Security Threat Analysis will pop-up as a windows explorer page with running virus scan. This virus was dropped by a Trojan who just infected a computer and capable of modifying system settings and Internet browser configuration. Fake Security Threat Analysis will display a fake virus scan results, showing a number of threats detected on the computer. A recommendation to click “erase infected” to remove virus and suspicious files will trigger a new browser windows to open a payment processing website to purchase the full version of rogue program Security Master AV.
Instead of obtaining the fake anti-virus application, just ignore the Security Threat Analysis hijacker and instead stop it by scanning a computer with a combination of anti-virus and anti-malware application. With this, rest assure that all related files and registry entries will be deleted from the compromised computer.
Alias: Security Master AV
Browsers Affected: Internet Explorer, Firefox, Chrome
Additional Details on Security Threat Analysis:
Some of the fake threats it will display are the following:
How to Remove Security Threat Analysis
Systematic procedures to get rid of the threat are presented on this section. Make sure to scan the computer with suggested tools and scanners.
Step 1 : Scan the computer with recommended removal tool
1 First thing you should do is reboot the computer in Safe Mode with Networking to avoid Security Threat Analysis from loading at start-up.
NOTE: You will need to PRINT or BOOKMARK this procedure, as we have to restart the computer during the removal process.
Remove all media such as Memory Card, cd, dvd, and USB devices. Then, restart the computer and please do the following:
Boot in Safe Mode on Windows XP, Windows Vista, and Windows 7 system
a Before Windows begins to load, press F8 on your keyboard.
b It will display the Advanced Boot Options menu. Select Safe Mode.
Start computer in Safe Mode using Windows 8 and Windows 10
a Close any running programs on your computer.
b Get ready to Start Windows. On your keyboard, Press and Hold Shift key and then, click on Restart button.
c It will prompt you with options, please click on Troubleshoot icon.
d Under Troubleshoot window, select Advanced Options.
e On next window, click on Startup Settings icon.
f Lastly, click on Restart button on subsequent window.
g When Windows restarts, present startup options with numbers 1 - 9. Select "Enable Safe Mode with Networking" or number 5.
h Windows will now boot on Safe Mode with Networking. Proceed with virus scan as the next step.
2 Download our malware removal tool and save it on your Desktop or any location on your PC.
3 Click on the button to start downloading our recommended anti-virus tool. Save it to an accessible location inside your hard drive or clean USB drive if you are downloading from a different PC.
4 When finished downloading, locate and double-click the file to install the application. Windows' User Account Control will prompt at this point, please click Yes to continue installing the program.
5 Follow the prompts and install as 'default' only. There are no changes needed during the installation process.
6 Malwarebytes Anti-Malware will launch for the first time. It is necessary to proceed with software update.
7 After downloading updates, please click on Scan Now button.
8 The tool willl run Threat Scan to ensure that it thoroughly check the PC for any presence of Security Threat Analysis and other forms of threats.
9 Once the scan has completed, Malwarebytes Anti-Malware will issue a list of identified threats. Mark all threats and click on Quarantine Selected.
10 If it prompts to restart the computer, please reboot Windows.
Step 2 : Ensure that no more files of Security Threat Analysis are left inside the computer
11 Click on the button below to download Norton Power Eraser from official web site. Save it to your desktop or any location of your choice.
12 After downloading, navigate its location and double-click on the NPE.exe file to launch the program.
13 Norton Power Eraser will run. If it prompts for End User License Agreement, please click on Accept to proceed.
14 On NPE main window, click on Advanced Scans. We will attempt to remove "Security Threat Analysis" by thoroughly scanning your current operating system.
15 On next window, click System Scan to perform standard scan on your computer.
16 NPE will proceed with the scan. It will search for Trojans, viruses, and malware like Security Threat Analysis. This may take some time, depending on the number of files currently stored on the computer.
17 When scan is complete. All detected risks are listed. Click on Fix Now to remove Security Threat Analysis and other known threats. Then, restart Windows if necessary.
Step 3 : Remove the Rootkit Trojan that installs Security Threat Analysis
Rootkit Remover is a stand-alone utility developed by McAfee. It can be used to detect and remove rootkit Trojan that is associated with Security Threat Analysis. This tool can detect rootkit that is part of ZeroAccess, Necurs, and TDSS family.
18 Download Rootkit Remover and save it to your desktop or any accessible location. Click the button below to begin the download.
19 Locate the file rootkitremover.exe and double-click to run the program.
20 When User Account Control prompts if you want to allow the program to make changes on the computer, please click Yes.
21 Rootkit Remover instantly scans the computer and look for presence of Trojans, viruses, and rootkit that is related to Security Threat Analysis .
22 Once it finishes scanning the computer, the tool will require you to restart Windows.
Alternative Removal Procedures for Security Threat Analysis
Use Windows System Restore to return Windows to previous state
During an infection, Security Threat Analysis drops various files and registry entries. The threat intentionally hides system files by setting options in the registry. With these rigid changes, the best solution is to return Windows to previous working state is through System Restore.
To verify if System Restore is active on your computer, please follow the instructions below to access this feature.
Access System Restore on Windows XP, Windows Vista, and Windows 7
a Go to Start Menu, then under 'Run' or 'Search Program and Files field, type rstrui.
b Then, press Enter on the keyboard to open System Restore Settings.
c Windows will display list of saved restore points. Select the most recent one to restore Windows to previous working and clean state.
d It may take some time to fully restore back-up files. Restart Windows when done.
Open System Restore on Windows 8 and Windows 10
a For Windows 8 user, go to Start Search, while on Windows 10, use the Start Menu Search and type rstrui.
b Click on the located program to open System Restore window.
c Windows will display list of saved restore points if it is active. Select the most recent one to restore Windows to previous working and clean state.
d It may take a while to fully restore back-up files. Restart Windows when done.
If previous restore point is saved, you may proceed with Windows System Restore.
Did Security Threat Analysis blocks your Internet access?
It is usual that rogue program prevents user from downloading removal tools from the Internet. Thus, infected computer may be denied to access the Internet by making changes to computer's proxy, DNS, and Hosts file. To solve Internet connection problem, please see our guide in fixing a virus-blocked Internet access. Also, make sure that your Windows Host File is free from any malicious entries. View steps in cleaning Windows host file.