Identity Protector Virus - How To Remove?

Type: PUP

Identity Protector potentially unwanted program (PUP) is a product by Pcvark Software Pvt. Ltd. It works on devices, running Windows 10/8.1/8/7/Vista/XP (64 and 32 bit). The software tool is designed to scan operating systems for any traces of personal information and saved passwords. It states to lock this important information away in a vault that can only be accessed with a Master key password.

As a result, it pledges that credentials, credit card details, social security no. and telephone no. will be secured from unauthorized access. We have provided recommendations against identity theft, and installing Identity Protector suspicious tool is not the suggestion we are making. It is one of those rogue guardians of cyber security and privacy. We have explained how rogue anti-spyware programs work. This software application will function in a similar manner.

Identity Protector PUP is a low-quality tool: do not spend money on it

Identity Protector virus

We downloaded ipsetupsite.exe installer from the official webpage of Identity Protector unwanted program. As usual, we ran it through a number of security tools to determine its reliability (VirusTotal scan of ipsetupsite.exe). The results revealed it to be malicious_confidence_91%, Riskware.Win32.GT32SupportGeeks.etpouu, Suspici.16F249FA, W32.Adware.Gen.

Another scan indicated that ipsetupsite.exe was malicious and was labeled as W32.Adware (Hybrid analysis of ipsetupsite.exe). It schedules tasks to be executed at a specific time and date, spawns a lot of processes and writes data to remote process. It is capable of rebooting/shutting down the operating system. Also, multiple malicious artifacts are seen in the context of different hosts.

Please do not waste 29,95 euros for a tool that will show false positives. In the official website, users are allowed to download a free version and run a scan. Of course, this will be an opportunity for the tool to exaggerate and trick you into thinking that a premium version has to be purchased. In addition to this, it might be that one of the programs, related to software like Win Tuneup Pro or Prestotuneup, will be offered to be purchased too.

In addition to these scans, there is also an Identity Protector extension for Google Chrome. It will automatically store valuable information in the vault we mentioned at the beginning of this article. However, we do not regard these developers as very respectable. Keeping your banking account information in the hands of an unfamiliar third-party is a very dangerous decision (Is it safe to give out bank account details?).

Identity Protector PUP

In addition to this, the Chrome extension requires a lot of permissions during its installation. It wishes to read and change content of all visited domains, furthermore it requires to have authorization to display notifications, learn users’ email addresses, change settings of cookies, JavaScript, geo-location, microphone, camera, and it will even control other programs/extensions.

Never allow an unknown program or a browser add-on to manage your passwords and personally-identifiable information. This has to be done by highly-appreciated products and Identity Protector is regarded as a potentially unwanted program (PUP). In has adware-like tendencies, but it may be too harsh to call it a malicious tool. However, noticing an increased amount of displayed advertisements would not be surprising.

Is there a way to avert potentially unwanted programs?

Identity Protector suspicious tool can be installed together with other freeware applications that can be found on the Internet. If you decide to get a free-of-charge tool, always run its installer in an advanced or custom mode. Then, read provided EULA and Privacy Policy documents. If you won’t do this, you won’t be aware of the conditions that you will be required to follow during utilization of that application.

Also, anti-malware tools will also help you keep operating systems malware free. Simply run regular scans with Reimage and your device won’t have to suffer from any inconveniences. You should also keep devices relatively clean from redundant applications. Furthermore, never get applications from suspicious sources, like online adverts or random file-sharing domains. If you want to get rid of this potentially unwanted program manually, follow the guidelines we have provided below.

How to remove Identity Protector virus using Windows Control Panel

Many hijackers and adware like Identity Protector install some of their components as regular windows programs as well as additional software. This part of malware can be uninstalled from Control Panel. To access it, do the following.
  • Start→Control Panel (older Windows) or press Windows Key→Search and enter Control Panel (Windows 8);
    Control panel
  • Choose Uninstall Program;
    Programs and features
  • Go through a list of programs and select entries related to Identity Protector virus .
    Remove toolbars
  • Click uninstall button.
  • In many cases anti-malware programs are better at detecting related parasites, thus I recommend installing Spyhunter or Reimage to identify other programs that might be a part of this infection.
    Scan with spyhunter
This method will not remove some of browser plugins therefore proceed to the next part of the removal guide.
Removing Identity Protector from your browsers

Automatic Identity Protector virus removal tools

Note: Reimage trial provides detection of parasites and assists in their removal for free. You can remove detected files, processes and registry entries yourself or purchase a full version.  We might be affiliated with some of these programs. Full information is available in disclosure     

About the author

 - Virus researcher

I’m a virus researcher and my field of specialization involves but is not limited to the newly-developed ransomware variants. In my opinion, crypto-viruses are highly-underestimated and some Internet users have very few opportunities to learn about their symptoms before it is too late. Our goal here in is to make sure that crucial information about the most relevant malware samples would be available for everyone.

October 17, 2017 04:37, October 23, 2017 09:46

Leave a Reply

Your email address will not be published. Required fields are marked *