PDA

View Full Version : Manual Removal Guide for Fraud.AntiMalwareSuite



Friday
2009-08-05, 14:29
The following instructions have been created to help you to get rid of "Fraud.AntiMalwareSuite" manually.
Use this guide at your own risk; software should usually be better suited to remove malware, since it is able to look deeper.

If this guide was helpful to you, please consider donating towards this site (http://www.safer-networking.org/index.php?page=donate).

Threat Details:

Categories:
malware

Description:
Fraud.AntiMalwareSuite claims to be an antispyware tool. When it is installed to the computer it finds a lot of harmless entries in order to frighten the user and makes him buy a license to get the issue fixed.
Removal Instructions:

Autorun:

Please use Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd), RunAlyzer (http://www.safer-networking.org/index.php?page=runalyzer) or msconfig.exe to remove the following autorun entries.

Entries named "AntiMalwareSuite" and pointing to "?<$PROGRAMFILES>\AntiMalwareSuite\AMS.exe*".

Files:

Please use Windows Explorer or another file manager of your choice to locate and delete these files.

The file at "<$COMMONPROGRAMS>\AntiMalwareSuite\AntiMalwareSuite on the Web.url".
The file at "<$COMMONPROGRAMS>\AntiMalwareSuite\AntiMalwareSuite Online Manual.url".
The file at "<$COMMONPROGRAMS>\AntiMalwareSuite\AntiMalwareSuite.lnk".
The file at "<$COMMONPROGRAMS>\AntiMalwareSuite\Contact customer support.url".
The file at "<$COMMONPROGRAMS>\AntiMalwareSuite\Uninstall AntiMalwareSuite.lnk".
The file at "<$DESKTOP>\AntiMalwareSuite.lnk".
The file at "<$DESKTOP>\Install AntiMalwareSuite.lnk".
The file at "<$LOCALAPPDATA>\qip\AMS_FreeSetup.exe.ini".
The file at "<$LOCALAPPDATA>\UAMS_QIP\data.ini".
The file at "<$LOCALSETTINGS>\Temp\AMS_FreeSetup.exe".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\Activate.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\AMS.exe".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\AMS.xml".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\appupdate.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\AsAgents.dll".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\AsAgents.xml".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\AutoProcess.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\database\knownfiles.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\database\MalwareDB.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\database\TEBase.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\database\vbpv.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\dbupdate.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\InstUp.exe".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\lapv.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\license.rtf".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\manual.pdf".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\PaymentPage.exe".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\ps.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\pv.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\quaratine.dat\#post_quarantine".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\readme.rtf".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\RTMonitor.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\scanlog.xml".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\settings.ini".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\shellext.dll".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\shellext.xml".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\Summary.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\tasks.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\threatnet.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\threatnet.ini".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\up.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\updateapp.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\updatedb.dat".
The file at "<$PROGRAMFILES>\AntiMalwareSuite\UserAgent.dll".
Make sure you set your file manager to display hidden and system files. If Fraud.AntiMalwareSuite uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify files!

Folders:

Please use Windows Explorer or another file manager of your choice to locate and delete these folders.

The directory at "<$COMMONAPPDATA>\AntiMalwareSuite\Data\Abbr".
The directory at "<$COMMONAPPDATA>\AntiMalwareSuite\Data\ProductCode".
The directory at "<$COMMONAPPDATA>\AntiMalwareSuite\Data".
The directory at "<$COMMONAPPDATA>\AntiMalwareSuite".
The directory at "<$COMMONPROGRAMS>\AntiMalwareSuite".
The directory at "<$PROGRAMFILES>\AntiMalwareSuite\database".
The directory at "<$PROGRAMFILES>\AntiMalwareSuite\Download".
The directory at "<$PROGRAMFILES>\AntiMalwareSuite\quaratine.dat".
The directory at "<$PROGRAMFILES>\AntiMalwareSuite".
Make sure you set your file manager to display hidden and system files. If Fraud.AntiMalwareSuite uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify folders!

Registry:

You can use regedit.exe (included in Windows) to locate and delete these registry entries.

Delete the registry key "{4567AB12-7DFC-4C46-BD8F-41259D169A0D}" at "HKEY_CLASSES_ROOT\TypeLib\".
Delete the registry key "{4567AB12-AE24-4FD6-B479-E2B464F32DA6}" at "HKEY_CLASSES_ROOT\TypeLib\".
Delete the registry key "{4567AB12-EDED-4675-AF10-BA15EDDB4D7A}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\".
Delete the registry key "{4ADD95DA-B25D-4d21-9C5C-05FC6DE05860}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\".
Delete the registry key "{A6FBD2E4-1C7E-4EAB-80DD-01DE2645566A}" at "HKEY_CLASSES_ROOT\TypeLib\".
Delete the registry key "{D4CDC21D-43BE-4101-A1EF-E379F134771E}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\".
Delete the registry key "{D4CDC21D-43BE-4101-A1EF-E379F134771E}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\".
Delete the registry key "AntiMalwareSuite" at "HKEY_CURRENT_USER\SOFTWARE\".
If Fraud.AntiMalwareSuite uses rootkit technologies, use our RegAlyzer (http://www.safer-networking.org/index.php?page=regalyzer), RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).

Final Words:

If neither Spybot-S&D nor self help did resolve the issue or you would prefer one on one help,
Please read these instructions (http://forums.spybot.info/showthread.php?t=288) before requesting assistance,
Then start your own thread in the Malware Removal Forum (http://forums.spybot.info/forumdisplay.php?f=22) where a volunteer analyst will advise you as soon as available.