Disk Antivirus Professional Virus Interface

Disk Antivirus Professional is another rogue anti-virus program that makes false claims and tries to scare computer users into purchasing the application to remove potential threats that it has located through it’s fake file system and registry scans. Like the typical scareware, it constantly pops up with warning messages indicating that it has detected malicious threats on your computer. They of course are all bogus and fake and should be ignored.

Possible Registration Code: AA39754E-715219CE

How To Remove Disk Antivirus Professional From Your Computer

To remove Disk Antivirus Professional from your computer, you'll need to download a two utilities on a clean computer and then transfer them to the computer that has been compromised by the rogue software. You can transfer the files by burning them onto a cd or copying them onto a flash drive.  You’ll need to download:




Disk Antivirus Step By Step Removal

  1. With the virus removal utilities copied on the cd or flash drive, start the infected computer into "Safe Mode with Command Prompt".

  1. Log into an account with administrative privileges.
  2. Agree to the "Safe Mode" disclaimer if it is displayed.
  3. Insert the cd or flash drive with the utilities that you downloaded on the clean system into the infected computer
  4. Next at the command prompt, navigate to the external drive by type it's drive letter with a colon directly after it. (An example would be  “D:”)
  5. Next, if you created a directory on the drive and downloaded the needed files into that directory type "CD {Your Directory's Name}". In our example we'll use drive "D" with a directory name of "Software". With this mind, at the command prompt you’ll need to type "CD software" without the quotation marks of course.

  1. Next, type "Dir" at the prompt to display the contents of the directory, to make sure you’re in the correct area.
  2. Next, start the copy of “rKill” on the external drive by typing “tdsskiller.exe” at the command prompt. It will attempt to terminate any malicious processes that are loaded in your computer’s memory.

  1. After “rKill” has completed, if you have an anti-virus utility installed on the computer, make sure it’s disabled by typing “Explorer’ at the command prompt to start the “Windows Explorer”
  2. After you have verified that your anti-virus has been disabled, close the “Windows Explorer’ by opening the “Task Manager” then selecting “Explorer” and then clicking on “End Process”
  3. Next, navigate back to your external drive and execute the copy of “Combofix”

  1. Let Combofix complete it's scan without interruption.
  2. Once Combofix has finished it’s scan and removal, install the copy of Malwarebytes from the external drive by typing it's complete file name at the command prompt. In our example we kept the original file name of the installation file, so you would type "Mbam-setup.exe".

  1. Once Malwarebytes is installed, perform a full system scan with it and quarantine any threats that it finds on your computer.

After Malwarebytes has completed, restart your computer normally and check for any signs of Disk Antivirus Professional. Also check your Internet access by trying to visit a security related website such as  "Mcafee.com" or “Symantec.com”. If the system functions normally without pop ups, your work should be complete at this point. If your system still displays symptoms of the rogue Disk Antivirus Professional, you'll need to contact a professional virus removal specialist to resolve your computer's infection

Smith Technical Resources makes no guarantees or claims that the information contained in this article will help you completely remove the above listed malicious program(s) from your computer.  There are several variations of each particular virus in the wild . And the procedure listed above may not be adequate for the specific version of the virus that your computer has been compromised by.

If you feel uncomfortable performing any of the procedures that we've listed on this page, please contact a professional computer repair company in your area and have them complete the needed repairs on your computer. Smith Technical Resources takes no responsibility for any possible damage that could result from your use of the above instructions.

malwarebytes interface Windows advanced options menu Windows command prompt Command prompt with application execution command

©Smithtechres.com 2013 All Rights Reserved. Website Privacy Policy. Site Map

Command prompt
Share on Twitter Share on Stumble Upon Share on Digg Share on Delicious

Providing cost-effective local computer repair and network support in the middle Tennessee area

Phone (615)596-2592

Remote Access Portal

Remote Access Icon
Home About Us Onsite Services Online Services Self Help Pricing Blog Inquiries
Combofix execution example