Windows Custom Safety automatic and manual removal guide

1 Star2 Stars3 Stars4 Stars5 Stars (73 votes, average: 5.00 out of 5)
loadingLoading...

Windows Custom Safety should be treated as a rogue security program not able to protect your system. Instead of providing a helpful service in the field of virus detection and removal, this fraudware seriously contaminates your workstation and inevitably leads to the distortion of PC function. So, do not skip reading this entry to timely identify and remove this hoax. The neglect of this virus removal maybe dangerous since it may bring other, more serious viruses to your computer.

Windows Custom Safety squeezes to your computer through the security vulnerabilities available on your workstation. Sometimes the available anti-viruses cannot protect you against threats, and in some cases users prefer not to have any anti-viruses at all. Nevertheless, Windows Custom Safety attempts to mimic the features of some powerful antivirus. It runs its many fake scans of your computer and tells that your system is seriously infected. Showing tons of pop-ups and falsified scanning results it step by step brings you to the point where you will be asked by the virus to buy its fake licensed version (so-called ultimate protection). Please be advised enough not to jump at the bait of the cyber crooks and not make such a serious mistake. Remove this parasite as described in the removal guide stipulated below.

Windows Custom Safety automatic remover:

Similar video guide at our Youtube channel:

Windows Custom Safety manual remover:

Delete Windows Custom Safety files:
Protector-[rnd].exe in %AppData% folder
Delete Windows Custom Safety registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\
Inspector = %AppData%\Protector-[random].exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\a.exe\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\aAvgApi.exe\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTray.exe\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\About.exe\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\ackwin32.exe\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ad-Aware.exe\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\adaware.exe\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\advxdwin.exe\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\AdwarePrj.exe\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\agent.exe\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\agentsvr.exe\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\agentw.exe\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\alertsvc.exe\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\alevir.exe\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\alogserv.exe\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\AlphaAV\
Debugger = svchost.exe
HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\AlphaAV.exe\
Debugger = svchost.exe

Leave a Comment

*