Welcome Guest (Log In | Create Account)
New Member? Join for free.

Windows Warding Module Removal Guide

By on December 4, 2013 @ 10:20 PM | Read 6,124 times.
  • Print this page

Windows Warding Module is a rogue anti-spyware program from the Rogue.FakeVimes family of computer infections. This program is considered a rogue anti-spyware program because it does not allow you to access your Windows desktop, automatically terminates legitimate applications, and displays false scan results and security alerts that are designed to scare you into purchasing the program. This program will also be configured to start automatically before your Windows desktop is shown, which makes your computer unusable until the infection is removed. Windows Warding Module is distributed through web sites that display a fake online virus scanner that states your computer is infected and then prompts you to download the installation file. This infection is also promoted by hacked web sites that contain exploit code that tries to install the infection on your computer without your permission or knowledge.

Once Windows Warding Module is installed it will be configured to automatically start when you login to Windows. Once started, it will pretend to scan your computer and then states that there are numerous infections present. If you attempt to remove any of these supposed infections, the program will state that you first need to purchase a license before being allowed to do so. As all of the scan results are false, please ignore any prompts to purchase the program.

 

Windows Warding Module screen shot
Windows Warding Module screen shot
For more screen shots of this infection click on the image above.
There are a total of 4 images you can view.

 

To protect itself from being removed, Windows Warding Module will also block you from running any legitimate application on your computer. It does this to prevent you from running legitimate security software that may detect it as an infection and remove it. The message that you will see when you attempt to run a program is:

Firewall has blocked a program from accessing the Internet
c:\windows\system32\iexplore.exe
is suspected to have infected your PC.
This type of virus intercepts entered data and transmits them
to a remote server.

When you see this message please ignore it as your programs are not infected and will work normally after this infection is removed.

While Windows Warding Module is running it will also display fake security alerts that are designed to make you think your computer has a severe security problem. Some of these warnings include:

Error
Trojan activity detected. System integrity at risk.
Full system scan is highly recommended.

Error
System data security is at risk!
To prevent potential PC errors, run a full system scan.

Warning! Identity theft attempt detected
Hidden connection IP: xx.xxx.xxx.xxx
Target: Microsoft Corporation keys
Your IP: 127.0.0.1

Just like the scan results, these warnings are fake and can be ignored.

Without a doubt, this computer infection was created to scare you into purchasing the program by making you think your computer is infected. It goes without saying that you should definitely not purchase Windows Warding Module, and if you already have, please contact your credit card company and dispute the charges stating that the program is a scam and a computer virus. To remove Windows Warding Module and other related malware, please use the free removal guide below.

 

Threat Classification:

 

Advanced information:

View Windows Warding Module files.
View Windows Warding Module Registry Information.

 

Tools Needed for this fix:

 

Symptoms that may be in a HijackThis Log:

O4 - HKCU\..\Run: [GuardSoftware] %AppData%\guard-<random>.exe

 

Guide Updates:

12/04/13 - Initial guide creation.

 


Automated Removal Instructions for Windows Warding Module using Emsisoft Anti-Malware:

 

  1. For the first part of this removal guide you will need to use a different computer than the infected one in order to download and save some files that we need for the fix.

  2. On a clean computer, start a web browser and download and save the following Windows Registry file to your desktop from the link below:

    http://download.bleepingcomputer.com/reg/RemVimes.reg

  3. When the file has finished downloading, please burn it on to a CD or save it to a USB drive so that we can transfer the file to the infected computer.

  4. When you have finished saving the RemVimes.reg registry file to a removable media, please reboot the infected computer. While the computer is starting please being to repeatedly tap the F8 key on your keyboard. This will open up the Advanced Boot Options screen, in Windows 7 or Vista, or the Windows Advanced Options Menu in Windows XP. The screen that you need to get to will look similar to the one below.


    Advanced Boot Options

    At the above screen you will see a variety of options that can be used to boot Windows. Using the arrow keys on your keyboard, highlight the option labeled Safe Mode with Command Prompt. Once it is highlighted, click on the Enter key on your keyboard.

  5. Windows will now start and if you have multiple accounts or a password on your single account, you will be presented with a screen asking you to login to Windows. Please select your account and enter any password that you may have. When done, the Windows Command Prompt will open and you will see a screen similar to the one below.


    Safe Mode With Command Prompt

    The Command Prompt allows you to type commands and then press Enter on your keyboard to execute them. In this Command Prompt window, please type explorer.exe and then press Enter on your keyboard.

  6. The Windows desktop will now appear. When the desktop appears you can then close the Command Prompt window by clicking on the X.

  7. Now insert your CD or USB drive and open up the drive letter associated with your inserted media. You can access this drive letter by opening the Computer icon on your desktop or from the Start Menu. Once the drive letter is open, double-click on the RemVimes.reg and allow the data to be merged when you are prompted. Once the data has been merged, you can press the OK button and remove the removable media from your computer.

