Click on screenshot to zoom
Danger level 9
Type: Rogue Anti-Spyware
Common infection symptoms:
  • Block exe files from running
  • Installs itself without permissions
  • Connects to the internet without permission
  • Slow internet connection
  • Annoying Pop-up's
  • Slow Computer

Windows Resque Center

Windows Rescue Center is a fake system optimizer, which can be a very dangerous program if it is not taken seriously. It looks reliable because it has a Windows logo on its interface, but that is because this rogue antispyware application is a part of the far-reaching Fake Microsoft Security Essentials scam. It is not the first malicious program, which comes wearing the same attractive face to fool unsuspecting users and steal their money. Previous versions of this malware include Windows Necessary Firewall, Windows Crashes Deliverer, Windows Risks Preventions and many more.

This rogue masquerades as a decent system application, which is supposed to make the computer function better, but improving the computer processing abilities is definitely not in the Windows Rescue Center’s to-do list. Its goals are the opposite – this rogue slows down the computer and sends multiple annoying fake security notifications to the user, until it eventually makes him pay for this worthless program. That is right, the main purpose of Windows Rescue Center is to rip the user off, and so it is important NOT to trust any information that comes from this rogue.

When Windows Rescue Center is set and ready to go, it loads automatically when the user boots his computer and then the program initiates a fake system scan. After the scan the rogue gives an overall security rating, which is usually very low – 33% or so, and then it urges the user to fix the errors “found” in the computer. However, if the user clicks on “fix errors” button, he is redirected to the purchase page. The purchase page requires various data from the user, such as his name, address, credit card number and CVV2 code. This is how the criminals do their dirty deeds – when the user fills in the blanks with this information, it gets exposed to third parties, and the hackers can use this data to perform illegal operations.

In the end, the user is left without his money, and with a damaged computer at hand, because Windows Rescue Center does not disappear anywhere, and it continues to cripple the system. In order to avoid such devastating consequences, one must remove Windows Rescue Center from his computer before it is too late. The rogue can be terminated manually or automatically, it depends on the user’s preferences, although automatic removal is recommended for those, who are not absolutely sure of their computing skills. Whichever way might be chosen, it is important to delete Windows Rescue Center with all of its components as soon as possible.

Download Spyware Removal Tool to Remove* Windows Resque Center
  • Quick & tested solution for Windows Resque Center removal.
  • 100% Free Scan for Windows
disclaimer

How to manually remove Windows Resque Center

Files associated with infection (Windows Resque Center):

%AppData%\Microsoft\[random].exe

Processes to kill (Windows Resque Center):

%AppData%\Microsoft\[random].exe

Remove registry entries (Windows Resque Center):

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe "Debugger" = 'svchost.exe'
Disclaimer

Post comment — WE NEED YOUR OPINION!

Comment:
Name:
Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.