Presence of a computer virus called Windows Virtual Security does not only cause damage to the system but also endangers identity of the victim. The program lives with the main goal of letting you pay for the useless software using your credit card account. Once you used the assigned payment processor, attacker may steal your credentials including full name and credit card details. For this reason, we highly urged immediate removal of the Windows Virtual Security malware from an affected computer.

The time that Windows Virtual Security reaches your computer, it starts initiating harmful plots. There will be major changes on how the computer operates and it will be very irritating in your part. Virus scan welcomes you once you login to Windows and you will be notified of quite a number of threats. If fear comes first, user will be obliged to pay for the Windows Virtual Security registration key and this means easy money for its creator. That is how rogue program evolve. Using scare tactics such as fake alerts, false scan results, and misleading diagnosis always lead naïve user to its trap. Whatever happens, just ignore this fake antivirus software. There is other alternative to settle the issue, and that means complete removal of the malware.

To remove Windows Virtual Security from an infected computer, you need to remove numerous files and registry entries it dropped inside the PC. Manually locating these modules is too complex. Thus, we recommend automatic uninstall using a removal tool as made ready on the guide below.

Type Rogue
Sub-Type FakeAV
OS Affected Windows

What are the Symptoms of Windows Interactive Safety Infection?

Image below is the fake scanner by Windows Virtual Security. It produces a bunch of false security that attempts to lure victims into purchasing the licensed version of rogue program.

Fake Windows Virtual Security

Follow these Procedures to Remove Windows Virtual Security

Procedure 1: Start Computer in Safe Mode

1. Restart your computer in Safe Mode with Networking

- To run Windows system in Safe Mode, please press F8 after turning ON the computer. Hit the keyboard button before the appearance of Windows logo. If successful, you will see a screen of Windows Advanced Options Menu. See image below for your reference. This area will allow you to choose preferences on how you want to boot the system.

- From the selections, choose Safe Mode with Networking. Please use keyboard's arrow up/down to navigate between selections and press Enter on the keyboard to proceed. Keep in mind that booting Windows in Safe Mode only loads minimum driver files. Thus, most of the devices will not be available on this mode. Seeing pixilated images on the screen is normal since your current resolution is set to low.

SafeMode Networking

Procedure 2: Scan and remove Windows Virtual Security files with MalwareBytes Anti-Malware

To remove Windows Virtual Security, download Malwarebytes Anti-Malware by clicking on the button below. This tool is effective in getting rid of Trojans, viruses and malware.

Download Windows Virtual Security Removel Tool

1. After downloading, please install the program using the default settings.
2. At the end of the installation, please make sure that it will download necessary updates.
3. Once update has completed. The tool will launch.
4. Thoroughly scan the computer and remove all threats detected by this anti-malware program.

Procedure 3: Run Symantec's ZeroAccess Fix Tool to remove Windows Virtual Security components.

This tool from Symantec can remove infections of Windows Virtual Security as well as other variants of the same nature.

1. Click on the button below to download ZeroAccess Fix Tool. Save the file FixZeroAccess.exe to your desktop or any convenient location.

Download FixZeroAccess

2. You need to close any running programs before running this tool.
3. Turn OFF System Restore if you are using Windows XP. Windows Virtual Security files may hide some of its components on system restore files.
4. Next, browse the folder where you saved the file FixZeroAccess.exe. Double-click on it to initiate the tool. To run the file in Windows Vista and Windows 7, right-click on it and choose 'Run as administrator' from the selection.

Icon of ZeroAccessFix Run As Administrator

5. It will display End User License Agreement (EULA), please click on I accept to use the program.
6.Click on Proceed to begin the removal process, let the tool to run and do its course.
7. If it requires you to restart Windows, please do so. This method may remove Windows Virtual Security components such as files and hidden modules.

Restart Windows

8. When Windows starts, ZeroAccess Fix Tool will provide some details of the infection.
9. If it prompts for update, you need to run LiveUpdate to make sure that it contains the most recent virus definitions.
10. Wait for the tool to complete the scan process. When done, it will issue a message and specify identified threats. These threats are removed during the scan process, so, there is no need to worry about their presence.

Procedure 4: Make sure that Windows Virtual Security is 100% deleted with Avast aswMBR

A Trojan often drops malware using an advance technology known as rootkit. It hides the installation of Windows Virtual Security from your anti-virus program and injects malicious code to running Windows processes. To complete the clean-up process, you also need to scan and remove rootkit Trojan.

1. Download aswMBR from Avast server. Save it to your computer.

Avast Rootkit Scanner

2. Double-click on the file aswMBR.exe to run the program.
3. If it prompts you to download the latest Avast! virus definition, please click Yes. This is necessary to identify most recent version of the Trojan as well as hidden files of Windows Virtual Security.