  8. Please reboot your computer into the normal Windows mode and login as the infected user. When you are back at your normal Windows desktop please continue with the next step.

  9. Now that you are at your normal Windows desktop, we need to download Emsisoft Anti-Malware, which will clean the remnants of this infection for free. Please download and save the Emsisoft Anti-Malware setup program to your desktop from the link below:

    http://www.bleepingcomputer.com/download/emsisoft-antimalware/

    The download is fairly large, so please be patient while it downloads.

  10. Once the file has been downloaded, double-click on the EmsisoftAntiMalwareSetup.exe icon to start the program. If Windows Smart Screen issues an alert, please allow it to run anyway.

    If the setup program displays an alert about safe mode, please click on the Yes button to continue. You should now see a dialog asking what language you would like to use. Please select the language you wish to use and press the OK button.

  11. You will eventually get to a screen asking the mode that you wish to use Emsisoft Anti-Malware.


    License Type

    If you wish to try the 30 days free trial, then select that option and press the Next button. If you wish to use the free version, which can scan and delete but not provide real-time protection, click on the Freeware mode link as shown by the red arrow in the image above.

  12. You will now be at a screen asking if you wish to join Emsisoft's Anti-Malware network. Read the descriptions and uncheck the options that you wish to use. When you are ready click on the Next button.

  13. Emsisoft Anti-Malware will now begin to update it's virus detections.


    Updated Completed

    Please be patient as it may take a few minutes for the updates to finish downloading.

  14. When the updates are completed, click on the Clean computer now button. Emsisoft Anti-Malware will start to load its scanning engine and then display a screen asking what type of scan you would like to perform.


    Scan Type

    Please select the Deep Scan option and then click on the Scan button. The Deep Scan option will take the longest time to scan your computer, but will also be the most thorough. As you are here to clean infections, it is worth the wait to make sure your computer is properly scanned.

  15. Emsisoft Anti-Malware will now start to scan your computer for rootkits and malware. Please be patient while Emsisoft Anti-Malware scans your computer.

  16. When the scan has finished, the program will display the scan results that shows what infections where found.



    Scan Results


    Now click on the Quarantine Selected Objects button, which will remove the infections and place them in the program's quarantine. You will now be at the last screen of the Emsisoft Anti-Malware setup program, which you can close. If Emsisoft prompts you to reboot your computer to finish the clean up process, please allow it to do so.

  17. Please reboot your computer into the normal Windows mode and when you are back at your normal Windows desktop or Windows Start Screen please continue with the next step.

  18. As this infection is known to be installed by vulnerabilities in out-dated and insecure programs, it is strongly suggested that you use Secunia PSI to scan for vulnerable programs on your computer. A tutorial on how to use Secunia PSI to scan for vulnerable programs can be found here:

    How to detect vulnerable and out-dated programs using Secunia Personal Software Inspector

Your computer should now be free of the Windows Warding Module infection. If your current anti-virus solution let this infection through, you may want to consider purchasing the full version of Emsisoft Anti-malware to protect your computer against these types of threats in the future.

If you are still having problems with your computer after completing these instructions, then please follow the steps outlined in the topic linked below:

Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help

 


 

Associated Windows Warding Module Files:

%AppData%\guard-<random>.exe
%AppData%\result1.db

File Location Notes:

%AppData% refers to the current users Application Data folder. By default, this is C:\Documents and Settings\<Current User>\Application Data for Windows 2000/XP. For Windows Vista and Windows 7 it is C:\Users\<Current User>\AppData\Roaming.

 

Associated Windows Warding Module Windows Registry Information:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "GuardSoftware" = "%AppData%\guard-<random>.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell"="C:\\Users\\User\\AppData\\Roaming\\guard-<random>.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations "LowRiskFileTypes"=".zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments "SaveZoneInformation"=1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe "Debugger"="svchost.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe "Debugger"="svchost.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorAdmin" = "0"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorUser" = "0"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "EnableLUA" = "0"

 


 

This is a self-help guide. Use at your own risk.

BleepingComputer.com can not be held responsible for problems that may occur by using this information. If you would like help with any of these fixes, you can ask for malware removal assistance in our Virus, Trojan, Spyware, and Malware Removal Logs forum.

If you have any questions about this self-help guide then please post those questions in our Am I infected? What do I do? and someone will help you.


Advertise   |   About Us   |   User Agreement   |   Privacy Policy   |   Contact Us   |   Sitemap   |   Chat   |   Tutorials   |   Uninstall List
Tech Support Forums   |   The Computer Glossary   |   RSS Feeds   |   Startups   |   The File Database   |   Virus Removal Guides   |   Downloads


© 2003-2014 All Rights Reserved Bleeping Computer LLC.