Showing posts with label get rid of fake antivirus. Show all posts
Showing posts with label get rid of fake antivirus. Show all posts

Monday, July 11, 2011

Removal of Windows Armour Master virus

Windows Armour Master shares backdoors installer with rootkits and other annoying and destructive programs, which means it may be introduced in a bundle with other threats or be merely independent part of extended infection delivery.
The way of its delivery does not confuse the program and it promptly announces installation of automatic security update. It also tries to make computer system launch installation wizard, but rarely succeeds in that effort.
It is not that the above way is the only possible route for the program to enter computer system, but seems to be the most unfair one.
Other methods are in place, too, but seem to be, so to say, less rascally.
Get rid of Windows Armour Master and viruses that came in one kit into your computer system, if such installation have actually had place. Reliable tool to remove Windows Armour Master and any kind of or viral, wormlike, other kind threats, is ready for free download here.

Windows Armour Master snapshot:




Manual removal guide:
Delete infected files:
%UserProfile%\Application Data\Microsoft\[random].exe
Delete infected registry entries:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe “Debugger” = ‘svchost.exe’
 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe “Debugger” = ‘svchost.exe’
 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe “Debugger” = ‘svchost.exe’
 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe “Debugger” = ‘svchost.exe’
 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe “Debugger” = ‘svchost.exe’
 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe “Debugger” = ‘svchost.exe’
 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe “Debugger” = ‘svchost.exe’
 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe “Debugger” = ‘svchost.exe’
 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnOnHTTPSToHTTPRedirect” = ’0′
 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings “WarnOnHTTPSToHTTPRedirect” = ’0′

Thursday, July 7, 2011

Remove Windows Search Supervisor that disables popular apps

Windows Easy Supervisor tracks back user’s activities to find out which programs are used most frequently. Then it attempts to block them. Whether it succeeds to accomplish its design or not, here comes a message explaining that the program is corrupted or that something is  going wrong, and due to that reason running the application of your choice is not possible.
Remove Windows Search Supervisor that plots system malfunctioning to make its alerts sound credible. According to the assessment by the fake security tool in question which does not vary from PC to PC, any computer system is infected with at least several dozens of viruses. The assessment is not based on any scan performed and merely a list of names retrieved from databases of genuine security tools.
If you scan your computer system infected with the counterfeit by true scanner and it finds one or more viruses detected by the fake scanner, this is merely a coincidence. As a matter of fact, there are many virus names, but many of them are variations of a single generic name. So do not get confused if the free scanner available here will find one or few threats, which are the same or similar to fake detections by the adware.
Among the findings reported by reliable security tool there will be the fake antivirus too, under appropriate detection name. The scanner available here will invite you to get rid of Windows Search Supervisor once the scan is completed and scan report generated.

Windows Search Supervisor snapshot:

 
 

Manual removal guide:
Delete Windows Search Supervisor infected files:
%UserProfile%\Application Data\Microsoft\.exe
Deelete infected registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe "Debugger" = 'svchost.exe'
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = '0'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = '0'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore "DisableSR " = '1'

Wednesday, July 6, 2011

Remove Anti-Malware Lab fake security system

Anti-Malware Lab is a fake security system that states that the files of its own creation are malicious. It is understandable that the program would not let user know that it finds its own files malicious.
When the program is installed into computer system, a dozen of files are created which the program then detects as computer threats. Needless to say, the threats detected in such a way are merely junk files.
In addition to detecting the above intentional false positives, the program reports it is  successfully blocking invasion of hostile programs or that unauthorized program has been blocked from accessing your PC remotely.
The most frequently wording used in the alerts generated by the fake antispyware is “potentially harmful program”. The fake scurrility tool states that you urgently need to further investigate the potential malware or else it might badly  endamage computer system.
In fact, you need to get rid of Anti-Malware Lab at the earliest opportunity or else it  might badly disorder computer system and, due to the lack of protection,  a computer system might be infected with extra viruses and get deteriorated. Click here to start free scan and carry out Anti-Malware Lab removal at the earliest opportunity.

Anti-Malware Lab and related trojan Win32.Dripper popups snapshots:





Anti-Malware Lab manual removal guide:
Get rid of infected files:

C:\ProgramData\b3a2c8
 C:\ProgramData\b3a2c8\PSGSys
 C:\ProgramData\b3a2c8\Quarantine Items
 C:\ProgramData\b3a2c8\DMg4a_358.exe
 C:\ProgramData\b3a2c8\PSG.ico

Get rid of infected registry entries:
 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Anti-Malware Lab
 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Anti-Malware Lab"
 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options "Debugger" = "svchost.exe"
 HKEY_CLASSES_ROOT\Software\Microsoft\Internet Explorer\SearchScopes\URL http://findgala.com/?&uid=247&q={searchTerms}

Monday, July 4, 2011

Remove Windows Vista Repair virus

Windows Vista Repair virus has been found to have in its procession several components borrowed from existing viruses. Those parts of the program are used to facilitate its introduction. That is, viral and wormlike methods are applied to spread copies of the program, which imitates a struggle against worms and viruses. If the program was a real rival to worms and viruses, it would self-destroy on the firs instance.
Once installation of the program is successfully executed, the adware sends a report to remote computer, or at least such attempt is made. In case a computer system compromised by Windows Vista Repair is protected to some extent, it may block such communication and even notify user that so and so executable behaves suspiciously and it is recommended for quarantining.
Get rid of Windows Vista Repair or else it will sink you in the endless flow of misleading notifications. The idea of those notifications is that your computer system is on the edge and soon fall down, unless you entrust licensed version of the above program to heal it.
Click here to heal your computer system removing Windows Vista Repair and running free scan to detect and exterminate other infections. 

