Home Malware Programs Rogue Anti-Spyware Programs Windows Cleaning Toolkit

Windows Cleaning Toolkit

Posted: November 26, 2013

Threat Metric

Threat Level: 10/10
Infected PCs: 16
First Seen: November 26, 2013
Last Seen: January 8, 2020
OS(es) Affected: Windows

Windows Cleaning Toolkit Screenshot 1Windows Cleaning Toolkit is a rogue anti-malware program that pretends to detect PC threats, but actually generates intentionally inaccurate scan results to make you purchase its fake software. Windows Cleaning Toolkit steadfastly provides fraudulent system information and may engage in attacks including browser hijacking and blocking other products, and, as a consequence, is classified as malware. As far as malware experts are concerned, disabling and deleting Windows Cleaning Toolkit with any anti-malware strategies and software required is essentially necessary for keeping your PC safe from further harm, regardless of whether it comes from Windows Cleaning Toolkit or related threatening software.

Why this Toolkit Has Bad Advice in Its Bag

Like other fake system optimizers and rogue anti-malware products, Windows Cleaning Toolkit is carefully-designed to look just like an actual system-scanning utility, but doesn't have any of the real features of one. Current evidence gathered by malware analysts has led to the indication of Windows Cleaning Toolkit most likely being a part of the FakeVimes family, which includes many other brand name variants of similar scamware. Some examples of all of Windows Cleaning Toolkit's relatives engaging in similarly fraudulent misbehavior can include Privacy Guard Pro, PrivacyGuard Pro 2.0, Extra Antivirus, Fast Antivirus 2009, Presto TuneUp, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, Live PC Care, PC Live Guard, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus and Smart Security.

Although misleading system scans and a range of different fake alerts are the foremost functions of Windows Cleaning Toolkit's attempt at fraud, malware experts also have seen many other attacks originate with this family – all for the purpose of making you spend money on non-functional anti-malware software. Examples of the most significant of these are as follows:

  • Modifications to the Windows Security Center for the purpose of promoting Windows Cleaning Toolkit.
  • Hijacking your browser to redirect you to fake warning pages.
  • Hijacking your Web searches.
  • Reducing Internet Explorer's security settings to allow Web-based PC threats to attack more easily than usual (through risky downloads, script exploits, etc).
  • Blocking other programs by forcing svchost.exe (a normal Windows component) to launch instead of an unrelated program.

Cleaning Up After a Windows Cleaning Toolkit's Infection

Clearly, Windows Cleaning Toolkit is an abject danger to your PC and certainly doesn't warrant any money being spent for keeping Windows Cleaning Toolkit on your computer. However, Windows Cleaning Toolkit's ability to block other applications naturally leads to obstacles in removing Windows Cleaning Toolkit from your PC – even before taking into account the fact that malware experts often see FakeVimes-based scamware distributed by related threats, such as Trojan downloaders. Try to disable Windows Cleaning Toolkit through the use of Safe Mode or other basic security techniques before you begin removing Windows Cleaning Toolkit, which will require unrestricted access to appropriate security software.

Since Windows Cleaning Toolkit is a threatening program that will do its best to prevent itself from being removed, manual deletion of Windows Cleaning Toolkit isn't recommended. For an easier and more all-encompassing solution than removing Windows Cleaning Toolkit unassisted, malware researchers would encourage using anti-malware tools to scan your entire PC. Doing so, hopefully, will detect both Windows Cleaning Toolkit and any other threats that may be responsible for its being installed.

Windows Cleaning Toolkit Screenshot 2Windows Cleaning Toolkit Screenshot 3Windows Cleaning Toolkit Screenshot 4Windows Cleaning Toolkit Screenshot 5Windows Cleaning Toolkit Screenshot 6Windows Cleaning Toolkit Screenshot 7

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



result1.db File name: result1.db
Size: 2.37 KB (2372 bytes)
MD5: 4ea5af257d1ceb7daea8725d0db6996f
Detection count: 86
Mime Type: unknown/db
Group: Malware file
Last Updated: November 27, 2013
%APPDATA%\guard-khxd.exe File name: guard-khxd.exe
Size: 1.18 MB (1184448 bytes)
MD5: 991fa9637ce83f45a0e2c01088d1d469
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: January 8, 2020
%AppData%\results1.db File name: %AppData%\results1.db
Mime Type: unknown/db
Group: Malware file
%AppData%\guard-fvtb.exe File name: %AppData%\guard-fvtb.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "GuardSoftware" = "%AppData%\guard-toiy.exe"HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell"="C:\\Users\\User\\AppData\\Roaming\\guard-fvtb.exe""LowRiskFileTypes"=".zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.mHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe "Debugger"="svchost.exe"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe "Debugger"="svchost.exe"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments "SaveZoneInformation"=1HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings

Additional Information

The following messages's were detected:
# Message
1Error
Attempt to run a potentially dangerous script detected.
Full system scan is highly recommended.
2Error
System data security is at risk!
To prevent potential PC errors, run a full system scan.
3Error
Trojan activity detected. System data security is at risk.
It is recommended to activate protection and run a full system scan.
4Firewall has blocked a program from accessing the Internet
c:\program files\internet explorer\iexplore.exe
is suspected to have infected your PC.
This type of virus intercepts entered data and transmits them
to a remote server.
5Torrent Alert
Recommended: Please use secure encrypted protocol for torrent links.
Torrent link detected!
Receiving this notification means that you have violated:
- the copyright laws. Using Torrent for downloading movies and licensed software shall be prosecuted and you may be sued for cybercrime
and break of law under the SOPA legislation.
6Warning! Identity theft attempt detected
Hidden connection IP: xx.xxx.xxx.xxx
Target: Microsoft Corporation keys
Your IP: 127.0.0.1

Loading...