Thursday, November 24, 2011

Get rid of VirTool/JS:Obfuscator.CA as another smart payload infection

VirTool/JS:Obfuscator.CA is not a parasite of clear single purpose. The trick is nothing too complicated, especially obfuscated, to understand, in spite of the assessment of some researches that the tasks of the rogue are incredibly hard to comprehend.
There is just a little inaccuracy in the above opinion though. It is hard to predict the task with which the infection is to be assigned, but the way it receives relevant instructions is quite plain.
Removal of VirTool/JS:Obfuscator.CA is the action which termination entails serious risks, because the longer it stays, the more info on your browsing habits the hackers have so that they can extend its payload more and more. As you can see, the virus monitors user’s browsing to convey the recorded history to remote attacker, which, judging on it, issues the order which constitutes the payload of malware.
Click here to launch free computer scan to remove VirTool/JS:Obfuscator.CA without prejudice to its completeness and safeness, as well as to the need of complete PC disinfection.


Wednesday, November 23, 2011

Remove Cloud AV 2012 security disaster

Cloud AV 2012 is a rogue security solution. It is not only that the program is rogue because it is a fake. The main problem about the rogueware is that it is quite true when it harms computer system. The harm is partially intentional and partially a side-effect.
Where the harm is intentional, it is done to show he imaginary detections reported by the same imaginary scanner of the fake do exist, for immediate after-effects of their actions are available for observations shortly before or after relevant report is generated.
Damage done by the rogue as a side-effect is not meant to be specific to any purpose. It has a various nature ranging from installation conflicts to incorrect usage of system resources resulting in freezes and even forced reboots.
Removal of Cloud AV 2012 is already a reasonable thing to do just taking into account that the rogue is aimed at cheating its users. Furthermore, as explained above, it harms. Click here to get rid of Cloud AV 2012 devastating software product, as well as disclose and exterminate other infections detected by actual free scanner.
Note:  If Cloud AV 2012 blocks antivirus installation - try to rename removal tool file (SZSetupAV.exe) to explorer.exe and start it with new name or to install it in Safe Mode (press F8 before Windows starts).

CloudAV 2012 screenshot:

Get rid of "Files indexation process failed" popup generated by fake PC optimizers

"Files indexation process failed" is not a warning by legitimate software or your computer system. Many users believe it is a true notification issued by their computer systems to notify on some disordering due to the graphics of the popup resemblance with that genuine system alert .
Remove "Files indexation process failed" popup as one of the tricks played on you by members of malware strain known as fake system defragmenters, fake optimizers, WinHDD fakes.
As regards technical peculiarities of the removal of "Files indexation process failed" popup, its extermination is only possible through deletion of the fake that shows the alert. Recent examples of such parasites include System Restore, System Fix, Windows Fix. To ensure extermination of any of the above parasites, click here to start free computer examination by reliable solution.


Files indexation process failed
Indexation process failure may cause:
File may became unreadable
Files and documents can be lost
Operation System may slow down dramatically



Remove AV Protection 2012, fresh clone of Cloud Protection deletion

AV Protection 2012 is a simple remake of malware released earlier. Both programs represent one of the few families still extending at the eve of 2012.
The name of the above forerunner of the infection under review is almost indistinguishable against that of the software in question: AVProtection 2011.
The only visible difference between the two malwares is in the name, and it is that the forerunner’s name is more often written in one word and its final digit is 1 instead of 2.
Removal of AV Protection 2012 is strongly recommended or else the program would drown you in its popups. It shows practically the same graphics as AVProtection2011 so that you can consult previous posts of this security blog for more details.
Click here to get rid of AV Protection 2012 as a malicious counterfeit produced by slight modification of its too much notorious predecessor.

AV Protection 2012 screenshot:




AV Protection 2012 manual removal directions:
Delete infected files:
%AppData%\{random}\
%AppData%\ldr.ini
%AppData%\svhostu.exe
%AppData%\{random}\AV Protection 2012.ico
Delete infected registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run “{random}.exe”
HKEY_CURRENT_USER\Software\AV Protection 2012

Tuesday, November 22, 2011

Remove Win32/Cycbot.G and its own malicious antispyware

Win32/Cycbot.G has become notorious due to its installing its own antispyware. The antispyware it installs is virus-friendly and fake. It only can disable genuine security solution, and is harmless for real infections.
Example of phony antispyware names promoted by the trojan includes such common knowledge counterfeits as ThinkPoint, family of fake Microsoft Security Essentials alerts, Windows Simple Protector
Payload of the infection is not limited to fake antimalware promotion only. There are yet a dozen of tasks the malware is dedicated to. Hence removal of Win32/Cycbot.G is important not just as a prevention of pretended antivirus.
Click here to start free scan and get rid of Win32/Cycbot.G and the malwares it has already managed to inject into your PC, as well as to repair damage caused by the G-bot.




Win32/Cycbot.G manual removal guide:
Delete infected files:
%AllUsersProfile%\Application Data\~
%AllUsersProfile%\Application Data\~r
%AllUsersProfile%\Application Data\.dll
%AllUsersProfile%\Application Data\.exe
%AllUsersProfile%\Application Data\
%AllUsersProfile%\Application Data\.exe

Delete infected registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “.exe”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “CertificateRevocation” = ’0′
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnonBadCertRecving” = ’0′

Removal of W32.VBNA.b –TDSS based infection extermination

W32.VBNA.b (Worm.Win32.VBNA.b) is a multi-component detection. Its installation consists of 7 files, each can be identified separately. It is only due to the fact that they create stable compound the group name is attributed.
The within-group detections are recognized as TDSS variants and trojan loaders. Such detections practice extremely tricky integration into computer system and ability of efficient control for the remote attackers. Moreover, there are multiple points through which such a supervision is executed, because every element of the compound establishes its own communication channel.
Removal of W32.VBNA.b is good to be executed in one move, that is, all its constituents are deleted at once. Click here to run free computer examination and get rid of W32.VBNA.b to prevent and minimize the damage provided for by the malicious infection payload. 



Get rid of Search-results.com hijacker that promotes no-engine keyword search

Search-results.com is just a single instance in the multitude of domains hosting one and same search engine for the worldwide web. Actually, there is no engine in this case, for the search one would get on using such a facility would be a bland of results borrowed from third party engines and websites sponsored by the same hackers that maintain the multitude of misleading search pages, including the one registered with the address specified above.
Removal of Search-results.com is vividly discussed by users. No surprise – the url tends to popup when you least need it as you have just entered search terms into relevant bar of your preferred search assistant such as Google. All the users need to do about the issue is to remove Search-results.com search hijacker, which is the virus that stands behind the scam.
Click here to get your computer memory scanned with free detector of viruses, which is especially good in hijacker detection and extermination, so that Search-results.com removal can be executed by means of deletion of the relevant hijacker.

Search-results.com screenshot:


Search-results.com manual removal:



Try Google Redirect Virus Removal Guide to get rid of Search-results.com hijacker and redirector

We strongly recommend to use Search-results.com removal tool - reliable and safe antimalware and antirootkit solution from world-leading IT Security Lab