Back to the homepage

Tee Support Blog

Official News, Step-by-Step Guides and Tools

The followings are the posts under Fake Alert Removal Guide category

How to Remove Fake Alert “Attention! Your PC is Infected.” (Uninstall Guide)

Published December 10th, 2011 by Jessie Smith

Is your computer suffered from threat “Attention! Your PC is Infected.”? This step-by-step manual guide can help you safely and quickly remove “Attention! Your PC is Infected.”.

“Attention! Your PC is Infected.” Description:

Full content of this fake warning comes as: “Attention! Your PC is Infected. You can loose all your Secure data from bank details to e-mail or social network password. Please activate AV Secure 2012 to REMOVE infection from your PC.”

“Attention! Your PC is Infected…” is fake warning message works with fake security application “AV Secure 2012″ to scam innocent computer users whose computer has accidentally infected with the infection when surfing online or downloading files online. AV Secure 2012 disguises itself to be a Windows security application and waits users to activate it so that it could clean all the fake infections created by AV Secure 2012 from the infected computer. Apart from the popup of of AV Secure 2012, system can’t log on network and open other program normally, AV Secure 2012 has hijacked everything and only produces fake windows warnings from the lower corner of the desktop. However, what you should do is ignore all the fake alerts just like “Attention! Your PC is Infected…” so you can really save your system with the manual removal steps in the following.

“Attention! Your PC is Infected.” Screenshot:

Read the rest of this post »

VN:F [1.9.18_1163]
Rating: 0.0/10 (0 votes cast)

Real-time Protection Can Be Safer, Easier, Faster!

Completely remove Exploit:Java/CVE-2010-0840.BU (manual guide)

Published December 9th, 2011 by Tee Support Agent Kevin

Is your computer infected with Exploit:Java/CVE-2010-0840.BU virus? This step-by-step manual guide can help you safely and quickly remove Exploit:Java/CVE-2010-0840.BU malware. Or you could get the best malware scanner SpyHunter to fix the issue safely.

Exploit:Java/CVE-2010-0840.BU Description

Exploit:Java/CVE-2010-0840.BU[Aliases Trojan-Downloader.Java.OpenConnection.bu (Kaspersky), Java.Trojan.Downloader.OpenConnection.AI (BitDefender), Troj/JavaBz-E (Sophos)].Exploit:Java/CVE-2010-0840.BU is a highly dangerous trojan which lures users to unknowingly perform corrupt actions on a targeted computer. Exploit:Java/CVE-2010-0840.BU is detected by MSE antivirus. Exploit:Java/CVE-2010-0840.BU hides behind the application that displays deceptive warnings and misleading scan results. Exploit:Java/CVE-2010-0840.BU is the detection for a malicious Java applet trojan that exploits a vulnerability described in CVE-2010-0840. Exploit:Java/CVE-2010-0840.BU keeps warning every time you do a scan and it will come back soon if hasn’t been removed completely. To make your PC clean you will need to completely get rid of Exploit:Java/CVE-2010-0840.BU virus.

Exploit:Java/CVE-2010-0840.BU Identified as Security Threat by Impressions

  1. Exploit:Java/CVE-2010-0840.BU reputation/ rating online is terrible.
  2. Exploit:Java/CVE-2010-0840.BU is installed/ run without your permission.
  3. The official website of Exploit:Java/CVE-2010-0840.BU is poorly built without contact info.
  4. The payments website of Exploit:Java/CVE-2010-0840.BU is suspicious & claims your OS is unsafe.
  5. Poor Performance like highly-consumed system resources is caused by Exploit:Java/CVE-2010-0840.BU.

Exploit:Java/CVE-2010-0840.BU Step-by-Step Removal Instructions

 

Method A: manual removal

Method B: automatic removal

 

Method A: manual remova

1.The associated files of Exploit:Java/CVE-2010-0840.BU to be deleted are listed below:

%Application Data%\{random characers}.exe

2.The registry entries of Exploit:Java/CVE-2010-0840.BU that need to be removed are listed as follows:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{random characers}.exe

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\{random characers}.exe

{malware filename}=%Aplication Data%\{malware filename}.exe049

Sufficient expertise is needed during the malware manual removal process. If you are not confident to follow the manual removal steps, you are suggested to use the best malware remover SpyHunter which that can not only identity relevant files & entries of the malware to erase the infection, but also fix various possible system issues.

Method B.  Automatic Removal

1. Click the icon to download Exploit:Java/CVE-2010-0840.BU removal tool SpyHunter

2. Follow the instructions to get SpyHunter installed

3. Run removal tool SpyHunter and start a full scan to detect Exploit:Java/CVE-2010-0840.BU
scan

4. Show the scan result and then delete all detected items

Great attention is needed during Exploit:Java/CVE-2010-0840.BU manual removal process, because any inaccurate operation may result in data loss or even system crash. If you are confused how to do the above steps, you just need to click here and get the best Exploit:Java/CVE-2010-0840.BU virus uninstaller to help you out timely.

VN:F [1.9.18_1163]
Rating: 0.0/10 (0 votes cast)

Real-time Protection Can Be Safer, Easier, Faster!

Manually Delete TrojanDownloader:Java/OpenConnection.OU (Manual Removal Solution)

Published December 9th, 2011 by Tee Support Agent Sherry

Is your computer infected with TrojanDownloader:Java/OpenConnection.OU? This step-by-step guide can help you safely and quickly remove TrojanDownloader:Java/OpenConnection.OU.

