Severity scale  
  (84/100)

Information Security and Control Act virus. How to Remove? (Uninstall Guide)

removal by - -   Also known as ISCA virus | Type: Ransomware
12

Information Security and Control Act virus is another example of dangerous ransomware used by Internet criminals to rip users off. Typically to earlier threats from this family, ISCA virus presents itself under the name of local police office or other representative and displays a huge screen saying that due to the 'Information and security control act' victim's computer was locked until he/she pays the fine through Ukash prepayment system. Yes, Information Security and Control Act virus is partially right because it really locks the system down so that you can't do anything about it, like browse the web or use legitimate programs. However, in order to unlock it, you shouldn't pay the fine as it is said on Information Security and Control Act virus alert. We recommend to remove Information Security and Control Act virus immediately and forget this annoying threat.

HOW CAN I GET INFECTED WITH INFORMATION SECURITY AND CONTROL ACT VIRUS?

Similarly to other threats that belong to Ukash virus group, ISCA virus is spread through the use of spam letters, freeware, shareware and other files having trojans planted inside. As soon as it gets on its target PC, virus locks user’s computer down and leaves him/her with a huge wallpaper on his desktop only. Besides, Information Security and Control Act virus is also capable to shut all the important services down, like windows firewall, windows background intelligent service and other that are important when trying to keep the PC safe and secure. That's why it is highly recommended to get rid of this dangerous threat called Information Security and Control Act virus and never pay this imaginary fine through Ukash system.

HOW TO REMOVE INFORMATION SECURITY AND CONTROL ACT VIRUS?

In order to remove Information Security and Control Act virus, you should use legitimate anti-malware program, like Reimage or PlumbytesWebroot SecureAnywhere AntiVirus. However, firstly you should unlock your computer by following these steps:

  1. Take another machine and use it to download Reimage other reputable anti-malware program.
  2. Update the program and put into the USB drive or simple CD.
  3. In the meanwhile, reboot your infected machine to Safe Mode with command prompt and stick USB drive in it.
  4. Reboot computer infected with FBI ransomware once more and run a full system scan.

Some user on the Internet have also reported that they managed to get on safe mode with networking and download anti-malware on their computers. You can try this way as well.

It might be that we are affiliated with any of our recommended products. Full disclosure can be found in our Agreement of Use. By downloading any of provided Anti-spyware software you agree with our Privacy Policy and Agreement of Use.
Do it now!
Download
Reimage - remover Happiness
Guarantee
Compatible with Microsoft Windows
What to do if failed?
If you failed to remove infection using Reimage Reimage, submit a question to our support team and provide as much details as possible.
Reimage is recommended to uninstall Information Security and Control Act virus. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.

More information about this program can be found in Reimage review.
Reimage is recommended to uninstall Information Security and Control Act virus. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.

More information about this program can be found in Reimage review.
Not using OS X? Download a remover for Windows.
Press Mentions on Reimage
Alternate Software
Alternate Software
Plumbytes
We are testing Plumbytes's efficiency (2012-08-07 08:58)
Malwarebytes Anti Malware
We are testing Malwarebytes Anti Malware's efficiency (2012-08-07 08:58)
Hitman Pro
Webroot SecureAnywhere AntiVirus
Information Security and Control Act virus screenshot
Information Security and Control Act virus snapshot

Information Security and Control Act virus manual removal

Delete registry values:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “.exe”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “CertificateRevocation” = ’0′
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnonBadCertRecving” = ’0′
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop “NoChangingWallPaper” = ’1′
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations “LowRiskFileTypes” = ‘/{hq:/s`s:/ogn:/uyu:/dyd:/c`u:/bnl:/ble:/sdf:/lrh:/iul:/iulm:/fhg:/clq:/kqf:/`wh:/lqf:/lqdf:/lnw:/lq2:/l2t:/v`w:/rbs:’
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments “SaveZoneInformation” = ’1′
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = ’1′
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “DisableTaskMgr” = ’1′
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download “CheckExeSignatures” = ‘no’
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main “Use FormSuggest” = ‘yes’
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced “Hidden” = ’0′
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced “ShowSuperHidden” = 0′
Delete files:
%AllUsersProfile%\Application Data\~
%AllUsersProfile%\Application Data\~r
%AllUsersProfile%\Application Data\.dll
%AllUsersProfile%\Application Data\.exe
%AllUsersProfile%\Application Data\
%AllUsersProfile%\Application Data\.exe
%UserProfile%\Desktop\Information Security and Control Act (ISCA) 2012.lnk
%UserProfile%\Start Menu\Programs\Information Security and Control Act (ISCA) 2012\
%UserProfile%\Start Menu\Programs\Information Security and Control Act (ISCA) 2012\Uninstall Information Security and Control Act (ISCA) 2012.lnk
%UserProfile%\Start Menu\Programs\Information Security and Control Act (ISCA) 2012\Information Security and Control Act (ISCA) 2012.lnk

Information updated:

Comments on Information Security and Control Act virus

Post a comment

Attention: Use this form only if you have additional information about a parasite, its removal instructions, additional resources or behavior. By clicking "post comment" button you agree not to post any copyrighted, unlawful, harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, profane, hateful, racially, ethnically or otherwise objectionable material of any kind.

Home page Name



«

(All fields are required)