Showing posts with label malware removal. Show all posts
Showing posts with label malware removal. Show all posts

Monday, February 27, 2012

Remove Smart Fortress 2012 Fake Antivirus

Smart Fortress 2012 is a variant of Windows targeting fake. The variant is downloaded under the premise of being a security update.
The workflow of the scam implies introduction of the same trojan into any computer system. Smart Fortress 2012 is even more annoying as it tends to start its processes when user is requesting another program to run. That is, the requested program may be contained by the aggressive infection, and its processes are launched instead.
Another peculiarity of the program is its attempts to show fake firewall alert whenever user is trying to open web-browser or in the middle of web-surfing.
All those tricks are meant to persuade user into purchasing the self-announced automatic update, which is, in the actuality, a piece of adware that sets up a number of annoying restrictions.
To remove Smart Fortress 2012 adware for free, apply manual instructions that cover the parasite entirely so that both restrictions and popups are eliminated or download free automated removal tool.


Smart Fortress 2012 screenshot:



Thursday, May 19, 2011

Remove Security Center (SecurityCenter) rogue anti-spyware

Security Center (SecurityCenter) does not sound as a name that is vacant, for it is one of the first denominations that would occur to most of the people, if they were asked to invent a name for computer system security solution.
Therefore two unrelated programs co-exist under this name. Both of them are rogue security tools, both do not secure computer systems a bit.
One of them was detected in 2009. Two years is too long period for fake antispyware so that it has long since been eliminated.  The 2009 detection was found to be created from already existing malware, Privacy Components.
This article is rather to warn you of 2011 release of malware under this name, as well as to provide you relevant Security Center removal method.
The 2011 release is a member of a large number fake antispyware family that includes such notorious counterfeits as Internet Security, Antimalware Defender, Internet Protection.
Most likely, if you have got adware under such name, you need to get rid of Security Center of 2011 year of origin – click here to start free scan in order to cover both 2009 and 2011 threats under the single name above, as well as to disinfect your computer system according to the scan results.



Security Center screenshot:



Security Center remover download:


Security Center removal info:
Delete infected files:
%AllUsersProfile%\Application Data\[random].dat
%AllUsersProfile%\Application Data\[random].ico
%UserProfile%\Application Data\Microsoft\Internet Explorer\Quick Launch\SecurityCenter.lnk
%UserProfile%\Desktop\Security Center.lnk
%Temp%\ins2.tmp
%Temp%\mv3.tmp
%Temp%\wrk4.tmp
Delete infected registry entries:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List “C:\WINDOWS\system32\rundll32.exe” = ‘C:\WINDOWS\system32\rundll32.exe:*:Enabled:Security Center’
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “[random]“

Wednesday, May 11, 2011

Get rid of Mal/TDSSconf-A as yet another TDSS variant

Mal/TDSSconf-A is another variant of TDSS rootkit. Rootkits of this family are widely applied to protect software products of counterfeited quality and to subvert host system replacing original system loader by the loader installed by remote attacker.
It may be also detected as a modification of Alureon rootkit.
The rootkit payload is not limited by any margins, if it manages to establish a connection to remote server.  It may be used as a basement for more complex payload threats and be a part of a large-scale scam.
This modification is suspected to participate in massive attacks on major world bank servers acting through infected machines, which are used by users in online banking.
Removal of Mal/TDSSonf_A is case-specific and is subject to the degree of the rootkit influence on computer systems. To prevent the rootkit deletion failure, click here to get rid of Mal/TDSSconf-A  applying verified way of the rootkit extermination.

Mal/TDSSconf-A remover: