FacebookTwitterLinkedIn

Avoid getting scammed by sites displaying Error Code: #0x564897 alert

Also Known As: Error Code: #0x564897 tech support scam
Damage level: Medium

What is "Error Code: #0x564897"?

"Error Code: #0x564897" is the name of a technical support scam run on various deceptive websites. This scheme has been observed being promoted via the Amazon AWS service.

Scams of this type operate by informing users of nonexistent viruses detected on their devices - to trick them into contacting fake tech support. It must be emphasized that no webpage can actually detect threats/issues present on systems; hence, any that make such claims - are scams.

Users rarely access deceptive sites intentionally; most enter them via mistyped URLs, or redirects caused by intrusive ads or installed PUAs (Potentially Unwanted Application).

Error Code: #0x564897 tech support scam

When a website promoting the "Error Code: #0x564897" scam is accessed, it presents visitors with multiple pop-up windows. In general, the messages presented in the pop-ups - claim that the users' devices are infected and access to them has been blocked, and instruct to call the provided "helplines".

This scheme is presented as an alert from Windows Defender, Windows Firewall, and Microsoft. Naturally, the scam is in no way associated with the Microsoft Corporation.

The imaginary infection is specified as "Trojan Spyware Alert - Error Code: #0x564897", which has supposedly led to the device being blocked for security reasons.

The scheme states that the fake malware infection threatens the security/privacy of users' account log-in credentials (i.e., usernames and passwords), pictures/photographs, documents, financial information, online identity, and so on. Throughout the hoax alerts, users are urged to call fraudulent technical support lines.

As mentioned in the introduction, all of the claims made by "Trojan Spyware Alert - Error Code: #0x564897" are false. Therefore, websites running such schemes must be ignored and closed. Should it be impossible to close the deceptive page, the Windows Task Manager must be used to end the browser's process.

It is important not to restore the previous browsing session - when reopening the browser, as doing so will also reopen the scam site. All scams aim to generate revenue for the individuals/groups behind them, and tech support scams are no different in this regard.

However, how the schemes profit - differs. This type of scam is initiated when users call the provided "helplines". Typically, scammers ask to remotely access the allegedly infected device - in order to remove the fake problems.

The primary source of revenue are the exorbitant sums the scammers ask as payment for their "services". Yet, this is not the sole threat posed by these schemes.

On the accessed machine, scammers can perform bogus malware removal processes, run fake system scans, uninstall genuine protection tools, install illegitimate anti-viruses (which require purchase), and/or infect the device with malicious programs (e.g., trojans, ransomware, etc.).

Scammers often install RATs (Remote Access Trojans), which enable stealthy (and potentially indefinite) access and control over the infected machine.

Sensitive/Personal information is also targeted by these scams, e.g., names, addresses, telephone numbers, emails, account/platform usernames and passwords, credit card details, etc.

The data can be disclosed by the victims themselves, extracted from the system, and/or recorded through phishing websites (e.g., fake log-in pages, dubious payment gateways, etc.).

Scammers usually ask victims to pay in digital currencies (e.g., cryptocurrencies, pre-paid vouchers, gift cards, etc.) because their transactions are difficult/impossible to trace. Hence, the scammers can avoid persecution and the victims are prevented from returning their payments.

Furthermore, it is common for successfully scammed victims to be targeted repeatedly. In summary, by trusting the "Error Code: #0x564897" technical support scam, users can experience system infections, severe privacy issues, significant financial losses, and identity theft.

PUAs are a prime suspect behind rogue redirects to untrustworthy/malicious websites (e.g., ones running "Error Code: #0x564897"). However, these applications can have different heinous functionalities, and these functions can be in varied combinations.

For example, PUAs can force-open dangerous webpages, deliver intrusive advertisement campaigns (adware), modify browsers (browser hijackers), and collect private information. Most unwanted apps have data tracking abilities.

Information of interest includes: browsing and search engine histories, IP addresses, geolocations, and even personally identifiable details. PUA developers monetize the gathered data by sharing it with and/or selling it to third-parties (potentially, cyber criminals).

