Your PC Protector Removal Guide



See these Forums for Guides/Assistance

********************************************************************************************************************************

Statement From the Editor

If you have a question, ask in comment area, no sign in required

Click the Pic’s to Visit the Sites!

Read each guide at all links before starting the removal process so that you will know exactly what steps to take and which removal process is best for your issue

********************************************************************************************************************************

Your PC Protector is a rogue anti-spyware program that uses aggressive techniques to stop your from removing it from your computer. This malware is installed via Trojans that install it on to your computer without permission. Once installed the rogue will attempt to stop you from running any executable programs and will display an alert when you run them stating that the program is infected. It will also automatically restart itself via a Windows service every time you shut down the process, so you will need to shutdown both the service and the rogue process to stop it from being restarted.

It is possible that the infection you are trying to remove will not allow you to download files on the infected computer. If this is the case, then you will need to download the files suggested in this guide to another computer and then transfer them to the infected computer via a CD/DVD, external drive, or USB flash drive. If this is not possible, see the <<RescueCD Software>> section on home page.

Step 1.

Bleeping Computer’s Your PC Protector (Uninstall Guide)

RKill – What it does and What it Doesn’t – A brief introduction to the program

Rkill Download Links

Rkill.com
Rkill.exe

iExplore.exe

rkill.pif

rkill.scr

uSeRiNiT.exe

WiNlOgOn.exe

#1. do not turn off computer until after running Malwarebytes when using rkill or the process will have started again and you will have to start over.

#2. DO NOT USE ON A CLEAN COMPUTER as it could damage certain legit security programs. Disable all security software if possible to run

#3.Vista and Windows 7 users, right click and click run as administrator.

Disable security software before using rkill

How To Temporarily Disable Your Anti-virus, Firewall And Anti-malware Programs

Malwarebytes’ Tutorial *****by Bleeping Computer

Microsoft How to Get Rid of Malware

********************************************************************************************************************************

Rootkit Removal

How to Remove the TDSS,TDL3, or Alureon rootkit using TDSSKiller

Or ***Gmer***for rootkit’s

or*** HitmanPro***RootkitRevealer

Bleeping Computer’s    RootkitList

********************************************************************************************************************************

If no luck See

Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help

OR

I’m infected – What do I do now?

Complete all the steps you can and post new HERE

********************************************************************************************************************************

The tools needed for this removal are:

ATF For cleaning of Temp Files &the Java cache

See Screenshots

<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>

Malwarebytes’ Anti-Malware

Please download Malwarebytes’ Anti-Malware to your desktop.

Click the Free Version

  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to the following:
    • Update Malwarebytes’ Anti-Malware
    • Launch Malwarebytes’ Anti-Malware
  • Then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is checked, and click Remove Selected.

See the Tutorial for specific instructions.

Malwarebytes’ Tutorial

If Malwarebytes’ will not install see*****HERE*****

Or*****HERE*****

When Malwarebytes’ will not run see*****HERE*****

Common Issues,Questions,and their Solutions

Step 2. If Needed

<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>

SUPERAntiSpyware Tutorial

When SUPERAntiSpyware will not install or run see*****HERE*****

SUPERAntiSpyware Online Safe Scan

SUPERAntiSpyware Portable Scanner can be downloaded from a different computer and run on the infected computer. The scanner does NOT install anything on your Start Menu or Program Files and does NOT need to be uninstalled. It runs from the CD and requires NO internet connection. If the infected computer can not download, then this is a solution. Simply download the portable scanner and copy it to a USB/CD. NOTE: The portable scanner is random named to prevent the malware from stopping the scanner from running. For more software similar to this see the RescueCD software section on home page which scan an infected system and can recover personal data due to infection/defective or failing hard drive.

******************************************

Dr.Web CureIt!

**************************************

Ccleaner for a good clean-up

Screenshots

<<<<<<<<<<>>>>>>>>>>

Step 3.

Uninstall all Adobe software and Java and install the latest versions

Adobe—>HERE

******************************

Use JavaRa to clean out old versions of Java>HERE

Then look for the following Java folders and if found delete them.


C:\Program Files\Java
C:\Program Files\Common Files\Java
C:\Windows\Sun
C:\Documents and Settings\All Users\Application Data\Java
C:\Documents and Settings\All Users\Application Data\Sun\Java
C:\Documents and Settings\username\Application Data\Java
C:\Documents and Settings\username\Application Data\Sun\Java

Then install new Java—>HERE

  • After the install is complete, go into the Control Panel (using Classic View) and double-click the Java Icon. (looks like a coffee cup)
    • On the General tab, under Temporary Internet Files, click the Settings button.
    • Next, click on the Delete Files button
    • There are two options in the window to clear the cacheLeave BOTH Checked
        Applications and Applets
        Trace and Log Files
    • Click OK on Delete Temporary Files Window
      Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
    • Click OK to leave the Temporary Files Window
    • Click OK to leave the Java Control Panel.

To test your Java Run-time, you may go to this page HERE

**************************************************************************************************

Step 4

Clean System Restore

Four steps to this. #1. Have your antivirus open and set to full scan and running. #2. Turn off system restore. #3. Launch ATF and clean until “No Files Cleaned”. #4. When scan is finished, turn system restore back on and create a restore point.

