Green AV Remove | Remove Green Antivirus 2009



I’m seeing a lot of searches for how to remove the rogue antivirus green AV. It looks like it’s the latest flavor of the minute in the rogue security application crowd. My usual path for removing a rogue antivirus or antispyware application is the same as any other malware, try to get other malware removal software on the system (such as malware bytes antimalware or super antispyware, AVG, spybot etc.) and get them running scans to eliminate it. (Make sure to get updates for the software first.) (Virus Removal Toolkit for links.) If that approach doesn’t get you anywhere then it’s time to find the name of the program file that’s running. It appears that with Green AV to remove it from the running processes you need to kill of the process called gav.exe. You may need to reboot into safe mode, then you can rename (or just delete) the offending program executable…. here’s a suggestion for you.


After booting into safe mode delete or rename C:Program FilesDocuments and SettingsAll UsersApplication DataGAVgav.exe since that’s the main program executable.
Look for mgrdll.exe and delete it and also take out the Application DataGAV folder.

From what I see, for some users they may find GRA instead of GAV for the filename.

Green antivirus 2009 may also go under the name greenav2009.exe in the process manager. Look for anything similar or related to this name if you can’t find one of the items specifically mentioned.

Also if it is named differently than above look to delete or rename the files that you find acting as green av to successfully remove it.

After you have a “foothold” of sorts and have made some progress against a pest like this continue to make sure you get respected malware removal like malware bytes antimalware, sypbot, AVG, etc. on the system and update them, run full scans and test with a few reboots to make sure the baddie doesn’t resurface.

–update–

I’m also now seeing a lot of people referring to this as the Green AV virus – which is fitting as these rogue security applications are as bad as a virus (if not worse than some.)

One path to getting things working again may be to use System Restore to roll back to a a system setting date before Green AV was installed on the system. If you are able to do that, go ahead and download the free tools as mentioned to make sure you clean any remaining files off the hard drive. System restore will not remove all the files from your drive associated with green AV, but it will roll back the registry and other applications that launch at boot back to that point in time which should give you a chance to disinfect.

Related Posts

Blog Traffic Exchange Related Posts
  • How To Remove Alpha Antivirus (Removal Guide) There is a new rogue among us. It appears that Alpha Antivirus has replaced Personal Antivirus as one of the latest rogue security programs. This particular rogue installs through online "scans" (popups.) The reason I say "scans" is they're essentially animations of a scan (every one that visits the site......
  • How to Remove Guard Pro | Guard Pro Removal Guide Guard Pro is a rogue antivirus application that is promoted through the use of malware and trojan horses. Once it is installed on a system it will run at startup and will scan the computer claiming to find files infected with viruses and finding security problems with your system. It......
  • How to Remove Eco Antivirus 2010 | Eco Antivirus 2010 Removal Guide Eco Antivirus 2010 is a slight twist (renaming) of the recent Eco Antivirus rogue that has made the rounds. These rogues pretend to be antivirus, or antispyware software, but in reality are not much more than a scam trying to squeeze money out of unsuspecting computer users. These rogue applications......
Blog Traffic Exchange Related Websites
  • Cloud Computing and Security Concerns Cloud computing has been receiving a lot of press in the IT mainstream media lately and all indications points to it continuing to be a hot topic for some time. Gartner.com stated in an article “Significant innovations in virtualization and distributed computing, as well as improved access to high-speed Internet......
  • Solidifying WP Security Designed with PHP, and powered by mySQL directories, WordPress is used by an amazing 8.5% of all websites. Web delivered spyware and web page hacking are becoming progressively more common. With such a lot of web content using WordPress as a CMS, any security weaknesses in the CMS structure or......
  • File Sharing Applications: Another way to be a victim of identity theft… If you are using a peer-to-peer file-sharing program to download music and videos, you may be a prime candidate for Identity Theft. Applications such as Limewire, Edonkey and numerous others on the Internet may also allow individuals to download personal documents from your computer at will. The issue stems from......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site