1 of 3
Danger level 9
Type: Rogue Anti-Spyware
Common infection symptoms:
  • Block exe files from running
  • Installs itself without permissions
  • Connects to the internet without permission
  • Shows commercial adverts
  • System crashes
  • Annoying Pop-up's
  • Slow Computer
Other mutations known as:
WindowsRepairingSystem

Windows Repairing System

Due to the many new sophisticated rogue security products which flood the Web daily it has become more difficult to distinguish between genuine and fake security tools, as Windows Repairing System proves. This rogue antispyware applications forms part of the well-established and much despised fake Microsoft Security Essentials scam, and emanates from the exact same family of rogues as the well-known Windows Activity Inspector and Windows Tweaking Utility rogues.

This rogue will use any method possible to gain unauthorized access to a prospective host PC. Some of the most popular tactics used in Windows Repairing System ’s online marketing campaign includes those of using seditious browser hijackers and rubbish fake online malware scanners. Whichever method is used, the user will find it difficult to identify and remove Windows Repairing System from the system without some help due to the sly nature of this rogue application.

Download Spyware Removal Tool to Remove* Windows Repairing System
  • Quick & tested solution for Windows Repairing System removal.
  • 100% Free Scan for Windows

Once Windows Repairing System securely roots itself in the system it will start its attack against the PC. This will usually happen by an unsolicited and fake system scan being initialized by Windows Repairing System . This scan will proceed to yield various fake reports on bogus threats supposedly crippling the system. Some of the reported threats include the well-known Unknown Win32/Trojan as well as the ludicrous Backdoor.Win32.Rbot, which supposedly goes on to infect the file: c:\windows\system32\taskmgr.exe. Users are urged to accept all correspondence received from Windows Repairing System as highly suspect and never to be trusted or acted upon.

As a further attack against the system Windows Repairing System will make it impossible for the user to establish an Internet connection, and will not allow him to run any applications or executable on the system. This is done in an effort to prevent the user from running or downloading an application which could potentially detect and remove Windows Repairing System from the system. Other utterly annoying and frustrating symptoms associated with this infection include extremely poor system performance, which derives from the fact that Windows Repairing System uses up valuable system resources and increased erratic system behavior. Windows Repairing System will also spam the user with numerous fake security alerts which are completely without any basis, and should always be disregarded. Some of the most popular fake alerts generated by Windows Repairing System include the following:

System Security Warning
Attempt to modify register key entries is detected. Register entries analysis is recommended.

Warning!
Location: c:\windows\system32\taskmgr.exe
Viruses: Backdoor.Win32.Rbot

To protect your system against Windows Repairing System , ensure your firewall is activated and continually update your security software with the latest definitions. If you suspect infection, destroy Windows Repairing System immediately with the help of a powerful security tool, which can also adequately protect your system against similar future attacks.

Download Spyware Removal Tool to Remove* Windows Repairing System
  • Quick & tested solution for Windows Repairing System removal.
  • 100% Free Scan for Windows
disclaimer

How to manually remove Windows Repairing System

Files associated with Windows Repairing System infection:

JmpyxPEOWqPO.exe
16113460.exe
%AppData%\Microsoft\[random].exe

Windows Repairing System processes to kill:

JmpyxPEOWqPO.exe
16113460.exe
%AppData%\Microsoft\[random].exe

Remove Windows Repairing System registry entries:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
Disclaimer

Post comment — WE NEED YOUR OPINION!

Comment:
Name:
Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.