File Recovery Removal Guide

File Recovery virus is a malicious software also known as rogue security software, which will report inexistent computer infections in an attempt to convince victims to buy this fake product.

If your PC is infected with File Recovery virus  ,then you are seeing this screens:

File Recovery rogue software

File Recovery virus registrations keys

As an optional step,you can use one of the following license key to register File Recovery virus and stop the fake alerts. 56723489134092874867245789235982

Please keep in mind that entering the above registration code will NOT remove File Recovery virus from your computer , instead it will just stop the fake alerts so that you’ll be able to complete our removal instructions without being interrupted by this rogue security software.

Removal Instructions for File Recovery virus

STEP 1 : Start your computer in Safe Mode with Networking

  1. To get your PC into Safe Mode with Networking,restart your computer and while the computer is booting press and hold the F8 key before the Windows start-up logo appears.
    With some computers, if you press and hold a key as the computer is booting you will get a stuck key message. If this occurs, instead of pressing and holding the F8 key, tap the F8 key continuously until you get the startup menu.
  2. The Windows Advanced Options Menu screen will now be dispalyed,and you’ll need to use the arrow keys to highlight Safe Mode with Networking , and then press ENTER key.
    [Image: Safemode.jpg]
  3. Log on to your PC with a user account that has administrator rights

STEP 2: Check for File Recovery virus malicious proxy server

In some cases,File Recovery virus may add a malicious proxy which will prevent you from accessing the internet.To check and remove any malicious proxy, follow the below steps.
Start the Internet Explorer browser → Click on the gear icon [Image: Icon gear on IE 9] Tools for Internet Explorer 8 Users) → Select Internet Options → On the Connections tab → Click on LAN Settings → Uncheck the option Use a proxy server for your LAN

[Image:remove File Recovery virus malicious proxy]

This should remove the malicious File Recovery virus proxy server and allow you to use the internet again.

If you are a Firefox users, go to Firefox(upper left corner) → Options → Advanced tab → Network → Settings → Select No Proxy


STEP 3: Stop File Recovery virus malicious processes with RKILL

RKILL is a program that will attempt to terminate any malicious processes associated with File Recovery virus ,so that we will be able to perform the next step without being interrupted by this malicious software.
As RKILL will only terminate File Recovery virus running process, and not actually remove the malicious files, after running it you should not reboot your computer as the malware processes that are configured to start automatically will just be started again.

  1. While your PC is in Safe Mode with Networking,download the latest version of RKILL.
    Please note that we will need to be using a renamed version of RKILL so that File Recovery virus won’t block this utility from running.
    RKILL DOWNLOAD LINK (This link will automatically download RKILL renamed as iExplore.exe)
  2. Double-click on the iExplore to start RKILL and automatically attempt to stop any processes associated with File Recovery virus .
    [Image: run-rkill-1.png]
  3. RKill will now start working in the background, please be patient while the program looks for various malware programs and tries to terminate them.
    [Image: run-rkill-2.png]
    IF your having problems while trying to start or RKILL, you can download another renamed versions of RKill from here.
  4. When RKILL has completed its task, it will generate a log.Only then you can proceed with the rest of the guide.
    [Image: File Recovery virus  rkill3.jpg]

WARNING: Do not reboot your computer after running RKill as the malware process will start again , preventing you from properly performing the next step.


STEP 4: Remove File Recovery virus malicious files from your PC

To remove the File Recovery virus malicious files we will be using Malwarebytes Anti-Malware Free, a powerful on-demand scanner which can detect and remove this infection.

  1. Download the latest official version of Malwarebytes Anti-Malware Free.
    MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK (This link will open a download page in a new window from where you can download Malwarebytes Anti-Malware Free)
  2. After you have downloaded Malwarebytes Anti-Malware,double click on mbam-setup.exe file to start the installation process and then follow the prompts to install this product.
    When the program has finished installing, make sure you leave both the Update Malwarebytes Anti-Malware and Launch Malwarebytes Anti-Malware checked. Then click on the Finish button. If Malwarebytes prompts you to reboot, please do not do so.
    [Image: install-malwarebytes.png]
  3. Malwarebytes Anti-Malware will now start and you’ll be prompted to start a trial period , please select ‘Decline‘ as we just want to use the on-demand scanner.
    [Image: decline-trial-malwarebytes.png]
  4. On the Scanner tab,please select Perform full scan and then click on the Scan button to start scanning your computer for any possible infections.
    [Image: malwarebytes-full-system-scan.png]
  5. Malwarebytes’ Anti-Malware will now start scanning your computer for File Recovery virus malicious files as shown below.
    [Image: malwarebytes-scanning.png]
  6. When the scan is finished a message box will appear, click OK to continue.
    [Image: malwarebytes-scan-finish.png]
  7. You will now be presented with a screen showing you the malware infections that Malwarebytes Anti-Malware has found on your PC.
    Make sure all the infected objects are Checked(Ticked) for removal and then click on the Remove Selected button to remove them.
    [Image: malwarebytes-scan-results.png]
  8. Malwarebytes Anti-Malware will now start removing the malicious files.
    If during the removal process Malwarebytes will display a message stating that it needs to reboot, please allow this request.

