Data Recovery is a harmful software. It is a fake hard drive optimization tool where in the primary objective is to fool its victims. Once Data Recovery virus has taken your computer, it will detect a number of hard drive errors. Also, all by itself, it will test the system for similar problems. Later on, the malware will recommend instant removal and forces you to buy the Data Recovery registration key.
Data Recovery virus often infect computer users who visits unknown web sites. It is unknown to them that the web site may run a drive-by-download script that will install Data Recovery without their consent. During its stay, the malware will alter system registry. It aims to get a spot on Windows start-up. Once it is loaded, Data Recovery starts to produce unwelcome detection of hard drive problems.
Now that you know the real thing behind this bogus software, it is about time to keep the computer away from it. When there is a chance that Data Recovery infects your computer, do not follow its recommendations. Instead, download the tool below and start scanning the computer to remove Data Recovery and files and registry values linked to it.
What are the Symptoms of Data Recovery Virus Infection?
It will modify Windows Registry and add the following entry/entries:
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced “Hidden” = ‘0’
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced “ShowSuperHidden” = ‘0’
HKCU\Software\Microsoft\Internet Explorer\Main “Use FormSuggest” = ‘Yes’
HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings “CertificateRevocation” = ‘0’
HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnonBadCertRecving” = ‘0’
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop “NoChangingWallPaper” = ‘1’
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments “SaveZoneInformation” = ‘1’
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer “NoDesktop” = ‘1’
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = ‘1’
HKCU\Software\Microsoft\Windows\CurrentVersion\Run “(random char).exe”
HKCU\Software\Microsoft\Windows\CurrentVersion\Run “(random char)”
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “DisableTaskMgr” = ‘1’
HKCU\Software\Microsoft\Internet Explorer\Download “CheckExeSignatures” = ‘no’
The threat will drop the following malicious files:
%StartMenu%\Programs\Data Recovery\Data Recovery.lnk
%StartMenu%\Programs\Data Recovery\Uninstall Data Recovery.lnk
Procedures to Remove Data Recovery
Removal steps on this page will help you get rid of the threat effectively using tools and virus scanners. Please make sure that you will carry out the guide in exact order.
Procedure 1: Activate Data Recovery and run virus scan
For users with technical skills in dealing with computer problems, executing this manual removal is enough to stop the malware. However, we highly recommend running anti-malware scan to remove other hidden files. For users who are not tech-savvy, you must skip this step. Start on Procedure 2 and proceed onwards. Automatic removal takes longer to accomplish but is less difficult to execute.
1. Please use the serial code below to activate Data Recovery.
Once the rogue program has activated, you will regain access to Internet and needed tools like task manager and registry editor. Keep in mind that entering this code will not remove the malware. This step will just reverse all changes the rogue software has made to the computer.
Serial Code: 08869246386344953972969146034087
2. Next, we will try to remove Data Recovery by running a virus scan under Safe Mode with Networking. To perform this task, please complete these procedures.
Start Windows 8 / Windows 10 in Safe Mode with Networking
- Close all running programs on your computer because we will need to restart Windows on this procedure.
- Press and Hold Shift key on your keyboard while clicking on Restart.
- You will then be presented with Troubleshooting Options.
- Click on Troubleshoot icon.
- Then, Click on Advanced Options icon.
- Select Startup Settings icon and then, Click on Restart button.
- When Windows restarts, it will prompt to choose number from the list of options. Press the number on your keyboard that corresponds to Safe Mode with Networking, commonly number 5.
- Once in Safe Mode, please proceed to the next step which is running a virus scan on the computer.
Start in Safe Mode with Networking (Windows XP / Vista / 7 Instruction)
- Please restart the computer and just before Windows start, press F8 on your keyboard repeatedly. You will be presented with Advanced Options Menu.
- From the selections, choose Safe Mode with Networking. Please use keyboard's arrow up/down to navigate between selections and press Enter to proceed.
3. Open your installed anti-virus programs and update it to the most recent version by automatically downloading necessary updates.
4. Thoroughly scan the computer and remove all identified threats. Do not restart or turn off the computer after the scan process. You still need to run another scan. Please follow the next procedure.
Procedure 2: Scan and remove Data Recovery files with MalwareBytes Anti-Malware
To remove Data Recovery, download Malwarebytes Anti-Malware. This tool is effective in getting rid of Trojans, viruses and malware.
