Jump to content

Removal instructions for Win 10 Tweaker

Recommended Posts

  • Staff

What is Win 10 Tweaker?

The Malwarebytes research team has determined that Win 10 Tweaker is a "system optimizer". This so-called "system optimizers" requires users to disable their anti-malware software.
More information can be found on our Malwarebytes Labs blog.

How do I know if I am infected with Win 10 Tweaker?

This is how the main screen of the system optimizer looks:


and see this warning before you can use the program:


How did Win 10 Tweaker get on my computer?

These so-called system optimizers use different methods of getting installed. This particular one was made available on a questionable website.

How do I remove Win 10 Tweaker?

Our program Malwarebytes can detect and remove this potentially unwanted application.

  • Please download Malwarebytes for Windows to your desktop.
  • Double-click MBSetup.exe and follow the prompts to install the program.
  • When your Malwarebytes for Windows installation completes, the program opens to the Welcome to Malwarebytes screen.
  • Click on the Get started button.
  • Click Scan to start a Threat Scan.
  • When the scan is finished click Quarantine to remove the found threats.
  • Reboot the system if prompted to complete the removal process.

Is there anything else I need to do to get rid of Win 10 Tweaker?

  • No, Malwarebytes removes Win 10 Tweaker completely.

How would the full version of Malwarebytes help protect me?

We hope our application and this guide have helped you eradicate this system optimizer.

As you can see below the full version of Malwarebytes would have protected you against the Win 10 Tweaker installer. It would have warned you before the application could install itself, giving you a chance to stop it before it became too late.




And it would have blocked the website where the program was available for download.



Technical details for experts

You may see these entries in FRST logs:


(XpucT) [File not signed] C:\Downloads\win 10 tweaker.exe

Alterations made by the installer:

File system details [View: All details] (Selection)
    Adds the file C:\Downloads\win 10 tweaker.exe

Registry details [View: All details] (Selection)
       "URL protocol"="REG_SZ", ""
       "(Default)"="REG_SZ", ""C:\Downloads\win 10 tweaker.exe" buyknow"

Malwarebytes log:


-Log Details-
Scan Date: 10/6/21
Scan Time: 1:35 PM
Log File: 84d29178-2699-11ec-bd4a-080027235d76.json

-Software Information-
Components Version: 1.0.1464
Update Package Version: 1.0.45600
License: Premium

-System Information-
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: {username}-PC\{username}

-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 259385
Threats Detected: 3
Threats Quarantined: 3
Time Elapsed: 2 min, 2 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 1
PUP.Optional.Win10Tweak, C:\DOWNLOADS\WIN 10 TWEAKER.EXE, Quarantined, 14629, 977683, , , , , 12AC631DDCE30527B221CE2647026C55, C9D7CA6E47124B6B22A43986D6F21EC70C0173A2D72553595F87C6450D103E2A

Module: 1
PUP.Optional.Win10Tweak, C:\DOWNLOADS\WIN 10 TWEAKER.EXE, Quarantined, 14629, 977683, , , , , 12AC631DDCE30527B221CE2647026C55, C9D7CA6E47124B6B22A43986D6F21EC70C0173A2D72553595F87C6450D103E2A

Registry Key: 0
(No malicious items detected)

Registry Value: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 0
(No malicious items detected)

File: 1
PUP.Optional.Win10Tweak, C:\DOWNLOADS\WIN 10 TWEAKER.EXE, Quarantined, 14629, 977683, 1.0.45600, 57232C5A866F4990FEAABFCB, dds, 01453504, 12AC631DDCE30527B221CE2647026C55, C9D7CA6E47124B6B22A43986D6F21EC70C0173A2D72553595F87C6450D103E2A

Physical Sector: 0
(No malicious items detected)

WMI: 0
(No malicious items detected)


As mentioned before the full version of Malwarebytes could have protected your computer against this threat.
We use different ways of protecting your computer(s):

  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention

Save yourself the hassle and get protected.

Link to post
Share on other sites

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.