How to Remove Win Security 360 | Win Security 360 Removal Guide



Win Security 360 is a rogue antivirus application that is promoted through the use of trojans and other malware as well as sites that claim to do malware scans of your computer. Among the things that it will do is schedule itself to run when the system boots and it will perform a scan. The scan will flag normal windows files as virus infected and will want to remove them. This can cause many greater problems than you already have with your system. Please read on for how to remove win security 360.


Among the other things this rogue does while it’s active on a system is that it will terminate programs that are running and claim that they were virus infected and had to be closed, or that they crashed. Here is one of the error messages that you may see:

Application .exe has crashed because of Conficker.Worm Virus.

Infected File:

Potential Risks: Viruses is spreading over your PC and the system status is unsafe. Your service provider may lock you out of internet access, because your PC is potentially harmful.

Viruse’s actions: Steal your personal data and send it to the remote host. Spread between your friends quickly (via internet or storage drives). Send spam and malicious codes from your computer.

They do this to encourage you to purchase their software because as all of these rogues claim, that is the only way you can protect your system against these problems. Please do not fall for this scam.

You may wish to try going to the control panel first and visiting the add/remove programs area and see if it’s possible to uninstall win security 360. It may not be possible, but if it is listed and possible to uninstall it, things will be easier. If it does uninstall, you should follow up with a scan from a malware removal tool (a trusted, reputable tool such as superantispyware or malwarebytes antimalware) and a trusted, reputable antivirus (online scans like housecall from trendmicro are okay, as well as free for home use products like avg, avast, avira, etc.)

There is a link to download Malwarebytes antimalware on my virus removal toolkit page. While you are there you may also wish to download process explorer. It may be useful further in this removal process.

Due to this infection, you may need to download these programs to a usb flash drive using another computer. If that is the case, go ahead and download rkill.com from bleepingcomputer. If you download this, process explorer shouldn’t be needed.

On the affected computer run rkill.com repeatedly to kill off the running processes associated with this rogue. Don’t close windows if the rogue complains about rkill being malware, just keep running copy after copy of rkill.com if need be so that you kill off all of the running processes related to this rogue.

After that, launch malwarebytes antimalware installer and let it run a full scan of the system. (Do not reboot first.) Update and scan after the install and remove anything that is found. After this you will not need to do a manual removal of win security 360.

For your reference here is a listing of files associated with Win Security 360 in case you use a third party (linux for instance) boot disc to try to clean up from win security 360:

%user%Application DataWinSecurity360
%user%Application DataWinSecurity360vlc.dat
%user%Application DataWinSecurity360WinSecurity360.ini
%user%DesktopWin Security 360.lnk
%user%Start MenuProgramsWin Security 360
%user%Start MenuProgramsStartupWin Security 360.lnk
%user%Start MenuProgramsWin Security 360Website.lnk
%user%Start MenuProgramsWin Security 360Win Security 360 Help.lnk
%user%Start MenuProgramsWin Security 360Win Security 360.lnk
%progfiles%WinSecurity360
%progfiles%WinSecurity360sk.lst
%progfiles%WinSecurity360Win Security 360 Help.url
%progfiles%WinSecurity360Win Security 360.url
%progfiles%WinSecurity360WinSecurity360.exe

After this you should have removed win security 360 from your system.

Related Posts

Blog Traffic Exchange Related Posts
  • How to Remove AntiTroy | AntiTroy Removal Guide AntiTroy is a rogue antivirus application that is usually installed through trojans that are masquerading as a video codec update or flash player update. It usually installs without the computer users permission and will complain about many security issues with your pc. It will claim that there are virus infected......
  • Remote Tech Support with x11vnc and wrapper script So, the idea is that I wanted something "like" the Ultranvnc Single Click download, only for linux. The main idea being is that if someone is looking for a bit of desktop tech support on linux, we don't need to be giving instructions for 5 different package managers, or source......
  • Remote Tech Support using VNC (Ultravnc SC and x11vnc+wrapper script) Ok, some time back I'd done a writeup on UltraVNC SC, which is a nice customizable (windows version) VNC server that essentially let's someone doing remote support build their own downloadable .exe that runs and automatically tries to make a direct connection to a "listening" vnc viewer. It's good for......
Blog Traffic Exchange Related Websites
  • Gators Top Troy with 56 to 6 on Saturday The Florida senior quarterback, our favorite allstar Tim Tebow managed to throw a total of four touchdowns, rushing for another as the No. 1 team Gators chalked their second win for the season, their 12th straight win after claiming 56 to 6 against the Troy Trojans who are currently......
  • Eastern Division Florida Gators vs Western Division Alabama On December 5, 2009, the Eastern Division Florida Gators will face Western Division Alabama at the Georgia Dome in Atlanta, GA. This will be the 7th time since the championship began in 1992 that Alabama and Florida had met for this game. Of the 6 match ups to date,......
  • iPhone Jailbreaking: Security Concern or Not? Charlie Miller of Tipb.com stated, “Turns out that if you jailbreak your iPhone you remove most of the Apple’s security protections — 80% to be exact — and are vulnerable to attacks.” That statement seems to resonate across the cell phone app community when discussing the adverse effects of......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site