What is TrojanDownloader:Java/OpenConnection.OU?

TrojanDownloader:Java/OpenConnection.OU infiltrates to computers in the background via spam email, free downloads or software exploits without your permission or consent. You can check out if your computer is infected by TrojanDownloader:Java/OpenConnection.OU through task manager. Here are the processes related to this virus, for instance winscrmgr.exe or AdobeUpdate.exe. What is worse, it can drop malicious files on certain websites or specific internet address that comes along with malicious code. The code can automatically connect to a server so it installs more Trojans/parasites/malwares on the compromised computer. This infection opens up a backdoor to allow remote access the compromised computer. So it can capture and send all personal information, such as credit card details, login number/password to a remote hacker. Therefore, you must take measures immediately to delete TrojanDownloader:Java/OpenConnection.OU to secure your computer.

Read the rest of this post »

VN:F [1.9.18_1163]
Rating: 0.0/10 (0 votes cast)

Real-time Protection Can Be Safer, Easier, Faster!

Permanently remove Rootkit.Win32.Stoned.d, manually delete Rootkit.Win32.Stoned.d

Published December 9th, 2011 by Tee Support Agent Kevin

Is your computer infected with Rootkit.Win32.Stoned.d Virus? This step-by-step manual guide can help you safely and quickly remove Rootkit.Win32.Stoned.d trojan. Or you could directly start an automatic removal with the best malware scanner SpyHunter to fix the issue safely.

How big  is the threat Rootkit.Win32.Stoned.d?

Rootkit.Win32.Stoned.d is a dangerous devil detected by kaspersky antivirus which is similar to Rootkit.Boot.SST.a. Rootkit.Win32.Stoned.d is the latest released bogus thing . MS security essentials did not appear to detect the virus on the quick scan but kaspersky did when you when you did a partial full scan. Backdoor.win32.scrap.p is created with the macro code used by many of today’s software applications and is MBR infection. Not only does it transmit sensitive data to third parties, it can also slow down your PC’s performance. In many instances, spyware Rootkit.Win32.Stoned.d is actually attached to the file-trading software you have to download to use the network; when you install the software, the spyware is also installed. Many virus removal tools seemed to remove it but your computer still detects issues and your browser opens red for a split second before returning to normal. It effects Windows XP, Vista or Win 7. Antivirus software just detect it but can’t delete it. So you will need to manually remove Rootkit.Win32.Stoned.d to keep your computer from safety. Read the rest of this post »

VN:F [1.9.18_1163]
Rating: 0.0/10 (0 votes cast)

Real-time Protection Can Be Safer, Easier, Faster!

Absolutely remove exploit:java/blacole.cc, manually clean exploit:java/blacole.cc

Published December 8th, 2011 by Tee Support Agent Kevin

Is your computer infected with Exploit:Java/Blacole.CC Virus? Relax, the manual tips or the best malware scanner SpyHunter from this post will be greatly helpful!

What is Exploit:Java/Blacole.CC?

Exploit:Java/Blacole.CC is a dangerous threat detected by MSE antivirus or Microsoft Malware Protection Center. Exploit:Java/Blacole.CC is the latest released bogus thing. Exploit:Java/Blacole.CC is created with the macro code used by many of today’s software applications. Not only does it transmit sensitive data to third parties, it can also slow down your PC’s performance.  In many instances, spyware exploit:java/blacole.cc is actually attached to the file-trading software you have to download to use the network; when you install the software, the spyware is also installed. It is updated regularly and mass e-mailed as an attachment. It effects Windows XP, Vista or Win 7.  Antivirus software just detect it but can’t delete it. So you will need to manually remove Exploit:Java/Blacole.CC to keep your computer from threat. Read the rest of this post »

VN:F [1.9.18_1163]
Rating: 0.0/10 (0 votes cast)

Real-time Protection Can Be Safer, Easier, Faster!

Exploit: Java/Blacole.BT Removal, Manually Delete Exploit: Java/Blacole.BT Instructions

Published December 7th, 2011 by Tee Support Agent Sherry

Is your computer infected with Exploit: Java/Blacole.BT? This step-by-step guide can help you safely and quickly remove Exploit: Java/Blacole.BT.

Exploit: Java/Blacole.BT Description

Exploit: Java/Blacole.BT goes by these names: Adware.SurfSideKick, Backdoor.Win32.HareBot.bdh, TROJ_SHGRAY.SME, Exploit: Java/Blacole.BU and TrojanDownloader:Win32/Cutwail.BE. Exploit: Java/Blacole.BT is designed to download and execute arbitrary files in secret without you knowing to cause unforeseen damages. Once infected, you may get annoying pop-ups for adverts or it even shuts down your internet connection to disable going to the internet. Sometime, whatever you click in a link, your browser will get redirected to different or malicious site you should realize. Exploit: Java/Blacole.BT contains all features as a identified Trojan threat, so it can open up an entry to enable remote hacker access the compromised system, then it is able to record and steal confidential data stored to carry out illegal activities.

Read the rest of this post »

VN:F [1.9.18_1163]
Rating: 0.0/10 (0 votes cast)

Real-time Protection Can Be Safer, Easier, Faster!



Download SpyHunter Download RegCurePro