Memory Fixer is a piece of malware that comes in the form of a disk defragmenter program. It pretends to scan your computer for system errors and malcode and reports that there is an issue with your computer, even though your computer is perfectly fine. Memory Fixer states that it has found numerous hard drive and Windows registry errors (flaged as critical to scare users) and then offers remediation in exchange of payment. The rogue applications displays legitimate looking but fake error messages to further scare you into thinking that there is something wrong with your computer. Furthermore, it blocks other programs and system utilities and hijacks Internet Explorer. Besides, it can come bundled with other malware that may cause even more problems. Memory Fixer itself is very annoying but not dangerous. It can't delete your files or steal sensitive information. Anyway, if you have this rogue program on your computer then you should obviously remove it. Please follow the removal instructions below to remove Memory Fixer and related malware from your computer with the help of free and reliable anti-malware software. As always, helpful comments and questions are welcome. Good luck and be safe online!
Similar rogues: HDD Fix, Quick Defrag, HDD Low.
Memory Fixer removal instructions:
1. Download Process Explorer. (click the link and wait for few seconds, download will begin automatically)
2. End Memory Fixer processes, e.g. kdrGhdgOFGdlerg.exe or ufGhvHde.exe.
3. Download TDSSKiller (free utility from Kaspersky Lab) and run it. Remove TDSS rootkit if exist.
4. Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Don't forget to update the installed program before scanning.
5. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET Smart Security.
Memory Fixer removal instructions (in Safe Mode with Networking):
1. Reboot your computer is "Safe Mode with Networking". As the computer is booting tap the "F8 key" continuously which should bring up the "Windows Advanced Options Menu" as shown below. Use your arrow keys to move to "Safe Mode with Networking" and press Enter key. Read more detailed instructions here: http://www.computerhope.com/issues/chsafe.htm
NOTE: Login as the same user you were previously logged in with in the normal Windows mode.
2. Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Don't forget to update the installed program before scanning.
3. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET Smart Security.
Memory Fixer associated files and registry values:
Files:
- %AllUsersProfile%\Application Data\[SET OF RANDOM CHARACTERS]
- %AllUsersProfile%\Application Data\[SET OF RANDOM CHARACTERS].dll
- %AllUsersProfile%\Application Data\[SET OF RANDOM CHARACTERS].exe
- %UsersProfile%\Desktop\Memory Fixer.lnk
- %UsersProfile%\Start Menu\Programs\Memory Fixer\
- %UsersProfile%\Start Menu\Programs\Memory Fixer\Memory Fixer.lnk
- %UsersProfile%\Start Menu\Programs\Memory Fixer\Uninstall Memory Fixer.lnk
C:\Documents and Settings\All Users (in Windows 2000/XP)
C:\Users\[UserName]\AppData\Roaming (in Windows Vista & Windows 7)
Registry values:
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[SET OF RANDOM CHARACTERS]"
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[SET OF RANDOM CHARACTERS].exe"
0 comments:
Post a Comment