Windows Debugging Agent has nothing to do with “debugging” or fixing real errors of your system. Do you realize this or are you thinking of purchasing it? Well, we hope you will be clever enough not to follow its tricks and that you will make up you mind entirely to wipe of this annoying pest named Windows Debugging Agent. By the way, the only aim of Windows Debugging Agent is to make you pay money for it. For this reason Windows Debugging Agent would do whatever it can until you are persuaded to do that finally. Do not listen to Windows Debugging Agent but rather continue reading this post to see the true picture of what Windows Debugging Agent is in reality, inside.
Don't ever believe that Windows Debugging Agent will help you. It is probably the only bug of your system that causes real troubles.
It is not a coincidence that Windows Debugging Agent applies fake Microsoft Security Essentials Alerts for its installation inside of your machine. This installation and infiltration is carried out in the following manner. Suddenly the window of such Fake Microsoft Security Essential Alert appears in front of your desktop. It would primarily state that your computer is infected with some kind of unknown malware. They the user would be prompted to hit the buttons requested by the fake alert. The peculiarity is that this fictitious Microsoft Security Essential Alert does not really give any other options for the user. If he/she clicks “Cancel” button still the fake alert would appear with the next startup, forcing the users to click the buttons recommended by it. This is how Windows Debugging Agent is actually being installed inside of your system. The fake alert would assert that it has found the solution to remove the unknown malware, implying Windows Debugging Agent program. This is when Windows Debugging Agent is actually installed, being fully disclosed and having revealed its face after the system reboot (similarly forced by the fake alert).
It would turn out that Windows Debugging Agent would come up in front of your desktop with every Windows startup. You would have to face its fake and totally fabricated scan each time you turn your PC on. By the way, you will not even be able to use your desktop or to do anything with it (until the fake scan of Windows Debugging Agent virus is completed). It is quite logical that this bogus scan would be then followed by the report of Windows Debugging Agent about plenty of problems, errors, bugs and other issues, as well as viruses and threats available at your machine. No doubt, Windows Debugging Agent would state that it is the “most powerful” remedy which can relieve your PC from all such problems and viruses, if only you pay for its so-called full version. Keep in mind that such full version does not even exist in reality. You are just being deceived and scared into purchasing such a totally useless and horrible scam as Windows Debugging Agent. To sum up the aforesaid, make sure and remove Windows Debugging Agent virus from your PC at once. The removal process is described below in the video guides, which include both automatic and manual removal.
Windows Debugging Agent virus free (manual) removal guide (on the example of Windows Steady Work virus removal):
Windows Debugging Agent virus automatic removal with the help of GridinSoft Trojan Killer purchased license (on the example of removal of similar viruses):
Windows Debugging Agent virus removal for computers with Windows XP Operating System (please watch in full screen mode) | Windows Debugging Agent virus removal for computers with Windows Vista/Windows 7 Operating Systems (please watch in full screen mode) |
---|---|
4 comments:
The principle of the above video saved my life, but because the virus takes over when you boot up (in normal or safe mode) you can't get access to "My Computer" etc. to drill down and find this file. Using the principle on this video I got rid of the virus as follows:
By continuously pressing F8 start your PC in “Safe Mode With Command Prompt”
At the Command Prompt change the directory to C:\Documents and Settings\\Application Data\Microsoft this can be done with the following commands:
CD “Application Data”
CD Microsoft
Then you need to list that directory showing the hidden files using this command:
DIR /A
You should then see the file causing the virus, which will be a .exe file dated around the time that the virus hit you. WRITE DOWN THE FILENAME ON A PIECE OF PAPER. Let’s say the file is called asdfg.exe
Now you have to change the attributes of that file to make it unhidden using the following command:
attrib asdfg.exe –r –h –s (remember to use the actual virus name you’ve written down not asdfg)
Now you can change the name of this file:
ren asdfg.exe fred123.exe (in this example we change the filename to fred123, but you can change it to anything)
Now type
EXIT
Then reboot your PC in normal windows mode and the virus should have gone.
Click on My Computer and make sure that you are set to show hidden files and folders. You can do this by clicking “Tools”, “Folder Options”, “View” then click the radio button “Show hidden files and folders” finally “Apply”, then “OK” then close that window.
Now you can see hidden files and folders you should be able to drill down to first C: then Documents and Settings then then Applications Data then Microsoft and you should see the rouge file fred123. DELTE IT and empty your recycle bin.
Penultimate step is to remove the reference to the original file from the registry:
Press “Start”, then “Run” at the command window type “regedit” when the Registry Editor opens press “Edit” then “Find” then type the original file name you wrote down on that piece of paper. The editor should find the file reference and highlight it. Next right click on it and Delete. Run the Find function again to check for other references and delete all references.
The virus will have probably turned off your System Restore facility, so the final step is to turn that back on and take a system back up. Go “Start”, “All Programs”, “Accessories”, “System Tools”, “System Restore”. The computer should tell you that System Restore is turn off and invite you to start it up again, do this for all your hard drives, then create a “restore point” called “Virus Fixed” or something similar.
Exit out of System Restore and just for good measure do a final reboot and you are back in business!
You should have no problems accessing "My Computer" after the fake scan of Windows Debugging Agent is over... Wait until it completes ifs fake scan. Then close its windows and go to "My Computer".
Many thanks Phil, your comment has got me a few steps closer to removing this bitch of a virus.... however I am still having issues!!
(Andrew McPherson... it seems to depened how badly it has infected your system as to weather or not you can access my computer... I cannot load task manager, in normal or safe mode, nor can i browse into the c:\users folder at all. I also cannot load cmd prompt or msconfig, regedit etc!!
Ok so Phil,
I am in safe mode with command prompt, and have browsed to two dodgy files created a few days ago, in c:\users\ben\application data\microsoft\
But i cannot rename them, change attribs or delete... it just says file not found. I have tried the entire correct path with quotes etc... and spelt everything correctly... or tried to delete from within the folder itself...
What now?!
Will try a linux boot cd in a minute... will probably do the trick.
Ahhh... ok fixed.
For some reason the command prompt wouldnt let me edit files when going through Windows 7 Shortcuts... such as "Application Data"
The correct path turned out to be:
c:\users\ben\appdata\roaming\microsoft\
If you browse into it that way, from Safe mode with command prompt, you can easily delete the offending files.
Post a Comment