Updating aswMBR

4. Click on Scan button to start checking your computer for presence of rootkit Trojan and other viruses. It will display a message "Scan finished successfully" when done.

aswMBR Scan

5. Click Fix or FixMBR to start removing infection. If aswMBR contains the latest Avast! virus definition file, it will automatically clean infected files on your PC.

Protect your PC from Windows Virtual Security or Similar Attack

Turn On Security Features of your Internet Browser

Internet Explorer - Activate SmartScreen Filter

Internet Explorer versions 8 and 9 has this feature called SmartScreen Filter. It helps detect phishing web sites and protect you from downloading malicious files online. You may have avoided Windows Virtual Security virus if this has been active on your PC. To turn on SmartScreen Filter, follow these steps:

1. Please open Internet Explorer.
2. On top menu, select Tools (IE 9). For IE 8, please look for Safety menu.
3. Select SmartScreen Filter from the drop-down list and click on Turn on SmartScreen Filter.

IE SmartScreen Filter

4. Please restart Internet Explorer.

Google Chrome's Enable Phishing and Malware Protection

With Google Chrome's Phishing and Malware Detection feature, you will have lesser risks browsing the web. It will display a warning when the site you are trying to visit is suspicious. To enable Phishing and Malware Protection, please do these steps:

1. Open Google Chrome.
2. Click on the Customize and control Google Chrome (3-Bars Icon) located on top right corner of the browser.
3. Select Settings from the drop-down list.
4. Once on the settings page, click on Show advanced settings... at the bottom of the page to see the rest of the Chrome setup.
5. Locate Privacy section and mark 'Enable phishing and malware protection'.

Chrome Security Settings

6. Please restart Google Chrome. New settings keep your browser safe while surfing the web.

Mozilla Firefox - Block Attack Sites and Web Forgeries

Phishing and Malware Protection is a built-in feature on Firefox version 3 or later. It warns you when a page you are trying to visit contains phishing content or an attack site designed to drop threats on the computer. To help you keep safe while browsing the Internet using Firefox, please follow this guide:

1. Open Mozilla Firefox browser.
2. On top menu, click on Tools. Then select Options from the list.
3. Select Security and put a check mark on the following items:

  • Warn me when sites try to install add-ons
  • Block reported attack sites
  • Block reported web forgeries

Firefox Security Settings

Remove Windows Virtual Security & Protect Your Computer Now!

Get Protection
30 Day Trial

2 thoughts on “Windows Virtual Security

  • August 10, 2012 at 11:57 pm

    Good advice, although ultimately I’m not sure it’s 100% successful – I use Mozilla Firefox, and all three of those options were checked _before_ Windows Virtual Security found its way onto my computer.

    Another note: I was able to complete procedure 2 in safe mode (IOW, to prevent WVS from manifesting itself in the process), but not procedure 3. Not sure if that’s a universal issue or just one with my computer – but it didn’t matter anyway, as neither procedures 3 nor 4 really did anything. My issue seems to have solved itself with procedure 2 (there was exactly one virus, plus I was in safe mode anyway).

    Interestingly, WVS “unexpectedly shut down” about 10 minutes after I first noticed it yesterday morning – the computer was either on or hibernating the whole rest of the day and never came back. Then I saw it again this morning, and I didn’t want to take any risks – before I did anything else I reset my computer to three days ago, which a) allowed my old antivirus software to function again and b) allowed me to use the Internet again (something I wasn’t able to do under WVS, not with Firefox, not with IE, not even with Google Chrome which I had previously downloaded as a backup browser). Then I immediately typed “windows virtual security” into Google and found you guys – good to know that my suspicions on WVS were true. (There’s a reason why you can’t access WVS via “Security” in the Control Panel, at least not on Vista. Plus, I have a personal rule of never paying for any software I find online – so take _that_, hackers!)

    Anyway, if WVS ever comes back again (remember, neither procedure 3 nor 4 did anything, and I didn’t perform either in safe mode), I’d like to hear your response and take it from there. Thanks!

  • August 11, 2012 at 4:31 am

    Senior is right. Procedure 2 using malwarebytes alone have removed Windows Virtual Security. However, tech staff from this web site includes rootkit removal due to some cases that attackers are using the Trojan to spread the malware.

    In my case, Trojan did not implicate the infection. I think Windows Virtual Security is bundled with a crack program I downloaded from warez.

    Thanks to this guide. It really helps.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Please support Im-Infected.com
By clicking any of these buttons you help our site to get better