1. After downloading, please install the program using the default settings.
2. At the end of the installation, please make sure that it will download necessary updates.
3. Once update has completed, MBAM will launch.
4. Select SCAN from the top menu. Then, click on Threat Scan (Recommended) section.
5. Click on Start Scan to thoroughly scan the computer. Remove all threats detected by this anti-malware program after the process.
Procedure 3: Run TrendMicro's Fake Antivirus Remover (ATTK) to check and delete any remnants of Data Recovery.
As an added help to remove Data Recovery, you can scan the computer with Fake Antivirus Removal Tool. This software is provided and distributed by TrendMicro. Follow this procedure to run a scan with this tool.
1. Download the package by clicking on the button below. This will launch a new browser window that contains further details about the tool.
2. Save the file to a location on your hard drive.
3. Browse for the location of the file and double-click to run. If you are using Windows Vista or Windows 7, right-click on extracted file supportcustomizedpackage and click on Run as Administrator.
4. When program launch, it will run a command prompt to initialize, prepare components, and update the program.
5. Next it will open the graphical user interface (GUI) of Anti-Threat Toolkit.
6. Click on Scan Now. This operation will scan all Data Recovery files and processes in your computer and display a list of result for possible Fake Antivirus program and malware that needs to be removed.
7. Tick all items that are detected by the program, and then click Clean. The tool will start removing Data Recovery components from the computer.
8. If it asked you to restart Windows, please do so.
Procedure 4: Remove Rootkit Trojan with Avast aswMBR
A Trojan often drops malware using an advance technology known as rootkit. It hides the installation of Data Recovery from your anti-virus program and injects malicious code to running Windows processes. To complete the clean-up process, you also need to scan and remove rootkit Trojan.
1. Download aswMBR from Avast server. Save it to your computer.
2. Double-click on the file aswMBR.exe to run the program.
3. If it prompts you to download the latest Avast! virus definition, please click Yes. This is necessary to identify most recent version of the Trojan as well as hidden files of Data Recovery.
4. Click on Scan button to start checking your computer for presence of rootkit Trojan and other viruses. It will display a message "Scan finished successfully" when done.
5. Click Fix or FixMBR to start removing infection. If aswMBR contains the latest Avast! virus definition file, it will automatically clean infected files on your PC.
Protect your PC from Data Recovery or Similar Attack
Turn On Safe Browsing Features
Google Chrome's Protection from Dangerous Sites
With Google Chrome's Dangerous Site Protection feature, you will have lesser risks browsing the web. It will display a warning when the site you are trying to visit is suspicious, thus, you can prevent Data Recovery infection. To enable protection from dangerous sites, please do these steps:
1. Open Google Chrome.
2. In the address bar, type this: chrome://settings/ and then, Press Enter.
3. Once on the settings page, click on Show advanced settings... at the bottom of the page to see the rest of the Chrome setup.
4. Locate Privacy section and mark 'Protect you and your device from dangerous sites'.
5. Please restart Google Chrome. New settings keep your browser safe while surfing the web.
Internet Explorer - Activate SmartScreen Filter
Internet Explorer versions 8 and 9 has this feature called SmartScreen Filter. It helps detect phishing web sites and protect you from downloading malicious programs including Data Recovery. To turn on SmartScreen Filter, follow these steps:
1. Please open Internet Explorer.
2. On top menu, select Tools (IE 9). For IE 8, please look for Safety menu.
3. Select SmartScreen Filter from the drop-down list and click on Turn on SmartScreen Filter.
4. Please restart Internet Explorer.
Mozilla Firefox - Block Attack Sites and Web Forgeries
Phishing and Malware Protection is a built-in feature on Firefox version 3 or later. It warns you when a page you are trying to visit contains phishing content or an attack site designed to drop threats such as Data Recovery. To help you keep safe while browsing the Internet using Firefox, please follow this guide:
1. Open Mozilla Firefox browser.
2. On top menu, click on Open Menu. Then select Options from the list.
3. Select Security and put a check mark on the following items:
- Warn me when sites try to install add-ons
- Block reported attack sites
- Block reported web forgeries
Edge Browser - SmartScreen Filter
SmartScreen filter is a built-in feature in Microsoft Edge browser that can help you deter malicious programs such as Data Recovery. It can block malicious web sites and downloads.
1. Open Microsoft Edge browser.
2. Click on More Actions button located at top right corner of the screen.
3. Select Settings from the drop-down list.
4. Under Settings menu, go to Advanced Settings section and click on View Advanced Settings.
5. Scroll down to "help protect my PC from malicious sites and downloads with SmartScreen Filter". Turn it to ON.
6.You may now restart Microsoft Edge browser.