Popular Reviews

Adware Removal

» Adware Removal

Rogueware Removal

» Rogueware Removal

Keylogger Removal

Fix PC Errors

Helpful Definitions

Learn More

» Learn More

Antispyware Reviews

Registry Cleaner Reviews

Firewall Reviews

Spam Filter Reviews

Peak Protection 2010

1 November 2010 

Peaking Out: Removing Peak Protection 2010

Fake warnings. False threats. Inept scanning capabilities. They're not exactly terms that might describe your ideal security program, are they? In most cases, terms like these describe rogue antispyware or security software, and it's far more common than you might imagine. In fact, many people face this type of problem every day, and more and more often, they deal with it in the form of Peak Protection 2010.

Encountering Peak Protection 2010

For most, this program first enters a user's computer while they're online. If you've ever seen a strange message that pops up that resembles a Windows Security Essentials Alert, it's possible that you've encountered Peak Protection 2010 or one of its many clones. These similar programs include: Red Cross Antivirus, Pest Detector 4.1, Major Defense Kit, and AntiSpy Safeguard. All of them initially appear as the same alert, and it is possible to have more than one of them installed on your machine simultaneously.

The text of the alert you see with Peak Protection 2010 typically reads:

Microsoft Security Essentials detected potential threats that might compromise your privacy or damage your computer. Your access to these items may be suspended until you take an action. Click ‘Show details' to learn more.

The alert itself appears as a message from your Windows Operating System might, and across the top is text that reads "Microsoft Security Essentials Alert." Just below that, you'll see a red bar with an X to the left side. It reads "Potential threat details" across the top. Just below the text of the actual message is a window that shows the detected items, and in most cases, only one is listed: Unknown Win32/Trojan. It's always listed with an Alert level as Severe, and the recommendation from the alert is to remove it immediately.

You typically have three potential actions you can take with this alert. You can choose "Clean Computer," "Apply Actions," or "Close." Should you click on either the Clean or Apply button, you get an additional message that says the program is unable to remove the threat. That takes you to a screen where your only real option is to press "Scan Online" which then takes you to a screen that lists a number of different scanners, the threat it found, and a column for removal tool. Peak Protection 2010, and its clones, all have "Trojan Horse" listed as the scan result and "Free Install" listed as the removal tool. Clicking on any of those, naturally, installs the actual program to your machine, and that's when the real frustration begins.

Peak Protection 2010 - A Performance You Won't Miss

If you do have this program installed on your machine, there are several signs you simply won't be able to miss. One of the first is the boot-up scanner. This program, like many rogue antispyware programs, boots as soon as your computer does, and each time it does, a scan window pops up on your machine. It's fairly official looking with a number of different menu options across the top. These include Scanner, Heuristic, FireWall, Privacy, Settings, and Support. Just below those menu options are a number of different file names found to be infected on your computer. At the bottom right, you'll see options for Quick Scan, Full Scan, and Stop Scan. Often it says that it's unable to clean any of these files unless you use it in Heuristic mode, but in order to do so, you'll need to purchase the full version of the program. Please note that none of the files listed here are actually infected. Moreover, purchasing the full version of this program won't make the messages go away, nor will it actually protect your computer from anything. It just isn't designed as comprehensive security protection.

In addition to that fairly common sign, you may also notice that you can no longer access or run certain processes or programs. In some cases, you may click on a program to run, only to get a message that reads something like:

The application iexplore.exe was launched successfully, but it was forced to shut down due to security reasons. This happened because the application was infected by a malicious program which might pose a threat for the OS. It is highly recommended to install the necessary heuristic module and perform a full scan of your computer to exterminate malicious programs from it.

The name of the application in that message differs, but you could see it with fairly common programs like Internet Explorer or even with processes like registry editor or task manager. The goal here is to keep you from accessing programs that might be able to eliminate Peak Protection 2010 from your computer.  The program mentioned in the message doesn't actually appear on your machine.

Removing Peak Protection 2010

There are two main ways to remove Peak Protection 2010, but none of them include your current antivirus software solution. This program is not actually classified as a virus, and because of that, any antivirus software you may have installed on your machine currently can't actually help you remove this particular program. Peak Protection 2010 is rogue antispyware, and that means that the definition files your antivirus software downloads on a regular basis to help identify problem programs during any given scan simply won't help you locate this one deep in the files of your machine. What you can do, however, is manually remove the program from your system.

Should you choose to go with the manual removal method, it's important to note that you will be working within your computer's program files database as well as the registry. Both of these functions are quite important to the machine, and deleting the wrong file or making a mistake in the registry could damage your machine. A list of affected files and registry keys does appear at the end of this article. If you'd like further instructions or you'd like us to answer any questions you have, please contact us, as the entire procedure can be a bit risky. Moreover, you may want to employ a strong security solution after you've manually removed the program so you can ensure your computer remains safe well into the future.

The safest way to remove Peak Protection 2010 is to employ the help of a reliable antispyware scanner. Two good choices are Enigma's SpyHunter and Malwarebytes Anti-Malware (Malwarebytes has free malware removal) . Once you choose a program that seems to meet your individual security needs, install it on your machine, update it, then scan all of your files and folders. The program will automatically be eliminated from your system.

Affected Files and Registry Keys:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnonBadCertRecving" = "0"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnOnPostRedirect" = "0"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "tmp"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce "SelfdelNT"
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" = "%UserProfile%Application Dataantispy.exe"

%UserProfile%\\Application Data\\antispy.exe

 %UserProfile%\\Application Data\\defender.exe

%UserProfile%\\Application Data\\tmp.exe

 %UserProfile%\\Local Settings\\Temp\\kjkkklklj.bat

We are affiliated with some of the legitimate programs recommended on this website. Should you choose to use the programs recommended here, we may receive a fee that will help support the site.

All content copyright 2006-2017, RemoveAdware.com.au. Author: Wayne Davis.
All Rights Reserved. All trademarks and company brand names are acknowledged.
Privacy Policy | Terms Of Service