CTRL+DEL or CTRL + Shift + ESC to quickly open the Windows task manager.
  2. There are different tabs in the windows task manger, find out the tab whose name in ‘processes’.
  3. In the column ‘image name’ find out the processes Inspector[random].exe and Protector-[3 random characters].exe. Click on the processes one by one and click on the button ‘End processes’ to kill the process.

Remove Windows Attacks Preventor DLL files

  1. Go to start and select run.
  2. Type cmd and press enter.
  3. When the command prompt opens; type cd press space bar and enter the complete path of the file along with the directory name and press enter.
  4. Now to remove the file; type “regsvr32 /u DLLName.dll” and press enter.
  5. Replace DLLName with the windows attacks preventor dll file name which is NPSWF32.dll.

Remove Windows Attacks Preventor Registry Entries

  1. To open the registry editor; click on Start then click on Run from the menu.
  2. Type regedit and click Ok.
  3. Go in the left pane from the two panes in the registry editor and click on Edit.
  4. Select the option Find and type in the registry values in the given space.
  5. When the registry values are found right click on them and select Delete.
  6. The registry values which you will be looking for are:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnOnHTTPSToHTTPRedirect” = 0

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegedit” = 0

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegistryTools” = 0

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = 0

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Inspector”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adaware.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\belt.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\deputy.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icload95.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lnetinfo.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpftray.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netscanpro.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nssys32.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ozn695m5.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perswf.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PskSvc.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SafetyKeeper.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spoler.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbcons.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winservn.exe “Debugger”

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zonealarm.exe “Debugger”

Remove Windows Attacks Preventor files

  1. Go to start and click on Search.
  2. Click the option ‘Files and folders’.
  3. And type the following files; click on the file name and press Delete.

%AppData%\Inspector-[random].exe

%AppData%\Protector-[random].exe

%AppData%\NPSWF32.dll

%AppData%\result.db

%UserProfile%\Desktop\Windows Protection Master.lnk

%StartMenu%\Programs\Windows Protection Master.lnk

 

How to remove Windows Attacks Preventor?
Tagged on:         

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>