Malware Removal Instructions

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 2 September 2011

How to Remove Master Utilities (Uninstall Guide)

Posted on 10:44 by Unknown
Master Utilities is a rogue system optimization and cleaning tool that overwhelms users with numerous fraudulent error warnings such as "Critical Hard Disk Drive Error", "RAM failure", or "Critical Error". It's probably the most common kind of malicious software nowadays. Because cyber crooks use social engineering to distribute fake programs this makes them very dangerous. In some cases, malware authors the advantages of bugs in popular software like Adobe Acrobat and Java and may install a backdoor Trojan on your computer which will then download Master Utilities to your computer. The rogue program will scan your computer for critical hard drive and Windows registry errors and report numerous problems that should be fix immediately, although they do not actually exist. It reports exactly the same problems on infected computers, no matter whether you use a laptop or a PC. It will also display fake system warnings about data corruption and loss, system errors and failures. In some cases Master Utilities will prevent you from opening certain programs on your computer, claiming that they are corrupted. If you encounter something like this or you think that your computer is infected with Master Utilities, please follow the steps in the removal guide below.



Fake Master Utilities warnings:





As you may know, the main goal of Master Utilities and similar scareware is to trick you into paying for a full version of the bogus program. It does absolutely nothing, so you shouldn't purchase it no matter what, keeping in mind that this malware is a gateway to identity theft. The bad news is that this rogue program drops a rootkit from the well known TDSS malware family and crash various programs in an effort to deceive you into believing a true problem exists. One more thing, it hides/moves certain applications and shortcuts to Windows Temp directory to make you think that your hard drive fails to load certain programs. Do not delete anything from Windows Temp folder; otherwise you'll encounter problems restoring program shortcuts and other files. There are several steps you can take to completely remove Master Utilities and associated malware from your computer. First of all, run TDSSKiller as described in the removal instructions below. You must remove rootkits before proceeding to the next steps. Otherwise, the rogue program will be re-downloaded. Then scan your computer with legitimate malware removal tools, Malwarebytes Antimalware, SUPERAntispyware and some other programs mentioned below.

Additionally, you can activate the rogue program by entering this registration code 1203978628012489708290478989147 and any email as shown in the image below.



Once this is done, you are free to install anti-malware software and remove the rogue anti-virus program from your computer properly. And remember, do not purchase Master Utilities. You can remove this malware manually as well. However, just the rogue program itself but not rootkits. For more information, please follow the alternate Master Utilities removal guide. Last, but not least, if you need help removing this scareware from your computer, please leave a comment below. Compute wisely!


Master Utilities removal instructions:

1. First of all, you need to unhide the files and folders. Select Run... from the Start Menu or just hit the key combination CTRL+R on your keyboard. In the Open: field, enter cmd and hit Enter or click OK.



At the command prompt, enter attrib -h /s /d and hit Enter. Now, you should see all your files and folders. NOTE: you may have to repeat this step because the malware may hide your files again.



If you still can't see any of your files, Select Run... from the Start Menu or just hit the key combination CTRL+R on your keyboard. In the Open: field, enter explorer and hit Enter or click OK.



2. Open Internet Explorer. Select Run... from the Start Menu or just hit the key combination CTRL+R on your keyboard. In the Open: field, enter iexplore.exe and hit Enter or click OK.

Download free anti-malware software from the list below and run a full system scan.
  • MalwareBytes Anti-malware
  • SUPERAntispyware
  • Spybot S&D
  • Hitman Pro 3.5
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Don't forget to update the installed program before scanning.

3. Open Internet Explorer and download TDSSKiller or Backdoor.Tidserv Removal Tool. This malware usually (but not always) comes bundled with TDSS rootkit. Removing this rootkit from your computer is very important (if exists). Run TDSSKiller or Backdoor.Tidserv Removal Tool to remove the rootkit.




Alertane Master Utilities removal instructions:

1. First of all, you need to unhide the files and folders. Select Run... from the Start Menu or just hit the key combination CTRL+R on your keyboard. In the Open: field, enter cmd and hit Enter or click OK.



At the command prompt, enter attrib -h /s /d and hit Enter. Now, you should see all your files and folders. NOTE: you may have to repeat this step because the malware may hide your files again.



2. The rogue application places an icon or your desktop. Right click on the icon, click Properties in the drop-down menu, then click the Shortcut tab.



The location of the malware is in the Target box.