Therefore, it is crucial to immediately eliminate all suspicious applications and browser extensions/plug-ins - to ensure device and user safety.

Threat Summary:
Name Error Code: #0x564897 tech support scam
Threat Type Phishing, Scam, Social Engineering, Fraud
Fake Claim Scam claims users' devices are infected and urges them to contact fake technical support.
Disguise Alerts from Windows Defender, Windows Firewall, and Microsoft
Tech Support Scammer Phone Number +61-1800-951-046
Symptoms Fake error messages, fake system warnings, pop-up errors, hoax computer scan.
Distribution methods Compromised websites, rogue online pop-up ads, potentially unwanted applications.
Damage Loss of sensitive private information, monetary loss, identity theft, possible malware infections.
Malware Removal (Windows)

To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner.
▼ Download Combo Cleaner
To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.

"Error Code: x00082dfo09d", "Microsoft Security Essentials Alert", "WIN-8x0007 Error", "Suspicious Movement Distinguished On You IP" - are some examples of tech support scams. The Internet is full of misleading and deceptive content - designed to gain and subsequently abuse users' trust.

Popular scam models are: warnings that the device is infected or at risk, alerts that a piece of software is outdated or missing, fake prize giveaways and raffles, ludicrous deals, etc. Due to how widespread online schemes are, it is strongly advised to exercise caution when browsing.

How did potentially unwanted applications install on my computer?

Select PUAs have "official" download pages, which are often promoted by deceptive/scam sites. These applications can also be downloaded/installed together with other programs. This false marketing method of packing regular software with unwanted or malicious additions - is termed "bundling".

Rushed download/installation processes (e.g., ignored terms, skipped steps and sections, etc.) increase the risk of inadvertently allowing bundled content into the system. Intrusive advertisements proliferate PUAs as well.

Once clicked on, the ads can execute scripts to make downloads/installations without user permission.

How to avoid installation of potentially unwanted applications?

It is recommended to research software products prior to download/installation and/or purchase. Additionally, only official and verified download channels must be used.

Untrustworthy sources, e.g., unofficial and free file-hosting websites, Peer-to-Peer sharing networks, and other third-party downloaders - commonly offer harmful and/or bundled content.

When downloading/installing, it is important to read terms, study all available options, use the "Custom/Advanced" settings and opt-out from supplementary apps, tools, features, and other additions.

Intrusive adverts appear ordinary and innocuous; however, they redirect to highly questionable webpages (e.g., gambling, adult-dating, pornography, etc.). In case of encounters with ads and/or redirects of this kind, the system must be checked and all dubious applications and browser extensions/plug-ins detected - immediately removed from it.

If your computer is already infected with PUAs, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate them.

Text presented in the "Error Code: #0x564897" scam:

Main pop-up:

 

Windows Firewall Protection
Microsoft
Trojan Spyware Alert - Error Code: #0x564897
Access to this PC has been blocked for security reasons.
Contact WIndows Support: +61-1800-951-046 (AUS Toll Free)

 

Threat Detected - Trojan Spyware
App: Ads.fiancetrack(2).dll
[Run Anyway]

 

---------------------

 

Background pop-up:

 

Windows Defender - Security Warning Alert

 

** ACCESS TO THIS PC HAS BEEN BLOCKED FOR SECURITY REASONS **

 

Your computer has alerted us that it has been infected with a Trojan Spyware. The following data has been compromised.

 

Email Credentials
Banking Passwords
Facebook Login
Pictures & Documents

 

Windows Defender Scan has found potentially unwanted Adware on this device that can steal your passwords, online identity, financial information, personal files, pictures or documents.

 

You must contact us immediately so that our engineers can walk you through the removal process over the phone.

 

Call Microsoft Support immediately to report this threat, prevent identity theft and unlock access to this device.

 

Closing this window will put your personal information at risk and lead to a suspension of your Windows Registration.

 

Call Microsoft Support: +61-1800-951-046 (AUS Toll Free)

 

[Cancel] [OK]

Appearance of "Error Code: #0x564897" pop-up scam (GIF):

Appearance of Error Code: #0x564897 scam (GIF)

Instant automatic malware removal: Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.

