아래에 표시된 명령줄을 수정하거나 주석문을 삭제하여 블로그 또는 지식인, 웹사이트에 펌질하는 경우가 발
견되면 IP 차단됩니다. (IP/24 = IP 0~255)
현재페이지 주소를 링크해주시기 바랍니다.
현재페이지 주소 :
http://windowdel.com/nk.php?w=230822-fortect-protect-your-pc-error-fix
관련태그 : 시스템관리, 에러수정, 유료
익스플로러 및 작업표시줄이 모두 종료되므로 모든 프로그램을 닫고 시작하세요.
[시작] - [프로그램] - [보조 프로그램] - [명령 프롬프트]를 실행합니다.
* Windows 7, Windows 8, Windows 10, Windows 11 운영체제에서는 [명령프롬프트]를 마우스 우클릭하여 [관리자권한으로 실행]을 선택하세요.
명령 프롬프트를 실행하면 아래와 같은 검은 화면이 나오고 커서가 깜빡깜빡 거립니다.
화면에 나오는 글자나 모양이 약간 다를 수도 있는데 신경쓰지 마세요. 아래와 같이 비슷한 화면만 나오면 됩니다.
* Windows 7, Windows 8, Windows 10, Windows 11 운영체제에서는 [관리자:명령프롬프트] 라는 내용이 표시되어 있어야 합니다.
|
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corpation. All right reserved.
C:\Users\Administrator>
|
아래에 적색으로 표시된 명령줄 안에서 마우스를 연속세번 빠르게 클릭(따다닥)하면 자동으로 명령줄이 모두 선택이 됩니다.
선택된 영역에서 마우스우클릭해서 [복사]를 선택합니다.
* 자동으로 선택이 안되면 바로 아래 적색라인부터 하단 적색라인까지 드래그한 다음, 우클릭하여 [복사]하세요.
* 드래그가 뭔소린지 모르거나 드래그를 할 줄 모르는 왕초보인 경우 : 키보드 [ Ctrl ] + [ a ] 를 동시에 누르고, [ Ctrl ] + [ c ] 를 동시에 눌러 모두 복사하세요.
-----------------------------------------------------------------------------------------------------------------------------------
echo Start
echo #
echo ##################### Default System32 directory for x86 x64 #####################
echo #
echo 000 change to the default system directory & cd %WINDIR% & cd system32
echo Kill Process & taskkill /im explorer.exe /f & echo wait
echo Kill Process & tskill explorer & echo wait
echo Kill Process & taskkill /im IEXPLORE.EXE /f & echo wait
echo Kill Process & tskill IEXPLORE & echo wait
echo wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt
echo Created by http://windowdel.com/nk.php?w=230822-fortect-protect-your-pc-error-fix
echo 명령줄 수정금지(본 컨텐츠를 무단으로 수정하여 배포하면 아이피 통으로 차단됩니다.) echo 001 Service stop & sc stop "FortectService" & echo wait echo 001 Service delete & sc delete "FortectService" & echo wait echo 002 & taskkill /im "apc_random_id_generator.exe" /f echo 002 & tskill "apc_random_id_generator" echo 002 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 002 & del /q "%PROGRAMFILES%\Fortect\apc_random_id_generator.exe" echo 002 & del /q "%PROGRAMFILES(x86)%\Fortect\apc_random_id_generator.exe" echo 003 & del /q "%PROGRAMFILES%\Fortect\apcfile.dll" echo 003 & del /q "%PROGRAMFILES(x86)%\Fortect\apcfile.dll" echo 004 & del /q "%PROGRAMFILES%\Fortect\apchash.dll" echo 004 & del /q "%PROGRAMFILES(x86)%\Fortect\apchash.dll" echo 005 & taskkill /im "Fortect.exe" /f echo 005 & tskill "Fortect" echo 005 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 005 & del /q "%PROGRAMFILES%\Fortect\Fortect.exe" echo 005 & del /q "%PROGRAMFILES(x86)%\Fortect\Fortect.exe" echo 006 & taskkill /im "FortectMain.exe" /f echo 006 & tskill "FortectMain" echo 006 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 006 & del /q "%PROGRAMFILES%\Fortect\FortectMain.exe" echo 006 & del /q "%PROGRAMFILES(x86)%\Fortect\FortectMain.exe" echo 007 & taskkill /im "MainService.exe" /f echo 007 & tskill "MainService" echo 007 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 007 & del /q "%PROGRAMFILES%\Fortect\MainService.exe" echo 