Do you have pop-ups or your computer infected with trojan or spyware ? Learn how to ask us for help, click here!

How to remove File Recovery virus

File Recovery is a fake computer optimization software that detects numerous false problems and displays various critical errors alerts on the computer. The rogue program from the same family of malware as System Check, System Fix, Data Recovery, Master Utilities, PC Repair, System Repair, Windows XP Repair, etc. It is promoted and installed itself on your computer without your permission and knowledge through the use of trojans or other malicious software. Moreover, the scammers may also use various other misleading methods to distribute their bogus software, e.g. Twitter, Facebook and spam emails. Please be careful when opening attachments and downloading files or otherwise you can end up with a rogue program on your PC

Once installed, File Recovery will be configured to run automatically when Windows starts. Next, the rogue does a fake scan of your computer then tells you it has found numerous critical errors, e.g. “Drive C initialization error”, “Read time of hard drive clusters less than 500 ms”, “32% of HDD space is unreadable”, “Bad sectors on hard drive or damaged file allocation table”, etc. It will require you to pay for the fake software before it “repairs” your machine of the problems. Of course, all of these errors are a fake. So, you can safety ignore the false scan results.

While File Recovery is running, it will block legitimate Windows applcations on your computer and won’t let you download anything from the Internet. Moreover, it will display various fake critical errors alerts that the computer’s hard drive is corrupt in order to frighten you into purchasing this useless application. Some of the fake errors are:

The system has detected a problem with one or more installed IDE / SATA hard disks.
It is recommended that you restart the system.

Critical Error
A critical error has occurred while indexing data stored on hard drive. System restart required.

Critical error
Windows can`t find disk space. Hard drive error.

System Restore
The system has been restored after a critical error. Data integrity and hard drive integrity verification required.

Windows – No Disk
Exception Processing Message 0×0000013.

Of course, all of these warnings are a fake. This is an attempt to make you think your computer in danger. Like false scan results you can safely ignore them.

As you can see, obviously, File Recovery is a scam, which created with only one purpose – to steal your money. Most important, don`t purchase the program! You need as quickly as possible to remove the malicious software. Follow the removal instructions below, which will remove File Recovery and any other infections you may have on your computer for free.

Use the following instructions to remove File Recovery infection

1

Click Start, Type in Search field %allusersprofile% and press Enter (if you use the Windows XP, then click Start, Run and type a command in Open field). It will open a contents of “ProgramData” folder (“All Users” folder for Windows XP).

2

File Recovery hides all files and folders, so you need to change some settings and thus be able to see your files and folders again. Click Organize, select ”Folder and search options”, open View tab (if you use Windows XP, then open Tools menu, Folder Options, View tab). Select “Show hidden files and folders” option, uncheck “Hide extensions for known file types”, uncheck “Hide protected operating files” and click OK button.

3

Open “Application Data” folder. This step only for Windows XP, skip it if you use Windows Vista or Windows 7.

4

Now you will see File Recovery associated files as shown below.

5

Basically, there will be files named with a series of numbers or letter (e.g. 2636237623.exe or JtwSgJHkjkj.exe), right click to it and select Rename (don`t rename any folders). Type any new name (123.exe) and press Enter.
You can to rename only files with .exe extension. Its enough to stop this malware from autorunning.

6

Reboot your computer.
 

7

Now you can unhide all files and folders that has been hidden by File Recovery. Click Start, type in Search field cmd and press Enter. Command console “black window” opens. Type cd \ and press Enter. Type attrib -h /s /d and press Enter. Close Command console.

8

If your Desktop is empty, then click Start, type in Search field %UserProfile%\desktop and press Enter. It will open a contents of your desktop.

9

Download MalwareBytes Anti-malware (MBAM). Close all programs and Windows on your computer.

10

Double Click mbam-setup.exe to install the application. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing, make sure a checkmark is placed next to Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware, then click Finish.

11

If an update is found, it will download and install the latest version.

 

12

Once the program has loaded you will see window similar to the one below.

malwarebytes-antimalware1
Malwarebytes Anti-Malware Window
13

Select Perform Quick Scan, then click Scan, it will start scanning your computer. This procedure can take some time, so please be patient.

14

When the scan is complete, click OK, then Show Results to view the results. You will see a list of infected items similar as shown below. Note: list of infected items may be different than what is shown in the image below.

File Recovery remover
Malwarebytes Anti-malware, list of infected items
15

Make sure that everything is checked, and click Remove Selected for start File Recovery removal process. When disinfection is completed, a log will open in Notepad. Reboot your computer.

16

File Recovery may be bundled with TDSS trojan-rootkit, so you should run TDSSKiller to detect and remove this infection.

17

Download TDSSKiller from here and unzip to your desktop. Open TDSSKiller folder. Right click to tdsskiller and select rename. Type a new name (123myapp, for example). Press Enter. Double click the TDSSKiller icon. You will see a screen similar to the one below.


