How to Remove Antivirus 360



This should not be confused with Norton 360 which is a legitimate antivirus program (although if you need help removing Norton 360 to reinstall it or another antivirus program you may want to visit my antivirus removal tool list.)

What we are talking about this time is a rogue security application known as Antivirus 360. Like many other rogue security applications (wolves in sheeps clothing as I used to call them), Antivirus 360 may have installed itself on your system by way of a security flaw in your browser or some other less than admirable method. Such avenues include aggressive popup ad advertising after a system is infecting with a trojan such as vundo. It seems to be the successor to the Antivirus 2009 rogue application.


Among the things it does after install is popup and run after the system reboots and claims to find infected files which may actually be legitimate windows files. If a user follows through and manually deletes these files they will have a very badly damaged windows install.

C:WindowsSystem32svchost.exe
C:WindowsSystem32alg.exe

The above files are some legitimate windows files that antivirus 360 claims are infected.

It also raises multiple bogus security alerts.

For this software, you may want to download malwarebytes antimalware (take a look at my virus removal toolkit page.)

You may be able to get malwarebytes antimalware installed and updated and then just let it run a scan and clean up any files that it finds. If however the system is too sluggish and obstinate with this pest of antivirus 360 you may need to undertake some manual removal steps.

To manually remove you will first want to kill off any running processes in task manager that resemble Antivirus 360. AV360.exe is the name that this application runs under. Then you can look at removing the following files:

%ProgramFiles%A360
%ProgramFiles%A360av360.exe
%User%Application DataMicrosoftInternet ExplorerQuick LaunchAntivirus 360.lnk
%User%DesktopAntivirus 360.lnk
%User%Start MenuAntivirus 360
%User%Start MenuAntivirus 360Antivirus 360.lnk
%User%Start MenuAntivirus 360Help.lnk
%User%Start MenuAntivirus 360Registration.lnk

There are a couple registry keys with a long string of random numbers created at
HKEY_CURRENT_USERSoftware
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun

It’s best to avoid the registry edit and after the deletion of the files run malwarebytes anti-malware to clean things up and make certain everything is clean.

Related Posts

Blog Traffic Exchange Related Posts
  • How to Remove AntiMalware | Antimalware Removal Guide Antimalware is the name of a particularly interesting rogue antivirus and rogue antimalware application. One tip off that it is a rogue application is that one of it's first actions is the attempted removal of the following trusted and legitimate antivirus, security and antimalware applications: AVG, Nod32, Agnitum, Sophos, Avira,......
  • How to Remove Personal Security | Personal Security Removal Guide Personal Security is a rogue antivirus application that comes from the same (dreaded) family as the Cyber Security rogue. It usually installs on the users computer without the permission of the computer user. Once installed on the system it will then perform supposed scans finding lots of virus infected files......
  • Total Security Antivirus Removal Total Security Antivirus is another rogue security application that poses as legitimate antivirus software to dupe people into installing and then paying for it. It is related to Antivirus 360 and is perhaps the followup software from the same group. This particular pest is possibly installing itself onto systems by......
Blog Traffic Exchange Related Websites
  • Microsoft Security Bulletin MS10-046 - Critical Microsoft Security Bulletin MS10-046 - Critical Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198) Published: August 02, 2010¬†|¬†Updated: August 03, 2010 Version: 1.1 General Information Executive Summary This security update resolves a publicly disclosed vulnerability in Windows Shell. The vulnerability could allow remote code execution if the icon......
  • Twitter is facing faliure of Timeline Cache I'm seeing this on Twitter's homepage for the last 1 hour, since I logged in. Then, I checked status.twitter.com, and found out that Twitter is facing failed enhancement of a new approach to timeline caching. Twitter's engineers are currently working to resolve this issue. ETA is not yet available. I......
  • WordPress 2.8.6 released Wow, WordPress 2.8.5 was released only three short weeks ago. So what's the deal? Well, it looks like just another "recommended" security release that addresses two issues: Security problem for logged in users with posting privileges. If you are the only author and/or really trust all other authors, this doesn't......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

No Responses to “How to Remove Antivirus 360”

  1. Spyware Removal Program Says:


    Spyware Removal Program…

    Red Condor had warned email users that there is a new virus circulating nowadays that goes undetected in most anti- virus softwares. The virus is emailed in disguise as a response to an advertisement on Craigslist where it is embedded. Red Condor had d…


Switch to our mobile site