A-Secure 2015

Also Known As: A-Secure 2015 scam
Distribution: Low
Damage level: High

A-Secure 2015 removal instructions

What is A-Secure 2015?

A-Secure 2015 is fake anti-virus software, which attempts to scare PC user into believing that their computers have been infected with high-risk malware, viruses, and Trojans. This rogue application infiltrates operating systems using infected email attachments, torrent downloads, security exploits, etc. After successful infiltration, A-Secure 2015 imitates a computer security scan and then generates a long list of supposedly-detected malware. Be aware that A-Secure 2015 holds no virus definition database or any features that would allow this application to detect any of the security infections listed. In fact, all infections listed during the 'security scan' are fake and do not exist on the victim’s PC. The real purpose of A-Secure 2015 is to convince users into buying a fake license key. Do not buy A-Secure 2015 - it is a scam developed by cyber criminals.

a-secure 2015 fake antivirus main window

Paying for a false antivirus suite such as this is equivalent to sending your money to criminals - you will lose your money and your banking information will be at risk. In addition, A-Secure 2015 provides no antivirus-related features and your computer will remain infected by this rogue application. If you see A-Secure 2015 performing 'security scans' on your computer and encouraging you to purchase a 'full version', your PC is infected with a fake antivirus program that should not be trusted.

A-Secure 2015 belongs to a family of fake antivirus programs called Braviax/FakeRean and is capable of infecting computers running the Windows XP, Windows 7, and Windows 8 operating systems. Previous fake antivirus software programs originating from this family were capable of customising their names depending on the operating system (OS) infiltrated. For example: Windows 7 users would observe Sirius Win 7 Antivirus 2014; the same rogue on a computer running Windows 8 would appear as Sirius Win 8 Antivirus 2014; and so on. In the case of A-Secure 2015, the name of this fake antivirus programs remains identical on all operating systems. Close examination of A-Secure 2015 reveals that most of the infections are caused by Trojans and fake online security warning pop-ups. Do not trust online messages stating that your computer is infected and offering download of software to eliminate supposedly-detected security issues. Other practices to avoid this type of fake antivirus infection include frequent software updates and the use of legitimate anti-spyware and anti-virus programs. If your computer has been infected by the A-Secure 2015 rogue application, do not pay for the full version - read the following removal guide and eliminate it from your system.

Examples of fake security warning messages displayed by A-Secure 2015:

“System security threat was detected. Viruses and/or spyware may be damaging your system now. Prevent infection and data loss or stealing by running a free security scan”

“A-Secure 2015 has blocked a program from accessing the internet - This program is infected with Trojan-BNK.Win32.Keylogger.gen Private data can be stolen by third parties, including credit card details and passwords”

“A-Secure 2015 Alert - System Hacked! Unknown program is scanning your system registry right now! Identity theft detected”

“Tracking software found! Your PC activity is being monitored. Possible spyware infection. Your data security may be compromised. Sensitive data can be stolen. Prevent damage now by completing a security scan”

A-Secure 2015 rogue antivirus performing a fake computer security scan:

 a-secure 2015 performing a fake computer security scan

A-Secure 2015 blocking Internet access:

Internet Explorer alert. Visiting this site may pose a security threat to your system!
Possible reasons include:


Dangerous code found in this site’s pages which installs unwanted software into your system.
Suspicious and potentially unwanted network activity detected.
Spyware infection in your system.
Complaints from other users about this site.
Port and system scans performed by the site being visited.

Things you can do:


Get a copy of “A-Secure 2015” to safeguard your PC while surfing the web (RECOMMENDED)
Run a spyware, virus and malware scan
Continue surfing without any security measures (DANGEROUS)

a-secure 2015 rogue antivirus blocking Internet access

A-Secure 2015 blocking execution of installed programs:

A-Secure 2015 has blocked a program from accessing the Internet. This program is infected with Trojan-BNK.Win32.Keylogger.gen Private data can be stolen by third parties, including credit card detail and passwords.

a-secure 2015 blocking execution of installed programs

A-Secure 2015 displaying a fake Windows Action Center:

Action Center has detected one or more issues for you to review. Windows Defender and A-Secure 2015 are both turned off.

 a-secure 2015 displaying a fake Windows action center

A rogue website used by cyber criminals to collect payments for the A-Secure 2015 fake license keys (1 year license - $55.95; 2 year license - $79.95; Lifetime license $99.95). Computer users who have paid for this scam should immediately contact their credit card company and dispute the charges, explaining that they have been tricked into purchasing a fake antivirus program:

rogue website used to promote a-secure 2015 fake antivirus

Instant automatic removal of A-Secure 2015 scam: Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Spyhunter is a professional automatic malware removal tool that is recommended to get rid of A-Secure 2015 scam. Download it by clicking the button below:
▼ DOWNLOAD Spyhunter By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. Free scanner checks if your computer is infected. To remove malware, you have to purchase the full version of Spyhunter.

Quick menu:

A-Secure 2015 fake antivirus removal:

Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, then select Safe Mode with Networking from the list.

