Fake System Restore

From Wiki-Security, the free encyclopedia of computer security

Fake System Restore Information
Type: Spyware
Analysis: Installs & gathers info from a PC without user permission.
Infection: By downloading freeware & shareware.
Symptoms: Changes PC settings, excessive popups & slow PC performance.
Detection Tool: >>> Download SpyHunter's Spyware Scanner <<<

SpyHunter's spyware scanner is intended to quickly scan and identify spyware on your PC. If you wish to eliminate spyware from your PC and prevent future spyware attacks, we recommend you buy SpyHunter's spyware removal tool, which includes full technical support and a Spyware HelpDesk to tackle spyware that is uniquely affecting your PC.
IE Alert:

If you are using Internet Explorer and can not download SpyHunter, please use a different browser like Firefox or Chrome.

Fake System Restore (System Restore) is an illegitimate optimization program for the PC that is known to mimic the actions and interface of trusted defragmentation and PC repair applications on the current software market. In order to gain the trust of computer users, Fake System Restore is designed to look similar to a generic Windows utility in addition to rendering several believable system alert notifications. These notifications rendered by Fake System Restore usually attempt to notify computer users of system errors or so-called detected issues.

The Objective of Fake System Restore

Because Fake System Restore loads at each startup of Windows on an infected machine, Fake System Restore launches a scanner interface which uses Windows colors and logos to further deceive a computer user. Ultimately Fake System Restore is designed to hound computer users for money to make them believe that when Fake System Restore is fully purchased and registered, that it would repair detected errors on their PC.

Fake System Restore is actually an outright scam and should never be trusted for repairing any type of computer issue. An 'Advanced Module' service of Fake System Restore is offered as part of a scam. Moreover, Fake System Restore will continually attempt to convince the computer user that the rendered pop-up alert reports and system scan results are legitimate. Other services such as the task manager and registry editor (regedit) are temporarily inaccessible due to Fake System Restore. When attempting to access certain websites, Fake System Restore may also automatically redirect computer users to a payment website asking that the user purchase and register a full version of Fake System Restore. Doing so will not enable Fake System Restore to remove any detected threats nor will it add any other functionality.

Commonly, hackers who create fake security or PC optimization programs such as Fake System Restore rely on the cleverly constructed scams for their means of income. In the case of Fake System Restore, the scam is to make computer users believe that their system has several errors or needs optimization. By Fake System Restore rendering several misleading messages, it would ultimately entice purchase of a registered version of Fake System Restore so that the user will feel redeemed once the issues have been addressed. Unfortunately, by using a purchased or free version of Fake System Restore, it would never fix those issues. Instead, the user would later realize that Fake System Restore took them for a ride destined for nowhere with an empty pocketbook.

Fake System Restore origins

Fake System Restore originates from clever hackers who make a living out of creating rogue disk defragmenter and rogue PC security tools. The creators of Fake System Restore have marketed other similar fake PC repair programs such as Windows Repair, Windows Recovery, WinScan and Windows Restore. These applications utilize virtually the same deceptive tactics that Fake System Restore uses to cohort computer users into purchasing a useless program. In some cases Fake System Restore is installed from a malicious website download, spam message attachment or even a Trojan horse parasite.

It is highly suggestive that Fake System Restore be detected and safely removed through a comprehensive manual removal process or with the assistance of an updated spyware detection tool.

To check your computer for Fake System Restore , download SpyHunter Spyware Detection Tool.

SpyHunter spyware detection tool is only a scanner meant to assist you in detecting Fake System Restore and other threats. If you detect the presence of Fake System Restore on your PC, you have the opportunity to purchase the SpyHunter removal tool to remove any traces of Fake System Restore .


Detection of Fake System Restore (Recommended)

Fake System Restore is difficult to detect and remove. Fake System Restore is not likely to be removed through a convenient "uninstall" feature. Fake System Restore , as well as other spyware, can re-install itself even after it appears to have been removed.

