Windows Cleaning Toolkit

What is Windows Cleaning Toolkit?

Windows Cleaning Toolkit is the new member of the Rogue.VirusDoctor family of fictitious anti-spyware tools. The clandestine program is an immediate descendant of the infamous Windows Expert Console, and as our researchers have discovered these programs are almost identical. Some other threats from the same faction include Windows Safety Series, Windows Secure Workstation and Windows Anti-Malware Patch. Due to the misleading names of these threats many Windows users believe that they are authentic and can be trusted with malware detection and removal tasks. Anti-Spyware-101.com researchers warn that you should remove Windows Cleaning Toolkit as soon as possible because the application is fictitious and has been created by schemers to trick you into giving up your own savings. Even though the removal of the threat is not that simple you must perform it right away.

Why should you delete Windows Cleaning Toolkit?

If you are reading this report the clandestine rogue Windows Cleaning Toolkit must have corrupted your operating system already. The infection could be dropped onto the PC by an existing Trojan; however, it can use various security vulnerabilities to achieve this. For example, it has been noted that it could enter the PC though a fictitious online scanner. If you accidentally land on a corrupted site representing the scanner you could be tricked into thinking that various threats on your system await removal. If you download an offered malware remover you will discover Windows Cleaning Toolkit running on the PC and listing various threats (e.g. Rootkit.Win32.KernelBot). The infection is composed of files which may restrict the running of Task Manager, Registry Editor and many executable files. Note that you may also discover the inability to connect to the Internet, which may create manual removal troubles.test

In general, it is essential that you delete the threat because it is set out to lure out your money. The misleading interface of the rogue can perform a bogus system scan and push you into purchasing the allegedly authentic full-version of a reliable malware removal tool. In order to convince you with this lie you may be presented with bogus statements, pop-ups alerts and notifications. Here are a few of them:

Error
Trojan activity detected. System data security is at risk.
It is recommended to activate protection and run a full system scan.

Torrent Alert
Recommended: Please use secure encrypted protocol for torrent links.
Torrent link detected!
Receiving this notification means that you have violated:
- the copyright laws. Using Torrent for downloading movies and licensed software shall be prosecuted and you may be sued for cybercrime and break of law under the SOPA legislation.

Automatic Windows Cleaning Toolkit Removal

To ensure that your operating system is no longer in the hands of schemers you firstly need to remove Windows Cleaning Toolkit. Since this infection could be running with other malicious threats alongside we strongly recommend that you implement authentic, automatic malware detection and removal software. SpyHunter is a great anti-malware program which will ensure Windows protection and help you deal with malware removal quickly and effortlessly. Do not forget to ensure that this program is active at all times after installation to ensure that the PC is safeguarded 24/7.

1) Activate the rogue (activation key: 0W000-000B0-00T00-E0020), check whether the access to the Internet is restored, and if so, download the antispyware software; or,

2) Download the application onto an unaffected computer, take a USB flash drive and transfer the software onto the infected machine.

100% FREE spyware scan and
tested removal of Windows Cleaning Toolkit*

Manual Windows Cleaning Toolkit Removal

The manual removal of the clandestine Trojan is an operation which is suitable to experienced Windows users only. If you do not have extensive knowledge and experience you should better proceed with the automatic removal; however, if you are sure about your success – follow the steps below.

Open the Task Manager (simultaneously tap Ctrl+Alt+Delete) and end these processes:

%AppData%\guard-.exe
guard[random].exe

Open the Registry Editor (enter ‘regedit’ into Search or RUN) and remove these entries:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "EnableLUA" = "0"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations "LowRiskFileTypes"=".zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorUser" = "0"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe "Debugger"="svchost.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorAdmin" = "0"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "GuardSoftware" = "%AppData%\guard-.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments "SaveZoneInformation"=1
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell"="C:\\Users\\User\\AppData\\Roaming\\guard-.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe "Debugger"="svchost.exe"

Locate and delete files listed below which are linked to the threat:

%AppData%\result1.db
%AppData%\guard-.exe
QR Code
Disclaimer
Disclaimer

Leave a Comment

Enter the numbers in the box to the right *