HDD Tools is a copy of Smart HDD, HDD Plus and some other rogues from the same family. These misleading applications are being promoted through the use of fake online scanners, browser hijackers, trojans and other malware. While HDD Tools is running, it will block other programs in your computer saying that they are infected and etc. You will see a fake error message when you attempt to open a program.
Windows detected a hard drive problem.Furthermore, the rogue program will display fake warnings saying that there are numerous critical registry and hard drive errors. The text of some of the alerts you may see include:
A hard drive error occurred while starting the application.
Critical Error!
Damaged hard drive clusters detected. Private data is at risk.
Critical Error
Hard Drive not found. Missing hard drive.
Critical ErrorAfter the fake scan, HDD Tools reports 11 critical errors. It doesn't matter if it's a new laptop or an old PC. The rogue program will find the same errors on both computers.
A critical error has occurred while indexing data stored on hard drive. System restart required.
- Drive C initializing error
- Hard drive doesn't respond to system commands
- Data Safety Problem. System integrity is at risk.
- Registry Error - Critical Error
HDD Tools removal instructions:
1. Open Task Manager (Ctrl+Alt+Delete) or use Process Explorer.
2. Click on the Processes tab.
3. End HDD Tools processes, e.g. 15485473.exe and hF34GdfrTge.exe.
4. Download TDSSKiller (free utility from Kaspersky Lab) and run it. Remove TDSS rootkit if exist.
5. Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Don't forget to update the installed program before scanning.
6. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET Smart Security.
HDD Tools removal instructions (in Safe Mode with Networking):
1. Reboot your computer is "Safe Mode with Networking". As the computer is booting tap the "F8 key" continuously which should bring up the "Windows Advanced Options Menu" as shown below. Use your arrow keys to move to "Safe Mode with Networking" and press Enter key. Read more detailed instructions here: http://www.computerhope.com/issues/chsafe.htm
NOTE: Login as the same user you were previously logged in with in the normal Windows mode.
2. Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Don't forget to update the installed program before scanning.
3. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET Smart Security.
HDD Tools associated files and registry values:
Files:
- %Temp%\[SET OF RANDOM NUMBERS]
- %Temp%\[SET OF RANDOM NUMBERS].exe
- %Temp%\[SET OF RANDOM CHARACTERS].exe
- %Temp%\dfrg
- %Temp%\dfrgr
- %Temp%\[SET OF RANDOM CHARACTERS].dll
- %UserProfile%\[SET OF RANDOM CHARACTERS].DAT
- C:\WINDOWS\nwcacm.dll
- %UserProfile%\Desktop\HDD Tools.lnk
- %UserProfile%\Start Menu\Programs\HDD Tools\
- %UserProfile%\Start Menu\Programs\HDD Tools\HDD Tools.lnk
- %UserProfile%\Start Menu\Programs\HDD Tools\Uninstall HDD Tools.lnk
C:\Documents and Settings\[UserName]\Local Settings\Temp (in Windows 2000/XP)
C:\Users\[UserName]\AppData\Local\Temp (in Windows Vista & Windows 7)
%UserProfile% refers to:
C:\Documents and Settings\[UserName]\ (in Windows 2000/XP)
C:\Users\[UserName]\ (in Windows Vista & Windows 7)
Registry values:
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[SET OF RANDOM NUMBERS]"
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[SET OF RANDOM NUMBERS].exe"
No comments:
Post a Comment