You also run the risk of damaging your computer since you're required to find and delete sensitive files in your system such as DLL files and registry keys. It is recommended you use a good spyware remover to remove Fake System Restore and other spyware, adware, trojans and viruses on your computer.

Run a Fake System Restore scan/check to successfully detect all Fake System Restore files with the SpyHunter Spyware Detection Tool. If you wish to remove Fake System Restore , you can either purchase the SpyHunter spyware removal tool to remove Fake System Restore or follow the Fake System Restore manual removal method provided in the "Remedies and Prevention" section.

Method of Infection

There are many ways your computer could get infected with Fake System Restore . Fake System Restore can come bundled with shareware or other downloadable software.

Another method of distributing Fake System Restore involves tricking you by displaying deceptive pop-up ads that may appear as regular Windows notifications with links which look like buttons reading Yes and No. No matter which "button" that you click on, a download starts, installing Fake System Restore on your system. Fake System Restore installs on your computer through a trojan and may infect your system without your knowledge or consent.

If you think you may already be infected with Fake System Restore , use this SpyHunter Spyware dectection tool to detect Fake System Restore and other common Spyware infections. After detection of Fake System Restore , the next advised step is to remove Fake System Restore with the purchase of the SpyHunter Spyware removal tool.


Fake System Restore may attempt to change your computer's desktop, hijack your browser, monitor your Internet browsing activities, change system files, and can do this without your knowledge or permission. Therefore, it is strongly recommended to remove all traces of Fake System Restore from your computer.

Remedies and Prevention

Fake System Restore , as well as other Spyware, are constantly evolving and becoming more advanced to avoid detection. Fake System Restore along with its variants can install in different locations and even when you try to uninstall it you find they reappear when you reboot your computer.

Install a good anti-spyware software

When there's a large number of traces of Spyware, for example Fake System Restore , that have infected a computer, the only remedy may be to automatically run a Spyware scan from a good anti-spyware software designed to detect Fake System Restore and other types of spyware.

Remove Fake System Restore manually

Another method to remove Fake System Restore is to manually delete Fake System Restore files in your system. Detect and remove the following Fake System Restore files:


  • %TempDir%\[RANDOM CHARACTERS].exe
  • 6DSS92c31Apgjk.exe

Other Files

  • %TempDir%\dfrgr
  • %TempDir%\dfrg
  • %Desktop%\System Restore.lnk
  • %Programs%\System Restore\System Restore.lnk
  • %Programs%\System Restore

Registry Keys

  • HKCU\Software\Microsoft\Windows\CurrentVersion\Run "[RANDOM CHARACTERS].exe"
  • HKCU\Software\Microsoft\Windows\CurrentVersion\Run "[RANDOM CHARACTERS]"
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main "Use FormSuggest" = 'Yes'
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "CertificateRevocation" = '0'
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "WarnonBadCertRecving" = '0'
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop "NoChangingWallPaper" = '1'
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations "LowRiskFileTypes" = '.zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;.scr;'
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments "SaveZoneInformation" = '1'
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer "NoDesktop" = '1'
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = '1'
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ".exe"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ""
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "DisableTaskMgr" = '1'
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download "CheckExeSignatures" = 'no'
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced "Hidden" = '0'
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced "ShowSuperHidden" = '0'

External links

PC Infected

If your computer is running slow, or making excessive popups, you may be infected with Spyware. Wiki-Security recommends,

Start SpyHunter's Spyware Scan.Click here

Disclaimer Information
This website, its content or any portion of this website is NOT affiliated with, connected to, or sponsored by Fake System Restore or its creators in any way. This website does not advocate the actions or behavior of Fake System Restore and its creators. Our objective is to provide Internet users with the know-how to detect and remove Fake System Restore and other Internet threats.

The readers of this article should not mistake, confuse or associate this article to be an advertisement or a promotion of Fake System Restore in any way. The content provided on this website is intended for educational or informational purposes and is provided "AS IS" with no warranties, and confers no rights.