On computers running Windows XP, malware hides in:
C:\Documents and Settings\All Users\Application Data\

NOTE: by default, Application Data folder is hidden. Malware files are hidden as well. To see hidden files and folders, please read Show Hidden Files and Folders in Windows.

Under the Hidden files and folders section, click Show hidden files and folders, and remove the checkmark from the checkbox labeled:

- Hide extensions for known file types
- Hide protected operating system files

Click OK to save the changes. Now you will be able to see all files and folders in the Application Data directory.

On computers running Windows Vista/7, malware hides in:
C:\ProgramData\

3. Look for suspect ".exe" files in the given directories depending on the Windows version you have.

Example Windows XP:
C:\Documents and Settings\All Users\Application Data\Ka09I05RQNSXj2bq.exe
C:\Documents and Settings\All Users\Application Data\BdoeWKAqM.exe

Example Windows Vista/7:
C:\ProgramData\Ka09I05RQNSXj2bq.exe
C:\ProgramData\BdoeWKAqM.exe

Basically, there will be a couple of ".exe" file named with a series of numbers or letters.



Rename Ka09I05RQNSXj2bq.exe to Ka09I05RQNSXj2bq.vir as shown in the image below.



4. Restart your computer. The malware should be inactive after the restart.

5. Open Internet Explorer and download TDSSKiller or Backdoor.Tidserv Removal Tool. This malware usually (but not always) comes bundled with TDSS rootkit. Removing this rootkit from your computer is very important (if exists). Run TDSSKiller and remove the rootkit.



6. Download free anti-malware software from the list below and run a full system scan.
  • MalwareBytes Anti-malware
  • SUPERAntispyware
  • Spybot S&D
  • Hitman Pro 3.5
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Don't forget to update the installed program before scanning.

7. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET Smart Security.


Associated Master Utilities files and registry values:

Files:

Windows XP:
  • %AllUsersProfile%\Application Data\[SET OF RANDOM CHARACTERS]
  • %AllUsersProfile%\Application Data\[SET OF RANDOM CHARACTERS].exe
  • %UsersProfile%\Desktop\Master Utilities.lnk
  • %UsersProfile%\Start Menu\Programs\Master Utilities
  • %UsersProfile%\Start Menu\Programs\Master Utilities\Master Utilities.lnk
  • %UsersProfile%\Start Menu\Programs\Master Utilities\Uninstall Master Utilities.lnk
%AllUsersProfile% refers to: C:\Documents and Settings\All Users
%UserProfile% refers to: C:\Documents and Settings\[User Name]

Windows Vista/7:
  • %AllUsersProfile%\[SET OF RANDOM CHARACTERS]
  • %AllUsersProfile%\[SET OF RANDOM CHARACTERS].exe
  • %UsersProfile%\Desktop\Master Utilities.lnk
  • %UsersProfile%\Start Menu\Programs\Master Utilities\
  • %UsersProfile%\Start Menu\Programs\Master Utilities\Master Utilities.lnk
  • %UsersProfile%\Start Menu\Programs\Master Utilities\Uninstall Master Utilities.lnk
%AllUsersProfile% refers to: C:\ProgramData
%UserProfile% refers to: C:\Users\[User Name]

Registry values:
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[SET OF RANDOM CHARACTERS].exe"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[SET OF RANDOM CHARACTERS]"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations "LowRiskFileTypes" = '/{hq:/s`s:/ogn:/uyu:/dyd:/c`u:/bnl:/ble:/sdf:/lrh:/iul:/iulm:/fhg:/clq:/kqf:/`wh:/lqf:/lqdf:/lnw:/lq2:/l2t:/v`w:/rbs:'
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments "SaveZoneInformation" = '1'
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download "CheckExeSignatures" = 'no'
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main "Use FormSuggest" = 'yes'
Share this information with other people:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Rogue programs | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • What is wrtc.exe and how to remove it?
    wrtc.exe - by Perion Network Ltd. What is wrtc.exe? wrtc.exe is a part of IncrediMail software, digitally signed by Perion Network Ltd. This...
  • Remove ShopperReports (Uninstall Guide)
    ShopperReports is defined as adware or a potentially unwanted program that displays marketing related results in a side pane of the browser...
  • Trojan.MBRlock, Внимание! Ваш компьютер заблокирован
    Trojan.MBRlock is a very disturbing piece of malicious code which infects the master boot record (MBR) and prevents Windows from starting. ...
  • False Positive: Ikarus and Comodo detecting TDSSKiller as a Trojan horse
    This awkward moment when you realize that your favorite rootkit removal utility is detected as malware. I probably wouldn't even have no...
  • Remove RiskTool.Win32.BitCoinMiner (Uninstall Guide)
    RiskTool.Win32.BitCoinMiner is a risk tool or potentially unwanted application that may use your computer's resources to generate bitco...
  • Remove Rattlingsearchsystem.com (Uninstall Guide)
    Rattlingsearchsystem.com is a ZeroAccess/Sirefef rootkit-related browser hijacker that redirects users to shady websites while searching on...
  • Remove TR/ATRAPS.Gen2, removal instructions
    Cyber crooks and third parties that buy stolen data are increasingly using more and more sophisticated techniques, in a variety of different...
  • Remove Ask Search and Ask Toolbar (Uninstall Guide)
    Ask Search and Ask Toolbar are very often incorrectly classified as virus/spyware that may cause search redirects. The majority of us pref...
  • How to remove 'TidyNetwork' adware virus from your computer
    As internet users most of us have seen those irritating little pop-up windows that are advertising something that we normally have little or...
  • Remove Windows Attention Utility (Uninstall Guide)
    Windows Attention Utility is a rogue security application that generates misleading warnings about nonexistent viruses and attempts to lure...

