Home Malware Programs Rogue Anti-Spyware Programs Windows Pro Safety

Windows Pro Safety

Posted: May 20, 2012

Threat Metric

Threat Level: 2/10
Infected PCs: 59
First Seen: May 20, 2012
OS(es) Affected: Windows

Windows Pro Safety Screenshot 1Windows Pro Safety, while Windows Pro Safety acts like an individual anti-spyware scanner, in reality, is a clone of other recent variants of Win32/FakeVimes-based scamware. Although alerts from Windows Pro Safety will imply that your PC is suffering through such grave misfortunes as unauthorized Windows Registry changes, attempts to steal identity-related information or keylogging attacks from unrelated PC threats, Windows Pro Safety isn't able to detect any type of malicious software or attack against your computer. Since, in-between dodging Windows Pro Safety's fake alerts, you'll also be forced to sit through blocked security features and browser redirects, SpywareRemove.com malware analysts suggest removing Windows Pro Safety once you have access to any trustworthy anti-malware product. Regardless of all else, however, you should never purchase Windows Pro Safety, which doesn't have any beneficial security features and can't protect your computer regardless of how much money you spend on Windows Pro Safety.

Windows Pro Safety: a Professional at Online Thievery

Unlike actual anti-spyware programs, Windows Pro Safety copies the appearance but not the functionality of PC security. While Windows Pro Safety is capable of spitting out a vast assortment of warning messages and Trojan notifications, all of Windows Pro Safety's warnings are false and should be ignored as valueless with respect to detecting PC threats. Similarly, Windows Pro Safety's scanner features are just as poorly functional, and many of its features are only excuses to redirect you to a purchase form for its registration key. SpywareRemove.com malware researchers don't recommend that you give in to Windows Pro Safety's offer, since Windows Pro Safety can endanger your financial credentials and is definitely a pointless waste of money.

In spite of the above caveat, you may find registering Windows Pro Safety for free with the code '0W000-000B0-00T00-E0020' to be helpful. This code also functions for many other members of the FakeVimes group of rogue anti-spyware programs, such as Privacy Guard Pro, Extra Antivirus, Fast Antivirus 2009, Presto TuneUp, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, Live PC Care, PC Live Guard, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus, Smart Security and PrivacyGuard Pro 2.0. Other safety measures that can be used to disable Windows Pro Safety's attacks before its deletion include booting Windows from a remote source (such as a removable hard drive) or booting into Safe Mode.

Why You Should Hurry to Get Safe without Windows Pro Safety

Windows Pro Safety, like every other member of its family, is also capable of blocking several PC security applications. Common victims of Windows Pro Safety's blocking attacks include Windows tools like the Registry Editor and Task Manager, as well as popular brands of anti-spyware software. However, SpywareRemove.com malware researchers haven't seen any indications that these attacks cause permanent damage to the programs in question, and disabling Windows Pro Safety should allow you to access any software that Windows Pro Safety has been preventing you from using.

Other significant attacks by Windows Pro Safety include disabling the UAC and redirecting your web browser to promote malicious websites, such as fake search engines. Since prolonged contact with these attacks risks further contamination of your PC, SpywareRemove.com malware researchers suggest removing Windows Pro Safety the very moment you can access a good anti-malware product of your preference.

Windows Pro Safety Screenshot 2Windows Pro Safety Screenshot 3Windows Pro Safety Screenshot 4Windows Pro Safety Screenshot 5Windows Pro Safety Screenshot 6Windows Pro Safety Screenshot 7Windows Pro Safety Screenshot 8Windows Pro Safety Screenshot 9Windows Pro Safety Screenshot 10Windows Pro Safety Screenshot 11Windows Pro Safety Screenshot 12

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Windows Pro Safety may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria .

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%AppData%\NPSWF32.dll File name: %AppData%\NPSWF32.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%AppData%\Protector-[RANDOM 3 CHARACTERS].exe File name: %AppData%\Protector-[RANDOM 3 CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%AppData%\Protector-[RANDOM 4 CHARACTERS].exe File name: %AppData%\Protector-[RANDOM 4 CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%CommonStartMenu%\Programs\Windows Pro Safety.lnk File name: %CommonStartMenu%\Programs\Windows Pro Safety.lnk
File type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%Desktop%\Windows Pro Safety.lnk File name: %Desktop%\Windows Pro Safety.lnk
File type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%AppData%\result.db File name: %AppData%\result.db
Mime Type: unknown/db
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = 0HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegedit" = 0HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegistryTools" = 0HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = 0HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "net" = "2012-5-20_4"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings "UID" = "rohjjdbsbt"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorAdmin" = 0HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorUser" = 0HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "EnableLUA" = 0HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\ASProtectHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\portmonitor.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alertsvc.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mrt.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\belt.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vpc32.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wnt.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsgk32.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sms.exeHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\..{RunKeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Inspector"

Additional Information

The following messages's were detected:
# Message
1Error
Attempt to modify Registry key entries detected.
Registry entry analysis recommended.
2Warning
Firewall has blocked a program from accessing the Internet
C:\program files\internet explorer\iexplore.exe
is suspected to have infected your PC. This type of virus intercepts entered data and transmits them to a remote server.

Related Posts

4 Comments

  • judy pyle says:

    i can't afford to pay the fee for one year to get the service. I am a senior on SS getting under $700 a month. that is why my system has lost the security i should have. Sorry but please unscribe me since I can't do anything except see what is affected. Thank you. Please stop the pop-ups that are a real pain in the a==. Again, Thank You.

  • Steve Lopez says:

    How can I purchase from infected computer with getting my credit card hacked.

  • Leann Thiel says:

    How do I get this program uninstalled. I don't want it on any of my computers. Tell me how to get it off.

  • Leann Thiel says:

    Judy how did you get this dumb program off your computer?