Remove File Recovery

What is File Recovery?

File Recovery is classified as a new version of Fake HDD malware. It belongs to the Win32/FakeSysdef family. This malware often infects PC systems that have older versions of Flash, Java or PDF readers and the attack is described as silent and may even require no intervention at all. But even if File Recovery is not a huge threat to your computer systems it can use Trojans to distribute; you can spot these infections as you receive strange program updates and fake drivers.

Some File Recovery screenshots:
File Recovery

The infection may start as a harmless attack but soon you will find fake alerts that tell you about impending PC malfunction like potential registry failure, hard disk crashes and other serious PC problems. There are also reports that File Recovery can even infect your start menu displaying warnings instead of the typical computer programs that you have installed. To make you think that your computer has serious problems, File Recovery will delete all your shortcuts, so that none of them will appear on your start menu. To make things even worse, File Recovery may use a TDSS and ZeroAccess rootkits to protect and hide its malware files, and also to stop you from launching any anti-malware or security software.

Some of the File Recovery fake security alerts and warnings that users may get:
Hard Drive Boot Sector Reading Error During I/O system initialization, the boot device driver might have failed to initialize the boot device. File system initialization might have failed because it did not recognize the data on boot device.
System blocks were not found This is most likely occurred because of hard disk failure. This may also lead to a potential loss of data.

Common warning messages that you may receive are system blocks, hard disk failure, hard drive reading errors and many more. Clicking any messages will only prompt you to buy the full version of the repair kit and paying for non existing alerts and PC problem fixes. You can remove File Recovery by using reliable anti malware plus running a rootkit scan to totally remove malware files.

Associated File Recovery System Entries and files

File Recovery Processes

File Recovery Files

File Recovery Registry Entries


How to Stop File Recovery Fake Alerts

To register File Recovery and stop its fake warnings, use the following fake license key.

File Recovery registration code: 56723489134092874867245789235982 with any email address

NOTE: this code will NOT remove File Recovery from your computer, it will JUST stop the annoying alerts and messages.


File Recovery Removal Instructions

Step 1: Reboot in Safe Mode with Networking

To restart your computer in Safe Mode with networking:

  1. Restart your computer.

  2. When you see the computer manufacturer's logo, press and hold the F8 key.

  3. On the Advanced Boot Options screen, use the arrow keys to highlight Safe Mode with Networking, and then press Enter.
    Safe Mode with Networking Screen

  4. Log on to your computer with a user account that has administrator rights.


Step 2: Disable File Recovery Proxy Server

File Recovery may add a proxy to its package. Its goal is to get the information through the Web connection (password etc).
It also helps to block the connection to certain sites (eg malware removal help sites) or to block the download of trustworthy antispyware and antivirus programs.

The following steps reset the Internet Explorer proxy settings in the Windows registry so that you can access the Internet again:

  1. Click Start, and then click Run. (Keyboard Shortcut: Windows logo + R)

  2. Copy and paste or type the following text in the Open box in the Run dialog box:

    Run dialog box

  3. Click OK.

  4. click Start, and then click Run.

  5. Copy and paste or type the following text in the Open box in the Run dialog box:

  6. Click OK.

Now that you have disabled File Recovery proxy server, you will be able to browse the web again with Internet Explorer.

  1. Click Start, and then click Run. (Keyboard Shortcut: Windows logo + R)

  2. Type in iexplore.exe.
    Run iexplore.exe


Step 3: Remove the File Recovery rootkit

File Recovery may be bundled with the TDSS rootkit. A rootkit is a program that hides the presence of malware in the system.
Kaspersky offers a free utility, TDSSKiller, that removes malware belonging to the family Rootkit.Win32.TDSS (aka Tidserv, TDSServ, Alureon).

So to find out if your system is infected with any rootkits that make File Recovery hidden and very difficult to remove, follow the steps below:

  1. Download Kaspersky TDSSKiller to your desktop from the following link:
    Kaspersky TDSSKiller Download link

  2. File Recovery may block all executable files, so when you launch the TDSSKiller file, it will execute itself.
    So Rename tdsskiller.exe to tdsskiller.com or winlogon.exe or iexplore.exe
    Rename tdsskiller.exe

  3. After you run TDSSKiller (or the renamed version), in the welcome screen click on Start Scan.
    Kaspersky TDSSKiller Start Scan

  4. TDSSKiller will now scan your computer.
    Kaspersky TDSSKiller Scan Progress

  5. If any infection was found, TDSSKiller will display a screen results like the following one:
    Kaspersky TDSSKiller Scan Results
    Then click on the Continue button and TDSSKiller will clean the infections.