NOTE: Make sure that your computer is clean before taking these steps.

See below for instructions on how to use System Restore.

XP

VISTA

WINDOWS 7

************************************************************************************************************************

NOTE
If you are having problems connecting your computer to the Internet after removing malware or spyware,

Try this Winsock Fix

************************************************************************************************************************

If you are still having issues see

When should I re-format?

Virut and other File infectors-Throwing in the Towel?

VMSAR Virus/Rogue Removal Guide

How to Start Windows in Safe Mode

How to use the Task Manager

How to use the Microsoft Malicious Software Removal Tool

How to Install, reinstall, or uninstall Windows

********************************************************************************************************************************

Manual Removal Section: Caution, a mistake here could cause operating system failure  😦

Your Pc Protector Associated Files:

c:\Program Files\adc32.dll
c:\Program Files\alggui.exe
c:\Program Files\nuar.old
c:\Program Files\skynet.dat
c:\Program Files\svchost.exe
c:\Program Files\wp3.dat
c:\Program Files\wp4.dat
c:\Program Files\schtml
c:\Program Files\schtml\dbsinit.exe
c:\Program Files\schtml\wispex.html
c:\Program Files\schtml\images
c:\Program Files\schtml\images\i1.gif
c:\Program Files\schtml\images\i2.gif
c:\Program Files\schtml\images\i3.gif
c:\Program Files\schtml\images\j1.gif
c:\Program Files\schtml\images\j2.gif
c:\Program Files\schtml\images\j3.gif
c:\Program Files\schtml\images\jj1.gif
c:\Program Files\schtml\images\jj2.gif
c:\Program Files\schtml\images\jj3.gif
c:\Program Files\schtml\images\l1.gif
c:\Program Files\schtml\images\l2.gif
c:\Program Files\schtml\images\l3.gif
c:\Program Files\schtml\images\pix.gif
c:\Program Files\schtml\images\t1.gif
c:\Program Files\schtml\images\t2.gif
c:\Program Files\schtml\images\Thumbs.db
c:\Program Files\schtml\images\up1.gif
c:\Program Files\schtml\images\up2.gif
c:\Program Files\schtml\images\w1.gif
c:\Program Files\schtml\images\w11.gif
c:\Program Files\schtml\images\w2.gif
c:\Program Files\schtml\images\w3.gif
c:\Program Files\schtml\images\w3.jpg
c:\Program Files\schtml\images\word.doc
c:\Program Files\schtml\images\wt1.gif
c:\Program Files\schtml\images\wt2.gif
c:\Program Files\schtml\images\wt3.gif
c:\Program Files\Your PC Protector
c:\Program Files\Your PC Protector\Your PC Protector.exe
%UserProfile%\Start Menu\Programs\Your PC Protector
%UserProfile%\Desktop\Your PC Protector.lnk

Your PC Protector Windows Registry Information:

HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\TaskManager
HKEY_CURRENT_USER\Software\Your PC Protector
HKEY_CLASSES_ROOT\CLSID\{77DC0Baa-3235-4ba9-8BE8-aa9EB678FA02}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{77DC0Baa-3235-4ba9-8BE8-aa9EB678FA02}
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_ADBUPD
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AdbUpd
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ADBUPD
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AdbUpd

Issues that may be in a HijackThis log.

O2 – BHO: ADC PlugIn – {77DC0Baa-3235-4ba9-8BE8-aa9EB678FA02} – C:\Program Files\adc32.dll

Have your HijackThis log analyzed*****HERE*****Copy your log and paste it in the box at the site and wait for the results. Scroll down the page and you will see a detailed description of each entry and suggestion actions to take,if any, with each, but before you do use SystemLookup below to double check the results. A mistake here can cause Operating System Failure!

Use*****  SystemLookup *****as a reference resource for HijackThis log.

HijackThis Tutorial*****by BleepingComputer

********************************************************************************************************************************

If you run across a file that is not being detected or removed, you can upload the file to*****VIRUSTOTAL*****and they will analyze it and when the results are shown, it will give a list of what software’s are detecting the threat and which are removing it, kinda takes the guess work out of the equation.

More to use

Jotti’s Malware Scan

Dr. Web Online Check

Kaspersky File Scanner

********************************************************************************************************************************

Other useful resources:

Virus Identification Resources

Security Software, Online Scanners and Virus Removal Tools

Video on “How to Remove Malware for Free” by Mirzo’s

Forums

********************************************************************************************************************************

********************************************************************************************************************************


Advertisements

Posted February 4, 2010 by Wide Glide in Virus Removal

All Things Equal

A fine WordPress.com site

Everything Anti-Malware!

Reviews, Step-by-Step Guides,Toolkits and News

TechNet Blogs

Malware Removal

SUPERAntiSpyware Blog

Malware Removal

Security Garden

Malware Removal

S!Ri.URZ

Malware Removal

miekiemoes' Blog

Malware Removal

Malwarebytes Labs

Malware Removal

Metallica's blog

About malware

Malware Removal

Opera News

Malware Removal

WordPress.com

WordPress.com is the best place for your personal blog or business site.

%d bloggers like this: