Step-by step removal guide

by Andy Raff on January 23, 2013 Screenshot Screenshot Removal Steps

Follow steps closely:

Step 1: Grab a piece of paper and write down our Support number. This is just a precaution in case you need help or get caught on one of the steps. We are here to help remove if you need it. Removal Hotline: 888.847.4130

Step 2: Totally power down the infected computer.

Step 3: Before your turn the computer back on, please locate the F8 button on your keyboard. F8 is traditionally positioned on the top row of the keyboard. Be ready to tap F8 immediately on step 4.


Step 4: Now power ON the computer and press F8 until the WINDOWS ADVANCED OPTIONS MENU appears.

Step 5: When the WINDOWS ADVANCED OPTIONS MENU shows up, click down the menu using the direction keys on the board and highlight SAFE MODE WITH NETWORKING. Press ENTER on the keyboard.


Step 6: Windows will now boot up in Safe Mode. Your icons and the display may appear enlarged and unusual. This is normal and not caused by

Automatic Help Remover Live Help

Step 7: It is important to check if has altered your computer’s proxy settings. Infections like can modify your default browser settings. Move to the next step to check the settings.

Step 8: Press and hold the WINDOWS KEY on your keyboard.


Step 9: Keep pressing down on the WINDOWS key and press the R key at the same time. The RUN BOX will show up.


Step 10: Enter iexplore.exe in the RUN BOX. Click OK.


Step 11: Internet Explorer will now start. On the top navigation click TOOLS. Under the sub-menu of TOOLS click INTERNET OPTIONS.


Step 12: Click the CONNECTIONS tab within the INTERNET OPTIONS box.


Step 13: Select the LAN SETTINGS button.


Step 14: Do you see a check-mark in the box named “Use a proxy server for your LAN”, under the PROXY SERVER section? If so,, click to uncheck the box. If there is not a checkmark located in the box then you can move on to the next step.


Need Help? Please call the Removal Hotline toll-free at 888.847.4130

Step 15: Select the OK button to close the LOCAL AREA NETWORK box.

Step 16: To close the INTERNET OPTIONS box, click the OK button .

Step 17: We now need to run Rkill. Rkill was developed by Lawrence Abrams at Rkill will attempt to paralyze will block and stop any processes from running such as removal tools. We need to disarm this self-preservation tool that has. Please note that Rkill does not remove Do not reboot your computer after running Rkill as will restart as well. Bring up the RUN BOX again, by holding down the WINDOWS key and pressing the R key.


Step 18: In the RUN BOX, type “iexplore.exe”. Then click OK.


Step 19: Rkill will show within the download security box. Click SAVE and choose the desktop as the location.


Step 20: Once the Rkill download is complete, close out the DOWNLOAD COMPLETE box.

Step 21: Locate the Rkill.exe icon on your desktop.

Step 22: Double-click the Rkill icon and run Rkill.exe. Rkill will flash a black MS DOS box and attempt to paralyze


Step 23: Rkill will launch a Notepad file containing information on what it found. You can close that log and go to the next step.

Step 24: Now the computer is prepared to install Malwarebytes. Malwarebytes is a very popular Malware removal application. To install Malwarebytes, we need to bring up the RUN BOX again.

Step 25: On the Keyboard press and hold the WINDOWS KEY and the R key simultaneously. The RUN BOX will appear again.


Step 26: In the RUN BOX type “iexplore” and press OK.


Step 27: The download security box with Malwarebytes will appear. The options to RUN, SAVE or CANCEL will show. Select SAVE and then choose to save the file to the desktop.


Step 28: Go to your DESKTOP and locate the Malwarebytes icon on your desktop.

Step 29: Double-click the Malwarebytes icon.


Step 30: Select RUN on the Malwarebytes install box.


Step 31: After that, the SELECT SETUP LANGUAGE box will appear. Select your native language and press OK. English will be in used in the graphics example.


Step 32: The Malwarebytes SETUP WIZARD will show. Choose NEXT to continue.


Step 33: Next screen to show is the LICENSE AGREEMENT. Accept the agreement and choose NEXT.


Step 34: The BASIC INFORMATION screen is shown. Click NEXT.


Step 35: The SELECT DESTINATION LOCATION screen will appear. Choose the location you wish to have Malwarebytes install the required files. The default location shown is the normal, recommended location. Click NEXT.


Step 36: The next screen is just the SELECT START MENU FOLDER which tells the program where to place the shortcut to the application. Click NEXT.


Step 37: If you want a Desktop Icon and/or Quick Launch icon then opt-in to the corresponding check boxes on the SELECT ADDITIONAL TASKS box. Click NEXT.


Step 38: Now the READY TO INSTALL screen will show. Click INSTALL to start the installation process.


Step 39: The final screen with the pre-checked UPDATE and LAUNCH Malwarebytes will appear. Click FINISH.


Step 40: Malwarebytes will download the latest updates and show a success box. Click OK.

Step 41: The main interface of Malwarebytes with the Scanner tab will launch. Make sure PERFORM FULL SCAN is selected.


Step 42: Next step is to launch the full scan. Click SCAN to start the scan.


Step 43: A box will popup with the local drives, choose the local drives to scan and click SCAN.


Step 44: The scanner will begin. Be patient as the scan is very thorough searching for all the remnants of

Step 45: Once the scan is finished, a message box saying the scan is complete will appear. Click OK to close the box.

Step 46: After closing the box, click SHOW RESULTS.


Step 47: Once the results show, select REMOVE SELECTED to remove all the Malware found by Malwarebytes including Malwarebytes will also delete all of the files and registry keys affiliated with and add them to the quarantine.


Step 48: Malwarebytes may need to reboot the system to complete the removal of Please allow the PC to reboot if Malwarebytes asks for it.

Step 49: After the reboot is complete and the system is relaunched, please follow the on-screen instructions and continue the removal process.

Step 50: A Notepad log will be created by Malwarebytes. Close the log once reviewed.


Step 51: Once Malwarebytes has completed the removal process and has removed all the traces of, your computer should be 100% clean from

Next page:

About the author

Starbucks Junkie, Malware Fighter. Find me via Contact Form on this site or on my Google+ page.

Previous post:

Next post: