Monday 27 December 2010

How to Remove HDD Low (Uninstall Guide)

HDD Low is a rogue disk defragmenter and PC optimization program. It reports false system security threats, hard drive problems, and Windows registry errors to make you think that there is something wrong with your computer. The rogue program initiates a fake scan of your computer and reports 11 errors: Drive C initializing error, Registry Error - Critical Error, 32% of HDD space is unreadable and some other problems. HDD Low displays fake error messages and notifications saying that your hard drive is corrupted or missing. It blocks other programs on your computer and may even hijack your web browser. In some cases, HDD Low comes bundled with rootkit which makes the removal procedure even more complicated. You will have to use several malware removal tools to remove HDD Low from your computer so that it won't hide deep in the system and won't come back after a few days. If you have this virus on your computer, please follow the removal instructions below to remove HDD Low and any related malware from your computer for free using legitimate anti-malware programs. Also, if you have any questions about HDDLow, please leave a comment below. Good luck and be safe online!



HDD Low is from the same family as Win Scanner, Smart HDD, and Disk Repair.


HDD Low removal instructions:

1. Open Task Manager (Ctrl+Alt+Delete) or use Process Explorer.
2. Click on the Processes tab.
3. End HDD Low proces, e.g. GslHrwOfr.exe or 14835202.exe.



4. Download TDSSKiller (free utility from Kaspersky Lab) and run it. Remove TDSS rootkit if exist.



5. Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Don't forget to update the installed program before scanning.

6. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET Smart Security.


HDD Low removal instructions (in Safe Mode with Networking):

1. Reboot your computer is "Safe Mode with Networking". As the computer is booting tap the "F8 key" continuously which should bring up the "Windows Advanced Options Menu" as shown below. Use your arrow keys to move to "Safe Mode with Networking" and press Enter key. Read more detailed instructions here: http://www.computerhope.com/issues/chsafe.htm


NOTE: Login as the same user you were previously logged in with in the normal Windows mode.

2. Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Don't forget to update the installed program before scanning.

3. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET Smart Security.


HDD Low associated files and registry values:

Files:
  • %Temp%\[SET OF RANDOM CHARACTERS].exe
  • %Temp%\dfrg
  • %Temp%\dfrgr
  • %Temp%\~[SET OF RANDOM CHARACTERS]
  • %Temp%\
  • %Temp%\[SET OF RANDOM CHARACTERS].dll
  • %UserProfile%\Desktop\HDD Low.lnk
  • %UserProfile%\Start Menu\Programs\HDD Low\
  • %UserProfile%\Start Menu\Programs\HDD Low\HDD Low.lnk
  • %UserProfile%\Start Menu\Programs\HDD Low\Uninstall HDD Low.lnk
%Temp% refers to:
C:\Documents and Settings\[UserName]\Local Settings\Temp (in Windows 2000/XP)
C:\Users\[UserName]\AppData\Local\Temp (in Windows Vista & Windows 7)

%UserProfile% refers to:
C:\Documents and Settings\[UserName]\ (in Windows 2000/XP)
C:\Users\[UserName]\ (in Windows Vista & Windows 7)

Registry values:
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[SET OF RANDOM CHARACTERS]"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[SET OF RANDOM CHARACTERS].exe"
Share this information with other people:

No comments:

Post a Comment