Windows Vista Repair snapshot:




Manual removal guide:
Delete infected files:
%AllUsersProfile%\
%AllUsersProfile%\.exe
%AllUsersProfile%\~
%AllUsersProfile%\~
%StartMenu%\Programs\Windows Vista Repair\
%StartMenu%\Programs\Windows Vista Repair\Uninstall Windows Vista Repair.lnk
%StartMenu%\Programs\Windows Vista Repair\Windows Vista Repair.lnk
Delete infected registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ".exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ""
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "CertificateRevocation" = '0'
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnonBadCertRecving" = '0'
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop "NoChangingWallPaper" = '1'
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations "LowRiskFileTypes" = '/{hq:/s`s:/ogn:/uyu:/dyd:/c`u:/bnl:/ble:/sdf:/lrh:/iul:/iulm:/fhg:/clq:/kqf:/`wh:/lqf:/lqdf:/lnw:/lq2:/l2t:/v`w:/rbs:'
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments "SaveZoneInformation" = '1'
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = '1'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "DisableTaskMgr" = '1'
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download "CheckExeSignatures" = 'no'
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main "Use FormSuggest" = 'yes'
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced "Hidden" = '0'
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced "ShowSuperHidden" = 0'

Removal of Windows Debugging Agent misleading reports

Windows Debugging Agent blends three categories of detections in one misleading informational attack on users.
It detects as viruses harmless files which make a part of its installation. They usually  make  a small portion of the total infections it detects.
The second category infections are actually detected by free online scanner, which  facilities are used by the tricky program in a hush mode. The number of infections detected by online scanner is usually even lesser than the number of harmless files installed as a part of Windows Debugging Agent and then detected as viruses.
The third category detections are pure falsifications as these are merely names unrelated to any object. As a rule, they make bigger portion of reported infections than the two above categories together.
Get rid of Windows Debugging Agent as a misleading program, for even the detections that actually happen  are reported in misleading way as their real detector is a free online antivirus. The online antivirus, though not misleading,  is rather a limited functionality  outdated tool as it is not able to Windows Debugging Agent as adware when scanning computer system.
Click here to run free scan in order to detect all the infections, including  latest releases, and remove Windows Debugging Agent as its extermination is important part of system disinfection.

Windows Debugging Agent snapshot:



Windows Debugging Agent removal instructions:
Delete infected files:
%UserProfile%\Application Data\Microsoft\.exe
Delete infected registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe "Debugger" = 'svchost.exe'
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = '0'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnHTTPSToHTTPRedirect" = '0'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion

Thursday, June 23, 2011

Removal of Vista Security 2012 unwanted deceptive scan

Vista Security 2012 is known to be chiefly distributed through its website, which, in its turn, is popularized by means of spam ads, flood ads, browser hijacking, online ads.
Hackers do not spare effort to draw visitors to the pages dedicated to the program.  As a rule, the very process of attracting visitors to websites advertising the software is tricky and should make potential downloader of the scamware alert.
However, the number of victims that installed the program with their own hands is great and keeps growing.
For those refusing to manually install the unwanted program there is another trap, namely backdoor introduction of the software. The backdoor introduction is performed by special program of trojan or worm type.
Whether installed by users or by trojan or worm carrier, remove Vista Security 2012, for it performs virtually the same set of actions in both cases. That is, the software pretends to scan computer system and draws user’s attention to inexistent threats.
Click here to start free scan in order to detect infections that do exist and get rid of Vista Security 2012 as one of such threats.


Vista Security 2012 interface snapshot:



Uninstaller download:


Manual removal guide:
Delete infected files:

%AllUsersProfile%\Application Data\u3f7pnvfncsjk2e86abfbj5h
%LocalAppData%\kdn.exe

%LocalAppData%\u3f7pnvfncsjk2e86abfbj5h

%Temp%\u3f7pnvfncsjk2e86abfbj5h

%UserProfile%\Templates\u3f7pnvfncsjk2e86abfbj5h
Delete infected registry entries:

HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\BrowserEmulation “TLDUpdates” = ‘1′
HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command “(Default)” = ‘”%LocalAppData%\kdn.exe” -a “%1″ %*’

HKEY_CURRENT_USER\Software\Classes\exefile\shell\open\command “(Default)” = ‘”%LocalAppData%\kdn.exe” -a “%1″ %*’

HKEY_CLASSES_ROOT\.exe\shell\open\command “(Default)” = ‘”%LocalAppData%\kdn.exe” -a “%1″ %*’

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command “(Default)” = ‘”%LocalAppData%\kdn.exe” -a “C:\Program Files\Mozilla Firefox\firefox.exe”‘

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command “(Default)” = ‘”%LocalAppData%\kdn.exe” -a “C:\Program Files\Mozilla Firefox\firefox.exe” -safe-mode’

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command “(Default)” = ‘”%LocalAppData%\kdn.exe” -a “C:\Program Files\Internet Explorer\iexplore.exe”‘

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center “AntiVirusOverride” = ‘1′

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center “FirewallOverride” = ‘1′