Jump to content

Removal instructions for AVC Plus

Recommended Posts

  • Staff

What is AVC Plus?

The Malwarebytes research team has determined that AVC Plus is a fake anti-malware application. These so-called "rogues" use intentional false positives to convince users that their systems have been compromised. Then they try to sell you their software, claiming it will remove these threats. In extreme cases the false threats are actually the very trojans that advertise or even directly install the rogue. You are strongly advised to follow our removal instructions below.

How do I know if I am infected with AVC Plus?

This is how the main screen of the rogue application looks:


You will find this icon in your taskbar:


And see these warnings:






How did AVC Plus get on my computer?

Rogue programs use different methods for spreading themselves. This particular one was installed by an exploit.

How do I remove AVC Plus?

Our program Malwarebytes Anti-Malware can detect and remove this rogue application. But since the rogue blocks all other programs you will have to boot into "Safe mode with networking".

Once you are in safe mode, you can continue with the instructions below.

  • Please download Malwarebytes Anti-Malware to your desktop.
  • Double-click mbam-setup-version.exe and follow the prompts to install the program.
  • At the end, be sure a check-mark is placed next to the following:
    • Enable free trial of Malwarebytes Anti-Malware Premium
    • Launch Malwarebytes Anti-Malware
  • Then click Finish.
  • If an update is found, you will be prompted to download and install the latest version.
  • Once the program has loaded, select Scan now. Or select the Threat Scan from the Scan menu.
  • When the scan is complete , make sure that everything is set to "Quarantine", and click Apply Actions.
  • Reboot your computer if prompted.
Is there anything else I need to do to get rid of AVC Plus?
  • No, Malwarebytes' Anti-Malware removes AVC Plus completely.
We hope our application has helped you eradicate this malicious software. If your current security solution let this infection through, you might please consider purchasing Malwarebytes Anti-Exploit for additional protection.

Technical details for experts

Signs in a HijackThis log:


O4 - HKCU\..\Run: [qcgce2mrvjq91kk1e7pnbb19m52fx1956jc03il0h] C:\Users\{username}\AppData\Local\8fo81vdm.exe
Note: the filename is random.

Alterations made by the installer:


  File System  ===============    In the existing folder C:\Users\{username}\AppData\Local      Adds the file 893686b8"="14:54 18/12/14 37998 bytes      Adds the file 8fo81vdm.exe"="16:23 17/12/14 87040 bytes    In the existing folder C:\Users\{username}\AppData\Roaming      Adds the file 893686b8"="14:54 18/12/14 29465 bytes  Registry  ===============    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]      "qcgce2mrvjq91kk1e7pnbb19m52fx1956jc03il0h"="'C:\Users\{username}\AppData\Local\8fo81vdm.exe' 
Malwarebytes Anti-Malware log:


Malwarebytes Anti-Malwarewww.malwarebytes.orgScan Date: 12/18/2014Scan Time: 3:19:26 PMLogfile: mbamAVC.txtAdministrator: YesVersion: Database: v2014.12.18.02Rootkit Database: v2014.12.14.01License: FreeMalware Protection: DisabledMalicious Website Protection: DisabledSelf-protection: DisabledOS: Windows 8.1CPU: x64File System: NTFSUser: {username}Scan Type: Threat ScanResult: CompletedObjects Scanned: 321799Time Elapsed: 23 min, 7 secMemory: EnabledStartup: EnabledFilesystem: EnabledArchives: EnabledRootkits: DisabledHeuristics: EnabledPUP: EnabledPUM: EnabledProcesses: 1Trojan.FakeAV, C:\Users\{username}\AppData\Local\8fo81vdm.exe, 1580, Delete-on-Reboot, [b298aeb685f71c1a49361d44a261c33d]Modules: 0(No malicious items detected)Registry Keys: 0(No malicious items detected)Registry Values: 1Trojan.FakeAV, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|qcgce2mrvjq91kk1e7pnbb19m52fx1956jc03il0h, C:\Users\{username}\AppData\Local\8fo81vdm.exe, Quarantined, [b298aeb685f71c1a49361d44a261c33d]Registry Data: 0(No malicious items detected)Folders: 0(No malicious items detected)Files: 1Trojan.FakeAV, C:\Users\{username}\AppData\Local\8fo81vdm.exe, Quarantined, [b298aeb685f71c1a49361d44a261c33d], Physical Sectors: 0(No malicious items detected)(end)
We use different ways of protecting your computer(s):
  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention
Save yourself the hassle and get protected.
Link to post
Share on other sites

  • Staff

After running into certain rogues on your system, you may come across this warning in your Action Center:


and when you try to turn the Windows Security Center Service on, you will see this:


If that is the case, the fix below is intended for you.

The steps that I am about to suggest involve modifying the registry. Modifying the registry can be dangerous so we will make a backup of the registry first. Please follow the steps that are listed below EXACTLY. if you cannot perform some of these steps or if you have ANY questions please ask BEFORE proceeding.

Backing Up Your Registry

  • Download ERUNT

    (ERUNT (Emergency Recovery Utility NT) is a free program that allows you to keep a complete backup of your registry and restore it when needed.)

  • Install ERUNT by clicking on the application. Follow the prompts to install the software.

    (use the default install settings but say no to the portion that asks you to add ERUNT to the start-up folder, if you like you can enable this option later)

  • Start ERUNT

    (either by double clicking on the desktop icon or choosing to start the program at the end of the setup)

  • Choose a location for the backup

    (the default location is C:\WINDOWS\ERDNT which is acceptable).

  • Make sure that at least the first two check boxes are ticked
  • Press OK
  • Press YES to create the folder.

If anything goes wrong and you are worse off after applying the fix below, you can restore the backup and go back to the way it was before the fix.

Attached to this post there is a zip-file containing two registry files (64seccenter.reg and windefend.reg)

Download the zip-file and unpack it in a convenient location (easy to find).

The one we need to restore the Windows Security Center Service is the one called 64seccenter.reg

  • Rightclick the .reg file and from the menu menu choose "Merge"


  • You will see this warning:


    Click "Yes"

  • You should get this confirmation:


    Click "OK"

  • Reboot your computer
  • If you want to check if this worked, you can run "services.msc"


  • and see if the "Security Center" is listed again.


  • If you notice that the Windows Defender service is missing as well, you can repeat the last list of instructions and use windefend.reg that was also included in the zip file.

    Hope this helped you and be safe out there.

    Save yourself the hassle and get protected.


Link to post
Share on other sites

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.