Safe Mode with Networking

Video showing how to start Windows 7 in "Safe Mode with Networking":

Video showing how to start Windows 8 in "Safe Mode with Networking":

Video showing how to start Windows XP in "Safe Mode with Networking":

After booting your computer in Safe Mode with Networking, try downloading and running the recommended antimalware software. If the download is blocked, follow the instructions presented below.

IMPORTANT! A-Secure 2015 rogue antivirus damages Windows Security Center and Windows Defender services. After removing this fake antivirus program, download the registry fixes presented below. After downloading, double-click each and click Yes (when asked to merge data).

windows 7 braviax registry fix

Registry fixes for Windows 7 users:

Registry fixes for Windows 8 users:

Registry fix for Windows XP users:

NOTE: If you cannot run the remover, try to right-click on it and select "Run as administrator". If installation of the malware remover fails, or you cannot open the .exe files, try one of the alternative download locations below:

  • Location 1 (the file is renamed to "iexplore.exe", since most spyware does not block this file)
  • Location 2

If, after or before, removal of this fake antivirus you are unable to run any of your installed software, A-Secure 2015 has modified your operating system's .exe file associations. To fix this, download the registry fix (link below). Save it to your computer, double click it, click "Yes", and then "OK". After rebooting your PC, file associations should function normally.

- Windows 7

- Windows 8

- Windows XP

If you cannot open your browser (Internet Explorer,  Mozilla Firefox, Google Chrome):

A-Secure 2015 hijacks Internet browsers, modifies registry settings, and disables execution of programs. For these cases, our developers have created a custom installer - useful when you are unable to browse the Internet or execute .exe files. It starts like an MS-Dos program, runs some registry fixes, and then initiates execution of an installer. This installer was tested on the Windows 7, Windows Vista, and XP operating systems infected with the most common spyware infections.

To use this installer on Windows 7, click the Windows logo button (Start) . If you use Windows 8, right-click in the lower left corner of the screen, in the Quick Access Menu, select Run. Windows XP users should click "Start" and select "Run". In the Search field, enter this link:  www.pcrisk.com/installer.com and then press ENTER

A-Secure 2015 will generate a fake warning after pressing ENTER. Please ignore this and click "No, stay unprotected..." on this message.

win7_remover_installer

File download dialogue will appear and report that you are downloading the file, installer.com. Click Run, wait for download to complete, and then follow the on-screen instructions. Windows may warn you that opening unknown files may be unsafe. Please ignore these warnings.

A-Secure 2015 removal (optional method):

A-Secure 2015 rogue blocks execution of all installed software - this makes its removal complicated. The best way to eliminate this rogue is to log-in to an unaffected user account and run a security scan from it. If available, log-in to a "Guest" account and follow the removal steps provided below. If your "Guest" user account is not activated, follow these steps:

Windows 7 users:

Click the Windows logo (Start), select Control Panel.

windows 7 - accessing Control Panel

In the opened window, select "User Accounts and Family Safety".

Windows 7- accessing

In the opened window, click the "Add or Remove User Accounts" link.

Windows 7 Control Panel - add or remove user accounts

In the opened window, click "Guest Account".

Windows 7 - activating guest account

In the next window, click the "Turn On" button.

Windows 7 turn on guest account

Windows 8 users:

Right-click in the lower left corner of the screen, in the Quick Access Menu, select Control Panel.

Turning on guest user on Windows 8 step 1 - accessing Control Panel

In the opened window, click "Change account type" (under "User Accounts and Family Safety").

Turning on guest user on Windows 8 step 2 - clicking Change account type in User accounts and Family Safety section

In the opened window, click "Guest".

Turning on Guest user in Windows 8 step 3 - clicking

In the next window, click the "Turn On" button.

Turning on Guest user in Windows 8 step 4 - clicking

Windows XP users:

Click "Start", select "Settings" and click "Control Panel".

Turning on a guest user on Windows XP step 1 - accessing Control Panel

In the opened window, click "User Accounts".

Turning on a guest user on Windows XP step 2 - accessing User Accounts

In the opened window, click "Guest".

Turning on a guest user on Windows XP step 3 - clicking

In the next window, click the "Turn On the Guest Account" button.

Turning on a guest user on Windows XP step 4 - clicking

Restart your PC, when the Windows log on screen appears, select the "Guest" user, then continue with the removal steps provided below.

After logging in to your Guest account, download recommended malware removal software and run a full system scan to completely eliminate this fake antivirus software from your PC.

Manual A-Secure 2015 removal instructions

Some spyware can block downloading of spyware removers. If you cannot download it using the default location, try one of the alternative download locations below:

  • Location 1 (the file is renamed to "iexplore.exe", since most spyware does not block this file)
  • Location 2

If installation of the remover fails, try downloading the customized installer, which was built by our technicians to bypass spyware infections. Download customized installer

If you still cannot download or run the spyware removing software, please perform these steps:

Step 1
Download the registry fix for A-Secure 2015 malware. This fix removes registry entries that disallow execution of programs in some variants of this spyware. To download it, click the link below. After downloading, double click the downloaded registry fix file, click Yes, and then click OK.