    [Image: malwarebytes-reboot-prompt.png]

You can now start your computer in normal mode as this infections should have now been removed from your PC.


STEP 5: Double check for any left over malicious files with HitmanPro

HitmanPro is a cloud on-demand scanner , that uploads unknown files to the a scan sloud where are analyzed using the anti-virus programs of 5 different vendors (Bitdefender,Emsisoft,G-Data,IKARUS and Dr. Web).

  1. While in Normal Mode,download the latest official version of HitmanPro.
    HITMANPRO DOWNLOAD LINK (This link will open a download page in a new window from where you can download HitmanPro)
  2. Double click on the HitmanPro.exe file to start the HitmanPro and then follow the prompts to start a system scan with this program.
    [Image: hitmanpro-scanning.png]
    NOTE: IF you have problems starting HitmanPro,hold down the left CTRL-key while you start HitmanPro and all non-essential processes are terminated, including the malware process. (You can watch this video to see how you can start HitmanPro in ForceBreach mode :  http://www.youtube.com/watch?v=m6eRWTv2STk)
  3. HitmanPro will start scanning your system for malicious files. Depending on the the size of your hard drive, and the performance of your computer, this step will take anywhere from 5 to 10 minutes.
    [Image: hitmanpro-scanning.png]
  4. Once the scan is complete,a screen displaying all the malicious files that the program has found will be shown as seen in the image below.After reviewing each malicious object click Next.
    [Image: hitmanpro-scan-results.png]
  5. Click Activate free licenseto start the free 30 days trial and remove the malicious files.
    [Image: hitmanpro-activation.png]
  6. HitmanPro will now start removing the infected objects, and in some instances, may suggest a reboot in order to completely remove the malware from your system. In this scenario, always confirm the reboot action to be on the safe side.

STEP 6: Restore your shortcuts and remove any left over malicious registry keys

File Recovery virus has moved your shortcuts files in the Temporary Internet folder and added some malicious registry keys to your Windows installation , to restore your files we will need to perform a scan with RogueKiller.

  1. Please download the latest official version of RogueKiller.
    ROGUEKILLER DOWNLOAD LINK (This link will automatically download RogueKiller)
  2. Double click on RogueKiller.exe to start this utility and then wait for the Prescan to complete.This should take only a few seconds and then you can click the Start button to perform a system scan.
    [Image: roguekiller-1.png]
  3. After the scan has completed, press the Delete button to remove any malicious registry keys.
    [Image: roguekiller-2.png]
  4. Next we will need to restore your shortcuts, so click on the ShortcutsFix button and allow the program to run.
    [Image: roguekiller-1.png]

STEP 7: Unhide your files and folders

File Recovery virus modifies your file system in such a way that all files and folders become hidden, to restore the default settings , you’ll need to run the below program.

  1. Download Tweaking.com-UnhideNonSystemFiles.exeto unhide your files and folders.
    Tweaking.com-UnhideNonSystemFiles.exe LINK (This link will open a download page in a new window from where you can download this utility)
  2. Double click on Tweaking.com-UnhideNonSystemFiles.exe and when the utility starts click on the ‘Start’ button to unhide your files.
    [Image: unhide-icon.png]

STEP 8: Get your desktop look back!

File Recovery virus changes your desktop background to a solid black color,to change it back to default one follow the below instruction.

  • Windows XP : Click on the Start button and then select Control Panel. When the Control Panel opens, please click on the Display icon. From this screen you can now change your Theme and desktop background.
  • Windows 7 and Vista : Click on the Start button and then select Control Panel. When the Control Panel opens, please click on the Appearance and Personalization category. Then select Change the Theme or Change Desktop Background to revert back to your original Theme and colors.

It’s your turn to help!

All our instructions are completely free of any charge. If you like to support our work with a donation, your charitable contribution supports our team in their mission against malware.






About George Ionescu

My name is George Ionescu, and I'm one of the "good people" from PcInfected.com
I have joined this website in an attempt to help the Internet users when trying to remove malware from their machines.

  • Miatovia

    Thanks!

  • Mick

    I have no idea where how this virus got on to my computer but now it is gone! Thank you very, very much!

  • eva b

    I can’t thank you enough for your help! The goodness in you far outweighs the evilness in others. I freaked out when this file recovery messed up my computer but it’s now back to where it was. Thank you again!

  • Paul

    This “File Recovery” thing just happend to my computer and I am glad you have such detailed instructions on how to resolve it. Right before this happened to my computer I waws constantly receive popups telling me I needed to update my adobe flash player. As soon as I closed the window it would pop right back up. To my knowledge my flash player was fully up to date and all the websites I visited that reequire Adobe flash player were working just fine, but the popup looked legitemately from Adobe to my eye so I proceeded after a while of these relentless popups. Obviously my question is; do you think that this is how the “File Recovery” virus/scam was able to overrun my computer? or do they use some sort of more secretive methods?