Thursday, October 11, 2012

How to Get Rid of Fake XP Security 2013 - Manual Revoval Guides

Is your computer hit with XP Security 2013 and flooded with fake warnings? Wondering if the computer is really in such bad condition? Are you looking for an effective tool to get rid of XP Security 2013? Tee Support online agents will help you out of such mess around the first time.

XP Security 2013 Description

XP Security 2013 is a fake antivirus program whose trick is truism and platitude - taking advantage of scaring tactics to swindle the gullible users to pay for its full version to fix the fictitious security problems. You'll not miss numerous popups notifying that your computer is severely compromised with infections and errors the further suggestion ‘activate protection'. Another scaring tactics comes from the reports generated by its mimic system scan flagged with multiple infections. At last the rogue will prompt you to buy its useless product which is confirmed to contain no virus dictionaries. Don't easily believe in such groundless statement since it's a fake security program supported by sophisticated Trojan who runs through the whole fraud. And please note only by completely removing XP Security 2013, can you make sure that the real threats are totally gone.

XP Security 2013 Removal Guide

You are not alone to be annoyed by the rogue's repercussion without anything pickup by antivirus. That is because the rogue is deeply hide into running processes and modifies system with an obscured way, which makes its detection and deletion considerably difficult. You are highly suggested to use manual method to disable XP Security 2013. Below is the referential steps on how:
Step 1 : Go to Task Manager with Alt+Ctrl+Delete and stop its process.
[random 3 characters].exe
Step 2: Search for and delete its related files in Local Disk C:
%AppData%\[random characters]
%AppData%\[random characters]
%Temp%\[random characters]
%UserProfile%\Templates\[random characters]
Step 3: Navigate to remove the registry entries associated with Exploit:JS/ShellCode.AS as below in Registry Editor:
HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\BrowserEmulation "TLDUpdates" = '1'
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command "(Default)" = '"C:\Documents and Settings\[UserName]\Local Settings\Application Data\[random 3 characters].exe" -a "%1" %*'
HKEY_CLASSES_ROOT\.exe\shell\open\command "(Default)" = '"C:\Documents and Settings\[UserName]\Local Settings\Application Data\[random 3 characters].exe" -a "%1" %*'
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command "(Default)" = '"%LocalAppData%\kdn.exe" -a "C:\Program Files\Mozilla Firefox\firefox.exe"'
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command "(Default)" = '"%LocalAppData%\kdn.exe" -a "C:\Program Files\Mozilla Firefox\firefox.exe" -safe-mode'
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command "(Default)" = '"C:\Documents and Settings\[UserName]\Local Settings\Application Data\[random 3 characters].exe" -a "C:\Program Files\Internet Explorer\iexplore.exe"'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center "AntiVirusOverride" = '1'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center "FirewallOverride" = '1'
Notes:  If you are still confused with above procedures, please click here to contact a 24/7 online expert for more details.

No comments:

Post a Comment