- Windows 7

- Windows 8

- Windows XP

Step 2
Some variants of this spyware modify the system proxy settings so that you are unable to access the Internet (or website addresses are redirected to malicious or phishing websites). To reset the proxy settings to default, download and run this tool:

Step 3
A-Secure 2015 modifies the system Hosts file. The Hosts file is used to resolve canonical names of websites to IP addresses. When it is changed, the user may be redirected to malicious sites, despite seeing legitimate URLs in address bar. It is difficult to determine which sites are genuine when the Hosts file is modified. To fix this, download the Microsoft Fix It tool, which restores your Hosts file to the Windows default. Run this tool when downloaded and follow the on-screen instructions. Download link below:

Step 4
That's It! You can now try to download the Malware remover or install and run it if already downloaded. In most cases, this leads to success, but if not, describe your problem in our FORUM and our technicians will try to help you.

IMPORTANT! A-Secure 2015 rogue antivirus damages Windows Security Center and Windows Defender services. After removing this fake antivirus program, download the registry fixes presented below. After downloading, double-click each and click Yes (when asked to merge data).

windows 7 braviax registry fix

Registry fixes for Windows 7 users:

Registry fixes for Windows 8 users:

Registry fix for Windows XP users:

Other tools known to remove A-Secure 2015:

Summary:

The fake antivirus programs (also known as "rogue antivirus programs" or "scareware") are applications that tries to lure computer users into paying for their non-existent full versions to remove the supposedly detected security infections (although the computer is actually clean). These bogus programs are created by cyber criminals who design them to look as legitimate antivirus software. Most commonly rogue antivirus programs infiltrate user's computer using poop-up windows or alerts which appear when users surf the Internet. These deceptive messages trick users into downloading a rogue antivirus program on their computers. Other known tactics used to spread scareware include exploit kits, infected email messages, online ad networks, drive-by downloads, or even direct calls to user's offering free support.

A computer that is infected with a fake antivirus program might also have other malware installed on it as rogue antivirus programs often are bundled with Trojans and exploit kits. Noteworthy that additional malware that infiltrates user's operating system remains on victim's computer regardless of whether a payment for a non-existent full version of a fake antivirus program is made. Here are some examples of fake security warning messages that are used in fake antivirus distribution:

Fake pop-up used in rogue antivirus distribution example 1

Fake pop-up used in rogue antivirus distribution example 2

Computer users who are dealing with a rogue security software shouldn't buy it's full version. By paying for a license key of a fake antivirus program users would send their money and banking information to cyber criminals. Users who have already entered their credit card number (or other sensitive information) when asked by such bogus software should inform their credit card company that they have been tricked into buying a rogue security software. Screenshot of a web page used to lure computer users into paying for a non-existent full version of a-secure 2015 scam and other rogue antivirus programs:

example of a webpage used to collect payments for fake antivirus programs

To protect your computer from a-secure 2015 scam and other rogue antivirus programs users should:

  • Keep their operating system and all of the installed programs up-to-date.
  • Use legitimate antivirus and anti-spyware programs.
  • Use caution when clicking on links in social networking websites and email messages.
  • Don't trust online pop-up messages which state that your computer is infected and offers you to download security software.

Symptoms indicating that your operating system is infected with a fake antivirus program:

  • Intrusive security warning pop-up messages.
  • Alerts asking to upgrade to a paid version of a program to remove the supposedly detected malware.
  • Slow computer performance.
  • Disabled Windows updates.
  • Blocked Task Manager.
  • Blocked Internet browsers or inability to visit legitimate antivirus vendor websites.

If you are experiencing problems while trying to remove a-secure 2015 scam from your computer, please ask for assistance in our malware removal forum.

If you have additional information on a-secure 2015 scam or it's removal please share your knowledge in the comments section below.

About the author:

Tomas Meskauskas

Tomas Meskauskas - expert security researcher, professional malware analyst.

I am passionate about computer security and technology. I have an experience of over 10 years working in various companies related to computer technical issue solving and Internet security. I have been working as an author and editor for pcrisk.com since 2010. Follow me on Twitter and LinkedIn to stay informed about the latest online security threats. Contact Tomas Meskauskas.

PCrisk security portal is brought by a company RCS LT. Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.

Our malware removal guides are free. However, if you want to support us you can send us a donation.

Removal Instructions in other languages
Malware activity

Global virus and spyware activity level today:

Medium threat activity
Medium

Increased attack rate of infections detected within the last 24 hours.

QR Code
A-Secure 2015 scam QR code
A QR code (Quick Response Code) is a machine-readable code which stores URLs and other information. This code can be read using a camera on a smartphone or a tablet. Scan this QR code to have an easy access removal guide of A-Secure 2015 scam on your mobile device.
We Recommend:

Get rid of A-Secure 2015 scam today:

▼ REMOVE IT NOW with Spyhunter

Platform: Windows

Editors' Rating for Spyhunter:
Editors ratingOutstanding!

[Back to Top]

Free scanner checks if your computer is infected. To remove malware, you have to purchase the full version of Spyhunter.