Green AV Remove | Remove Green Antivirus 2009



I’m seeing a lot of searches for how to remove the rogue antivirus green AV. It looks like it’s the latest flavor of the minute in the rogue security application crowd. My usual path for removing a rogue antivirus or antispyware application is the same as any other malware, try to get other malware removal software on the system (such as malware bytes antimalware or super antispyware, AVG, spybot etc.) and get them running scans to eliminate it. (Make sure to get updates for the software first.) (Virus Removal Toolkit for links.) If that approach doesn’t get you anywhere then it’s time to find the name of the program file that’s running. It appears that with Green AV to remove it from the running processes you need to kill of the process called gav.exe. You may need to reboot into safe mode, then you can rename (or just delete) the offending program executable…. here’s a suggestion for you.


After booting into safe mode delete or rename C:Program FilesDocuments and SettingsAll UsersApplication DataGAVgav.exe since that’s the main program executable.
Look for mgrdll.exe and delete it and also take out the Application DataGAV folder.

From what I see, for some users they may find GRA instead of GAV for the filename.

Green antivirus 2009 may also go under the name greenav2009.exe in the process manager. Look for anything similar or related to this name if you can’t find one of the items specifically mentioned.

Also if it is named differently than above look to delete or rename the files that you find acting as green av to successfully remove it.

After you have a “foothold” of sorts and have made some progress against a pest like this continue to make sure you get respected malware removal like malware bytes antimalware, sypbot, AVG, etc. on the system and update them, run full scans and test with a few reboots to make sure the baddie doesn’t resurface.

–update–

I’m also now seeing a lot of people referring to this as the Green AV virus – which is fitting as these rogue security applications are as bad as a virus (if not worse than some.)

One path to getting things working again may be to use System Restore to roll back to a a system setting date before Green AV was installed on the system. If you are able to do that, go ahead and download the free tools as mentioned to make sure you clean any remaining files off the hard drive. System restore will not remove all the files from your drive associated with green AV, but it will roll back the registry and other applications that launch at boot back to that point in time which should give you a chance to disinfect.

Related Posts

Blog Traffic Exchange Related Posts
  • So who is behind Windows Police Pro Virus / Rogue Security Software? As I've seen the continuing FLOOD of searches for some way to Remove Windows Police Pro, I've been starting to wonder at the who is behind this particular piece of junk software. These programs aren't written by your average ordinary virus writer, there is really too much spit and polish......
  • How to Remove Eco Antivirus 2010 | Eco Antivirus 2010 Removal Guide Eco Antivirus 2010 is a slight twist (renaming) of the recent Eco Antivirus rogue that has made the rounds. These rogues pretend to be antivirus, or antispyware software, but in reality are not much more than a scam trying to squeeze money out of unsuspecting computer users. These rogue applications......
  • Remove Proof Defender | Proof Defender Removal Proof Defender is another rogue security application that acts and claims to be antispyware/antivirus, but in reality is nothing more than a scam to get your dollars for a program that raises red flags over imaginary viruses and claims to clean them. It's related to the Perfect Defender 2009 family......
Blog Traffic Exchange Related Websites
  • Cloud Computing and Security Concerns Cloud computing has been receiving a lot of press in the IT mainstream media lately and all indications points to it continuing to be a hot topic for some time. Gartner.com stated in an article “Significant innovations in virtualization and distributed computing, as well as improved access to high-speed Internet......
  • File Sharing Applications: Another way to be a victim of identity theft… If you are using a peer-to-peer file-sharing program to download music and videos, you may be a prime candidate for Identity Theft. Applications such as Limewire, Edonkey and numerous others on the Internet may also allow individuals to download personal documents from your computer at will. The issue stems from......
  • Green Electric Hybrid Car There is a revolution going on right now that has many consumers purchasing electric cars, hybrid cars and other green vehicles and cars as a means of increasing the efficiency of their vehicles while decreasing the emissions that their cars create while they are on the road. While one way......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site