Categories

  • Adware
  • Answers
  • Antivirus software
  • Browser Hijackers
  • Cloud Computing
  • Fake Alerts
  • Giveaways
  • Hoax
  • How-To
  • IaaS
  • Internet
  • Malicious websites
  • Malware
  • PaaS
  • Parental Controls
  • Passwords
  • Phishing
  • Process Information
  • Ransomware
  • Rogue programs
  • Rootkits
  • SaaS
  • Security Advisories
  • Spam
  • Spyware
  • Trojans
  • Viruses
  • Web Browsers
  • Worms

Blog Archive

  • ►  2013 (173)
    • ►  December (6)
    • ►  November (13)
    • ►  October (11)
    • ►  September (20)
    • ►  August (4)
    • ►  July (17)
    • ►  June (31)
    • ►  May (25)
    • ►  April (15)
    • ►  March (17)
    • ►  February (7)
    • ►  January (7)
  • ►  2012 (86)
    • ►  November (2)
    • ►  October (4)
    • ►  September (6)
    • ►  August (6)
    • ►  July (11)
    • ►  June (1)
    • ►  May (5)
    • ►  April (7)
    • ►  March (7)
    • ►  February (17)
    • ►  January (20)
  • ▼  2011 (239)
    • ►  December (8)
    • ►  November (18)
    • ►  October (21)
    • ▼  September (24)
      • How to Remove Security Sphere 2012 (Uninstall Guide)
      • Remove Advanced PC Shield 2012 (Uninstall Guide)
      • Notification of Limited Account Access - PayPal Ph...
      • Remove Ask Search and Ask Toolbar (Uninstall Guide)
      • Cyberbullying
      • Facebook Price Grid Hoax
      • ZeroAccess/Sirefef/MAX++ Rootkit Removal Tool
      • Remove Startsear.ch and search.searchcompletion.co...
      • Remove Babylon Toolbar and "Search the web (Babylo...
      • Seeearch.com Browser Hijacker (Uninstall Guide)
      • Remove Classysearchserver.com (Uninstall Guide)
      • Remove Coolsearchserver.com (Uninstall Guide)
      • Remove Excellentsearchserver.com (Uninstall Guide)
      • Windows заблокирован! Ransomware (Uninstall Guide)
      • Remove Bigseekpro.com and Somoto.com Toolbar (Unin...
      • Apple - Important information about your Apple ID
      • Remove Webplains.net (Uninstall Guide)
      • Remove *dayoftheweek.com (Uninstall Guide)
      • Remove Chit Chat (Uninstall Guide)
      • Remove La policía ESPAÑOLA Ransomware (Uninstall G...
      • How to Remove "System Recovery" (Uninstall Guide)
      • How to Remove OpenCloud Security (Uninstall Guide)
      • How to Remove Master Utilities (Uninstall Guide)
      • Remove Bandoo (Uninstall Guide)
    • ►  August (28)
    • ►  July (32)
    • ►  June (16)
    • ►  May (23)
    • ►  April (15)
    • ►  March (16)
    • ►  February (9)
    • ►  January (29)
  • ►  2010 (2)
    • ►  December (2)
Powered by Blogger.

About Me

Unknown
View my complete profile