Monday 18 November 2013

Do you wonder whether My Safe PC 2014 is legit or not? Are you searching for the methods to get rid of this unwanted antivirus program? If you don’t know how to deal with this program, read this post and learn how to remove My Safe PC 2014 fully.

What is My Safe PC 2014?

My Safe PC 2014 is a rogue anti-spyware program from the family of computer infection, which displays false scan results and fake security alerts, tricking users into believing that their computers are infected by hundreds of threats. This program is mainly distributed through hacked web sites that redirect you to fake online scanners that state you are infected. When the fake scan is finished, you will be prompted to download and install this product to clean your computer. Don’t download this program because it does no good to your system and only aims to rip off your money. The purpose of it is to convince inexperienced computer users that they need to purchase a ‘full version’ of this bogus security program. It not only displays fake security alerts, but also blocks access to your applications and interferes with legitimate security software installed on your computer system. That’s why some programs on your computer cannot work properly. You may fail to delete it via Control Panel because this rogue program can hide its malicious files deeply on the PC.
Once it installs itself on the computer, you will see the following alerts:
“My Safe PC 2014 Firewall Alert notepad.exe is infected with Trojan-GameThief.Win32.Nilage.ipj Private data can be stolen by third parties, including credit card details and passwords.”
 “Security Alert Vulnerabilities Found Background scan for security breaches has been finished. Serious problems have been detected. Safeguard your system against exploits, malware and viruses right now by activating Proactive Defence. Upgrade to full version of My Safe PC 2014 software package now! Clean your system and ward off new attacks against your system integrity and sensitive data. FREE daily updates and online protection from web-based intrusions are already in the bundle.”
 “System Security Alert Unknown program is scanning your system registry right now! Identity theft detected.”

How to get rid of My Safe PC 2014 step by step?

Step 1. Open the fake antivirus program, click on the Registration button in the right top corner, then enter the below registration code.
Activation Code: ?O?Z?L?W?I?T?F?Q?C?N?Y?K?V?H?S?E
Step 2. Delete files of the program. Open Folder Options by clicking the Start button, clicking Control Panel, clicking Appearance and Personalization, and then clicking Folder Options. Click the View tab. Under Advanced settings, click Show hidden files and folders, uncheck Hide protected operating system files (Recommended) and then click OK.
Search for the files below and delete the following files. %CommonAppData%\pavsdata\ %CommonAppData%\pavsdata\app.ico %CommonAppData%\pavsdata\cache.bin %CommonAppData%\pavsdata\idfdata.bin %CommonAppData%\pavsdata\security_defender.exe
%CommonAppData%\pavsdata\support.ico %CommonAppData%\pavsdata\uninst.ico %CommonStartMenu%\Programs\My Safe PC 2014\ %CommonStartMenu%\Programs\My Safe PC 2014\My Safe PC 2014 Help and Support.lnk %CommonStartMenu%\Programs\My Safe PC 2014\My Safe PC 2014.lnk %CommonStartMenu%\Programs\My Safe PC 2014\Remove My Safe PC 2014.lnk
%Desktop%\My Safe PC 2014.lnk
Step 3. Remove the registry entries of the malicious program. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\pavsdata HKEY_CURRENT_USER\Software\Classes\.exe "(Default)" = "4g" HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command "(Default)" = ""%CommonAppData%\pavsdata\security_defender.exe" /ex "%1" %*" HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "avsdsvc" = "%CommonAppData%\pavsdata\security_defender.exe /min"
With the steps above, you can uninstall My Safe PC 2014 effectively. If you don’t want to spend much time deleting the malicious files and registry entries, use a third-party removal to get rid of the unwanted program automatically and quickly.

Friday 1 November 2013

Trojan horse ZeroAccess.UG Removal Instructions

Infected by Trojan horse ZeroAccess.UG but don’t know how to delete it? Your computer performance becomes slower and slower? If your PC is attacked by that cyber threat, please take action immediately and find out solutions to Trojan horse ZeroAccess.UG removal in time. The instructions in this post can help you get rid of the threat successfully.

Description of Trojan horse ZeroAccess.UG

Trojan horse ZeroAccess.UG is a new computer infection designed to invade your computer and collect the confidential information. How can it spread? The infection is mainly distributed through malicious websites, insecure freeware shared on the Internet or spam emails. It usually pretends to be harmless program or tempting content which misleads you and attracts you to download or click on it. If you visit the unsafe websites or click on links in the junk emails, the infection can have a chance to sneak into the PC. It can evade the removal of security programs, so the antivirus program cannot completely delete it. The alerts about this infection will still pop up every time Windows starts.
Once installed on your PC, the trojan will perform many evil activities to mess up the infected PC. It modifies the system registry entries and enables to run automatically every time you start up computer. It may consume high CPU and memory and lead to very slow PC performance. Some programs cannot run normally because they are blocked by the infection. It may hijack the Internet browser and redirect you to malicious websites. Other cyber threats can be added to your compromised PC. What’s worse is that hackers can access you system and steal your personal information, for the trojan can open a backdoor to the system. Therefore, you need to delete the threat as soon as possible.

How to delete Trojan horse ZeroAccess.UG manually step by step?

Step 1. End malicious processes of the trojan in Task Manager. Press Ctrl + Alt + Delete or Ctrl + Shift + Esc together to open Task Manager, search for the processes related to the threat and click End Process to terminate them. [random].exe
Step 2. Delete the files of the threat. Click Start, go to Control Panel and go to Folder Options. In the Folder Options window, click on View tab, check Show hide files and folders and uncheck Hide protected operating system files. Then click OK. The hidden and protected files will be showed. Search for and delete the files below.
%AllUsersProfile%\random.exe
%AppData%\Roaming\Microsoft\Windows\Templates\random.exe
%Temp%\random.exe
%AllUsersProfile%\Application Data\.dll
Step 3. Clear the registry entries created by the infection.
Click Start, point to Run, type regedit in the box and click OK. The Registry Editor will open. In the Registry Editor, search for and remove the registry entries below. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = 0 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “ConsentPromptBehaviorAdmin” = 0 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run “random ” HKEY_CURRENT_USER\Software\Microsoft\Installer\Products\random
Suggestion: If you are not an advanced computer user, it is not suggested that you remove Trojan horse ZeroAccess.UG with the steps above manually. Since the files and registry entries may be different based on different operating systems, you may delete the wrong registry entries if you don’t know much about computer. Therefore, you need to ask for computer experts for help or use a professional removal tool to clear the trojan automatically and quickly.