Quick menu:

Removal of potentially unwanted applications:

Windows 11 users:

Accessing Apps and Features in Windows 11

Right-click on the Start icon, select Apps and Features. In the opened window search for the application you want to uninstall, after locating it, click on the three vertical dots and select Uninstall.

Windows 10 users:

Accessing Programs and Features (uninstall) in Windows 8

Right-click in the lower left corner of the screen, in the Quick Access Menu select Control Panel. In the opened window choose Programs and Features.

Windows 7 users:

Accessing Programs and Features (uninstall) in Windows 7

Click Start (Windows Logo at the bottom left corner of your desktop), choose Control Panel. Locate Programs and click Uninstall a program.

macOS (OSX) users:

Uninstall app in OSX (Mac)

Click Finder, in the opened screen select Applications. Drag the app from the Applications folder to the Trash (located in your Dock), then right click the Trash icon and select Empty Trash.

PUAs uninstall via Control Panel

In the uninstall programs window, look for any suspicious/recently-installed applications, select these entries and click "Uninstall" or "Remove".

After uninstalling the potentially unwanted application, scan your computer for any remaining unwanted components or possible malware infections. To scan your computer, use recommended malware removal software.

Remove rogue extensions from Internet browsers:

Video showing how to remove potentially unwanted browser add-ons:

Google Chrome logoRemove malicious extensions from Google Chrome:

Removing rogue extensions from Google Chrome step 1

Click the Chrome menu icon Google Chrome menu icon (at the top right corner of Google Chrome), select "More tools" and click "Extensions". Locate all recently-installed suspicious browser add-ons and remove them.

Removing rogue extensions from Google Chrome step 2

Optional method:

If you continue to have problems with removal of the error code: #0x564897 tech support scam, reset your Google Chrome browser settings. Click the Chrome menu icon Google Chrome menu icon (at the top right corner of Google Chrome) and select Settings. Scroll down to the bottom of the screen. Click the Advanced… link.

Google Chrome settings reset step 1

After scrolling to the bottom of the screen, click the Reset (Restore settings to their original defaults) button.

Google Chrome settings reset step 2

In the opened window, confirm that you wish to reset Google Chrome settings to default by clicking the Reset button.

Google Chrome settings reset step 3

Mozilla Firefox logoRemove malicious plugins from Mozilla Firefox:

Removing rogue extensions from Mozilla Firefox step 1

Click the Firefox menu firefox menu icon (at the top right corner of the main window), select "Add-ons". Click on "Extensions", in the opened window remove all recently-installed suspicious browser plug-ins.

Removing rogue extensions from Mozilla Firefox step 2

Optional method:

Computer users who have problems with error code: #0x564897 tech support scam removal can reset their Mozilla Firefox settings.

Open Mozilla Firefox, at the top right corner of the main window, click the Firefox menu, firefox menu icon in the opened menu, click Help.

Accessing settings (Reset Firefox to default settings step 1)

Select Troubleshooting Information.

Accessing Troubleshooting Information (Reset Firefox to default settings step 2)

In the opened window, click the Refresh Firefox button.

Clicking on Refresh Firefox button (Reset Firefox to default settings step 3)

In the opened window, confirm that you wish to reset Mozilla Firefox settings to default by clicking the Refresh Firefox button.

Confirm your want to reset Firefox settings to default (Reset Firefox to default settings step 4)

safari browser logoRemove malicious extensions from Safari:

removing adware from safari step 1 - accessing preferences

Make sure your Safari browser is active, click Safari menu, and select Preferences....

removing adware from safari step 2 - removing extensions

In the opened window click Extensions, locate any recently installed suspicious extension, select it and click Uninstall.

Optional method:

Make sure your Safari browser is active and click on Safari menu. From the drop down menu select Clear History and Website Data...

resetting safari step 1

In the opened window select all history and click the Clear History button.

resetting safari step 2

Microsoft Edge (Chromium) logoRemove malicious extensions from Microsoft Edge:

Removing adware from Microsoft Edge step 1

Click the Edge menu icon Microsoft Edge (chromium) menu icon (at the upper-right corner of Microsoft Edge), select "Extensions". Locate all recently-installed suspicious browser add-ons and click "Remove" below their names.