  6. A reboot might require after disinfection. In this case, click on Reboot Computer
    Kaspersky TDSSKiller Reboot Computer

  7. After the reboot, start your computer again in Safe Mode with Networking and then disable any File Recovery Proxy Server (See Step 1&2).


Step 4: Stop File Recovery processes

In order to stop File Recovery from interfering with our removal procedure, we need to end and kill its processes. For this, we will use a FREE powerful utility called RogueKiller.

RogueKiller (by Tigzy) is a tool written in C++, which scans the running processes, and kills those which are malicious. This tool was developed based on speed execution, which will clean the running processes before being killed.

To terminate File Recovery process:

  1. Always in Safe Mode Download RogueKiller to your desktop from the following link:

    RogueKiller Download link
    RogueKiller Setup Icon
    RogueKiller is a portable application, so you don't need to install anything.

  2. File Recovery may block all executable files, so when you launch the RogueKiller file, it will execute itself. So Rename RogueKiller.exe to RogueKiller.com or winlogon.exe or iexplore.exe

  3. At this point a "pre-scan" will complete and stop any malicious process. Also a list of options will appear along the right-hand side.
    RogueKiller Pre-Scan


Step 5: Remove File Recovery registry keys

To remove File Recovery malicious registry entries, we will need RogueKiller again.
RogueKiller also checks for rogue Registry entries, rogue drivers, and Master Boot Record (MBR) issues, so rootkits will be cut.
RogueKiller can also fix and restore a Host file, delete any Proxy entries, repair shortcut problems and unhide files.

CAUTION: This tool is not for beginners. In this step we will ONLY use the Registry tab.

To Delete File Recovery Registry entries:

  1. Always in Safe Mode run a scan, open RogueKiller and click on Scan.
    RogueKiller Scan Progress

  2. After a while, you should see a screen with scan results like the following one:
    RogueKiller Scan Results

  3. Click on the Registy tab, then click on the Delete button.
    RogueKiller Delete Registry Entries


Don't Reboot you computer yet, please stay in Safe Mode.


Step 6: Remove File Recovery files

Malwarebytes Anti-Malware is simply the best known FREE malware removal tools online.

To remove File Recovery files:

  1. Download Malwarebytes to your desktop from the following link:
    Malwarebytes Anti-Malware Download link
    MBAM Setup Icon

  2. Just Follow the easy setup process. Do not make any changes to the default settings
    When the setup is finished, make sure you leave both the Update Malwarebytes Anti-Malware and Launch Malwarebytes Anti-Malware checked.
    You can check or uncheck the Enable free trial of Malwarebytes Anti-Malware PRO as the malware removal is FREE.
    Then click on the Finish button. If Malwarebytes prompts you to reboot, please do not do so.
    Malwarebytes Anti-Malware Setup Wizard

  3. When Malwarebytes is launched, it will ask you to update the databse. Just click OK.
    Malwarebytes Anti-Malware Updating

  4. On the Scanner tab,select Quick scan and then click on the Scan.
    Malwarebytes Anti-Malware Quick Scan Screen

  5. When the scan is finished a message box will appear, click OK to continue.
    Then the screen results will show the various malware infections including File Recovery that Malwarebytes has found on your computer.
    the image below is just an example, your results will be different.
    Click on the Remove Selected button.
    Malwarebytes Anti-Malware Quick Scan Results Screen

  6. After Malwarebytes has finished the removal of File Recovery, you will get a message stating that you need to reboot your computer.
    Just Do so, and restart your computer in Normal Mode.
    Malwarebytes Anti-Malware Quick Reboot Message


Step 7: Unhide your files

As File Recovery is from the family of FakeHDD, it will make you shortcuts unsuable and hide your files from your desktop, Start menu and discs.

To Fix this issue:

  1. In Normal Mode run a RogueKiller scan.

  2. When the scan is complete, go to the Shortcuts tab, and click on the Fix Shortcuts button on the right.
    RogueKiller Unhide Fix


Step 8: Check for any File Recovery left over

To make sure that your computer is now completely free of File Recovery, redo a Malwarebytes scan in Normal Mode.
After your are finished, Reboot your PC as asked by Malwarebytes anti-malware.


About

Sarah MelbenchI am Sarah Melbench and I am an Anti-Malware Enthusiast! I created this website to spread the word about the lastest malware infections. I write guides and tutorials about malware removal as well as reviews of anti-malware programs.Follow me on G+

Tagged with: ,
Posted in Manual Malware Removal

Leave a Reply

Your email address will not be published. Required fields are marked *

*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>