Windows Tweaking Utility is a malicious software that hides under the name of Microsoft Windows and pretends to be a legitimate virus removal tool. In reality the program is a complete scam that uses Microsoft Security Essentials Alert infection to distribute itself. Remember, this fake antivirus software is unable to detect or rid your system of parasites nor will be protect you from legitimate future threats, so you should never trust in anything related to this application! You need to remove Windows Tweaking Utility from your computer as quickly as possible!
During installation, this malware will configure itself to start every time when your computer boots up. After the installation is done, it will reboot your computer. When Windows is loaded, you will be shown the Windows Tweaking Utility screen instead of Windows desktop. The rogue will suggest to perform a scan of your computer. During the fake scan, this malware will list a lot of infections to trick you into thinking your computer in danger. It will report that was able to clean the majority of infected files, but was not able to cure a few important Windows files and offer to purchase its full version to clean them. However, the scan results is a scam, because the program is neither able to detect, nor to remove anything from your computer, especially viruses or other kind of malware. Thus, do not pay for the bogus software, simply ignore all that the fake antivirus will display you.
While Windows Tweaking Utility is running, it will display a variety of fake security warnings and block legitimate Windows applications on your computer. Some of the alerts are:
Attention
Suspicious software activity is detected.
Please start system files scanning for details.
Warning!
Name: taskmgr.exe
Name: C:\WINDOWS\taskmgr.exe.
Just like false scan results above, all of these alerts are a fake and supposed to scare you into thinking your computer is in danger. You should ignore all of them!
As you can see, Windows Tweaking Utility is a totally scam, which created with one purpose to scare you into purchasing so-called “full” version of the program. Most important do not purchase it! Please use the removal guide below in order to remove Windows Tweaking Utility and any associated malware from your computer for free. If you have already purchase the program, contact your credit card company and tell them what has happened.
Automatic removal instructions for Windows Tweaking Utility
1. Once Windows loaded you will see a Windows Tweaking Utility screen. Click OK button to perform a fake scan. Once the scan is complete, press the “Fix Errors” button. Now you can close the program. Click “X” button at the top-right of Windows Tweaking Utility or press ALT + F4. After that your Windows Desktop will be available.
2. Click Start, Type in search field (if you use Windows XP, then Click Start, Run and type in Open field): %APPDATA% as shown below.
3. Press Enter. It will open the contents of Application Data folder (for Windows XP) or the contents of Roaming folder (for Windows Vista, Windows 7). Next open the Microsoft folder as shown in the screen below.
4. Basically, there will be a file named with a series of numbers or letter (e.g. wsewsu.exe or wsewsu, look the example above), right click to it and select Rename (don`t rename any folders). Type any new name (123.exe) and press Enter. Reboot your computer.
5. Download MalwareBytes Anti-malware (MBAM). Once downloaded, close all programs and windows on your computer.
6. Double-click on the icon on your desktop named mbam-setup.exe. This will start the installation of MalwareBytes Anti-malware onto your computer. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing, make sure a checkmark is placed next to “Update Malwarebytes’ Anti-Malware” and Launch “Malwarebytes’ Anti-Malware”. Then click Finish.
7. MalwareBytes Anti-malware will now automatically start and you will see a message stating that you should update the program before performing a scan. If an update is found, it will download and install the latest version.
8. As MalwareBytes Anti-malware will automatically update itself after the install, you can press the OK button to close that box and you will now be at the main menu. You will see window similar to the one below.
9. Make sure the “Perform quick scan” option is selected and then click on the Scan button to start scanning your computer for Windows Tweaking Utility associated malware. This procedure can take some time, so please be patient.
10. When the scan is finished a message box will appear that it has completed scanning successfully. Click OK. Now click “Show Results”. You will see a list of infected items similar as shown below.
Note: list of infected items may be different than what is shown in the image below.
11. Make sure all entries have a checkmark at their far left and click “Remove Selected” button to remove Windows Tweaking Utility. MalwareBytes Anti-malware will now remove all files and registry keys associated with Windows Tweaking Utility and add them to the programs’ quarantine. When MalwareBytes Anti-malware has finished removing the infection, a log will open in Notepad and you may be prompted to Restart.
Windows Tweaking Utility removal notes
Note 1: if you can not download, install, run or update Malwarebytes Anti-malware, then follow the steps: Malwarebytes won`t install, run or update – How to fix it.
Note 2: if you need help with the instructions, then post your questions in our Spyware Removal forum.
Note 3: your current antispyware and antivirus software let the infection through ? Then you may want to consider purchasing the FULL version of MalwareBytes Anti-malware to protect your computer in the future.
Windows Tweaking Utility creates the following files and folders
%AppData%\Microsoft\{RANDOM}.exe
Windows Tweaking Utility creates the following registry keys and values
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe | Debugger
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe | Debugger
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon | Shell = “%AppData%\Microsoft\{random}.exe”