Computer Tips -Tech Info



« | »

How to Remove Win Security 360 | Win Security 360 Removal Guide

Win Security 360 is a rogue antivirus application that is promoted through the use of trojans and other malware as well as sites that claim to do malware scans of your computer. Among the things that it will do is schedule itself to run when the system boots and it will perform a scan. The scan will flag normal windows files as virus infected and will want to remove them. This can cause many greater problems than you already have with your system. Please read on for how to remove win security 360.


Among the other things this rogue does while it’s active on a system is that it will terminate programs that are running and claim that they were virus infected and had to be closed, or that they crashed. Here is one of the error messages that you may see:

Application .exe has crashed because of Conficker.Worm Virus.

Infected File:

Potential Risks: Viruses is spreading over your PC and the system status is unsafe. Your service provider may lock you out of internet access, because your PC is potentially harmful.

Viruse’s actions: Steal your personal data and send it to the remote host. Spread between your friends quickly (via internet or storage drives). Send spam and malicious codes from your computer.

They do this to encourage you to purchase their software because as all of these rogues claim, that is the only way you can protect your system against these problems. Please do not fall for this scam.

You may wish to try going to the control panel first and visiting the add/remove programs area and see if it’s possible to uninstall win security 360. It may not be possible, but if it is listed and possible to uninstall it, things will be easier. If it does uninstall, you should follow up with a scan from a malware removal tool (a trusted, reputable tool such as superantispyware or malwarebytes antimalware) and a trusted, reputable antivirus (online scans like housecall from trendmicro are okay, as well as free for home use products like avg, avast, avira, etc.)

There is a link to download Malwarebytes antimalware on my virus removal toolkit page. While you are there you may also wish to download process explorer. It may be useful further in this removal process.

Due to this infection, you may need to download these programs to a usb flash drive using another computer. If that is the case, go ahead and download rkill.com from bleepingcomputer. If you download this, process explorer shouldn’t be needed.

On the affected computer run rkill.com repeatedly to kill off the running processes associated with this rogue. Don’t close windows if the rogue complains about rkill being malware, just keep running copy after copy of rkill.com if need be so that you kill off all of the running processes related to this rogue.

After that, launch malwarebytes antimalware installer and let it run a full scan of the system. (Do not reboot first.) Update and scan after the install and remove anything that is found. After this you will not need to do a manual removal of win security 360.

For your reference here is a listing of files associated with Win Security 360 in case you use a third party (linux for instance) boot disc to try to clean up from win security 360:

%user%Application DataWinSecurity360
%user%Application DataWinSecurity360vlc.dat
%user%Application DataWinSecurity360WinSecurity360.ini
%user%DesktopWin Security 360.lnk
%user%Start MenuProgramsWin Security 360
%user%Start MenuProgramsStartupWin Security 360.lnk
%user%Start MenuProgramsWin Security 360Website.lnk
%user%Start MenuProgramsWin Security 360Win Security 360 Help.lnk
%user%Start MenuProgramsWin Security 360Win Security 360.lnk
%progfiles%WinSecurity360
%progfiles%WinSecurity360sk.lst
%progfiles%WinSecurity360Win Security 360 Help.url
%progfiles%WinSecurity360Win Security 360.url
%progfiles%WinSecurity360WinSecurity360.exe

After this you should have removed win security 360 from your system.

Related Posts

Blog Traffic Exchange Related Posts Blog Traffic Exchange Related Websites
www.pdf24.org    Send article as PDF   

Posted by on January 18, 2010.

Tags: , , , , , , , , , , , ,

Categories: antivirus, malware, remote tech support

« | »




Recent Posts


Pages



Switch to our desktop site