TDSSKiller
18

Click Start Scan button to start scanning Windows registry for TDSS trojan. If it is found, then you will see window similar to the one below.


TDSSKiller – Scan results
19

Click Continue button to remove TDSS trojan.

If you can`t to download or run TDSSKiller, then you need to use Combofix. Download Combofix. Close any open browsers. Double click on combofix.exe and follow the prompts. If ComboFix will not run, please rename it to myapp.exe and try again!

20

Your system should now be free of the File Recovery virus. If you need help with the instructions, then post your questions in our Spyware Removal forum.

File Recovery removal notes

Note 1: if you can not download, install, run or update Malwarebytes Anti-malware, then follow the steps: Malwarebytes won`t install, run or update – How to fix it.

Note 2: your current antispyware and antivirus software let the infection through ? Then you may want to consider purchasing the FULL version of MalwareBytes Anti-malware to protect your computer in the future.

File Recovery creates the following files and folders

%UserProfile%\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
%CommonAppData%\[RANDOM]
%CommonAppData%\~[RANDOM]
%UserProfile%\Desktop\File Recovery.lnk
%CommonAppData%\[RANDOM].exe
%Temp%\smtmp\
%Temp%\smtmp\1
%Temp%\smtmp\2
%Temp%\smtmp\3
%Temp%\smtmp\4

Note: %CommonAppData% is C:\Documents and Settings\All Users\Application Data (for Windows XP/2000) or C:\ProgramData (for Windows 7/Vista)

File Recovery creates the following registry keys and values

HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\USE FORMSUGGEST = Yes
HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\CERTIFICATEREVOCATION = 0
HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WARNONBADCERTRECVING = 0
HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WARNONZONECROSSING = 0
HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONES\3\1601 = 0
HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\WINTRUST\TRUST PROVIDERS\SOFTWARE PUBLISHING\STATE = 146944
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet\CONTROL\SESSION MANAGER\PENDINGFILERENAMEOPERATIONS = \??\%CommonAppData%\[RANDOM].exe

File Recovery removal – Video instructions

File Recovery is basically clone of Windows XP Repair, so you can use the video guide below to remove this malware.

July 13, 2012 on 8:51 am | In Malware removal, Rogue Anti Spyware | 14 Comments |


14 Comments »

RSS feed for comments on this post.

  1. I got infected this morning, I thought I had a bad hard disk until the “File Recovery” pop-up to my suspicion I googled it and found this page. Very clear and easy to follow, very helpful. Thanks!

    Comment by othniel — July 15, 2012 #

  2. You save my computer!Thanks a million!Bless you!

    Comment by emily d. — July 18, 2012 #

  3. everything seems clear now, thanks! but the files on my desktop are still transparent like they are being hidden, and i still can’t run firefox, it says: “Firefox is already running, but is not responding. To open a new window, you must first close the existing Firefox process, or restart your system.” any way to address these 2 issues?

    Comment by joe j. — August 1, 2012 #

  4. Hi,
    Thank you so much. It was great to find this. It is inmensely appreciated.

    Comment by Ruben — August 6, 2012 #

  5. It all worked but the right side of my start menu is missing (win xp sp2)

    what now???

    Comment by Becka H — August 10, 2012 #

  6. This virus killed my networking by disabling all my adapters. Fix was pretty easy, just go into networking and enable them again.

    Comment by charles — August 13, 2012 #

  7. Thanks, solution works fine, excelent details and specifications
    congrats

    ozz

    Comment by ozz — August 15, 2012 #

  8. When my laptop got this virus .. Went to computer repair shop they told me they can get my files for $100.. N $200 for removing virus and they ll take 5-6 working days but bcoz of u saved my money n time .. Thanx a ton for ur help .. God bless u

    Comment by kunal — August 16, 2012 #

  9. I followed the instructions but I still cannot find my files

    Comment by Curtis — September 4, 2012 #

  10. Step 7 does not seem to unhide all my files, I have gotten rid of everything fine. However everything is still hidden and have no visable files anywhere.

    Should it be saying \access denied\ next to every option in cmd prompt while it’s scrolling after typing in the parameters you have given?

    Thanks.

    Comment by tesh — September 4, 2012 #

  11. Thank you so much for this post! You made it so easy to remove this! I am so thankful!

    Comment by Kathy Shropshire — September 6, 2012 #

  12. it really helps. I finally killed the file recovery virus from window 7. Thanks a lot.

    Comment by kathy — September 9, 2012 #

  13. Thank you so much for this it helped a lot !

    Comment by luna — September 15, 2012 #

  14. You are a life saver!!!

    Comment by kelsey — September 17, 2012 #

Leave a comment

XHTML: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


My Anti Spyware - Free antispyware programs and Spyware Removal Instructions.