Removing adware from Microsoft Edge step 2

Optional method:

If you continue to have problems with removal of the error code: #0x564897 tech support scam, reset your Microsoft Edge browser settings. Click the Edge menu icon Microsoft Edge (chromium) menu icon (at the top right corner of Microsoft Edge) and select Settings.

Microsoft Edge (Chromium) reset step 1

In the opened settings menu select Reset settings.

Microsoft Edge (Chromium) reset step 2

Select Restore settings to their default values. In the opened window, confirm that you wish to reset Microsoft Edge settings to default by clicking the Reset button.

Microsoft Edge (Chromium) reset step 3

  • If this did not help, follow these alternative instructions explaining how to reset the Microsoft Edge browser.

Internet Explorer logoRemove malicious add-ons from Internet Explorer:

Removing rogue extensions from Internet Explorer step 1

Click the "gear" icon Internet Explorer options icon (at the top right corner of Internet Explorer), select "Manage Add-ons". Look for any recently-installed suspicious browser extensions, select these entries and click "Remove".

Removing rogue extensions from Internet Explorer step 2

Optional method:

If you continue to have problems with removal of the error code: #0x564897 tech support scam, reset your Internet Explorer settings to default.

Windows XP users: Click Start, click Run, in the opened window type inetcpl.cpl In the opened window click the Advanced tab, then click Reset.

Resetting Internet Explorer settings to default on Windows XP

Windows Vista and Windows 7 users: Click the Windows logo, in the start search box type inetcpl.cpl and click enter. In the opened window click the Advanced tab, then click Reset.

Resetting Internet Explorer settings to default on Windows 7

Windows 8 users: Open Internet Explorer and click the gear icon. Select Internet Options.

Reseting Internet Explorer settings to default in Windows 8 - accessing

In the opened window, select the Advanced tab.

Resetting Internet Explorer settings to default on Windows 8 - Internet options advanced tab

Click the Reset button.

Resetting Internet Explorer settings to default on Windows 8 - click the Reset button in the Internet options advanced tab

Confirm that you wish to reset Internet Explorer settings to default by clicking the Reset button.

Resetting Internet Explorer settings to default on Windows 8 - confirm settings reset to default by clicking the reset button

Summary:

declining installation of adware while downloading free software sampleCommonly, adware or potentially unwanted applications infiltrate Internet browsers through free software downloads. Note that the safest source for downloading free software is via developers' websites only. To avoid installation of adware, be very attentive when downloading and installing free software. When installing previously-downloaded free programs, choose the custom or advanced installation options – this step will reveal any potentially unwanted applications listed for installation together with your chosen free program.

Removal assistance:
If you are experiencing problems while trying to remove error code: #0x564897 tech support scam from your computer, please ask for assistance in our malware support forum.

Post a comment:
If you have additional information on error code: #0x564897 tech support scam or it's removal please share your knowledge in the comments section below.

Click to post a comment

About the author:

Tomas Meskauskas

Tomas Meskauskas - expert security researcher, professional malware analyst.

I am passionate about computer security and technology. I have an experience of over 10 years working in various companies related to computer technical issue solving and Internet security. I have been working as an author and editor for pcrisk.com since 2010. Follow me on Twitter and LinkedIn to stay informed about the latest online security threats. Contact Tomas Meskauskas.

PCrisk security portal is brought by a company RCS LT. Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.

Our malware removal guides are free. However, if you want to support us you can send us a donation.

About PCrisk

PCrisk logo

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Removal Instructions in other languages
Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

QR Code
Error Code: #0x564897 tech support scam QR code
Scan this QR code to have an easy access removal guide of Error Code: #0x564897 tech support scam on your mobile device.
We Recommend:

Get rid of Windows malware infections today:

▼ REMOVE IT NOW
Download Combo Cleaner

Platform: Windows

Editors' Rating for Combo Cleaner:
Editors ratingOutstanding!

[Back to Top]

To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.