007 & del /q "%PROGRAMFILES(x86)%\Fortect\MainService.exe" echo 008 & del /q "%PROGRAMFILES%\Fortect\savapi.dll" echo 008 & del /q "%PROGRAMFILES(x86)%\Fortect\savapi.dll" echo 009 & taskkill /im "uninst.exe" /f echo 009 & tskill "uninst" echo 009 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 009 & del /q "%PROGRAMFILES%\Fortect\uninst.exe" echo 009 & del /q "%PROGRAMFILES(x86)%\Fortect\uninst.exe" echo 010 & del /q "%PROGRAMFILES%\Fortect\vk_swiftshader.dll" echo 010 & del /q "%PROGRAMFILES(x86)%\Fortect\vk_swiftshader.dll" echo 011 & del /q "%PROGRAMFILES%\Fortect\vulkan-1.dll" echo 011 & del /q "%PROGRAMFILES(x86)%\Fortect\vulkan-1.dll" echo 012 & taskkill /im "FortectTray.exe" /f echo 012 & tskill "FortectTray" echo 012 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 012 & del /q "%PROGRAMFILES%\Fortect\bin\FortectTray.exe" echo 012 & del /q "%PROGRAMFILES(x86)%\Fortect\bin\FortectTray.exe" echo 013 & taskkill /im "avupdate.exe" /f echo 013 & tskill "avupdate" echo 013 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 013 & del /q "%ALLUSERSPROFILE%\Fortect\av\avupdate.exe" echo 014 & taskkill /im "savapi.exe" /f echo 014 & tskill "savapi" echo 014 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 014 & del /q "%ALLUSERSPROFILE%\Fortect\av\savapi.exe" echo 015 & taskkill /im "savapi_restart.exe" /f echo 015 & tskill "savapi_restart" echo 015 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 015 & del /q "%ALLUSERSPROFILE%\Fortect\av\savapi_restart.exe" echo 016 & taskkill /im "savapi_stub.exe" /f echo 016 & tskill "savapi_stub" echo 016 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 016 & del /q "%ALLUSERSPROFILE%\Fortect\av\savapi_stub.exe" echo 017 & del /q "%ALLUSERSPROFILE%\Fortect\av\scew.dll" echo Current time 2024-12-06 14:02:04 echo Remove Startup Start echo 018 & reg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Fortect" /f echo 018 & reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Fortect" /f echo 018 & reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run" /v "Fortect" /f echo 018 & reg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run" /v "Fortect" /f echo 018 & reg.exe delete "HKLM\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg\Fortect" /f echo Remove Startup End echo 019 & reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fortect" /f echo 019 & reg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\Fortect" /f echo 020 your ip is 18.97.14.90 do not delete this label. echo 021 Remove All Folder and Subfolder Start echo 022 & rmdir /s /q "%ALLUSERSPROFILE%\Fortect" echo 023 & rmdir /s /q "%PROGRAMFILES%\Fortect" echo 023 & rmdir /s /q "%PROGRAMFILES(x86)%\Fortect" echo 023 Remove All Folder and Subfolder End echo http://windowdel.com/nk.php?w=230822-fortect-protect-your-pc-error-fix echo 명령줄 수정금지(본 컨텐츠를 무단으로 수정하여 배포하면 아이피 통으로 차단됩니다.) echo do not stop here for x86, you have to start explorer process. echo # echo Please don't put this batch-script on your blog or website, get this url. echo http://windowdel.com/nk.php?w=230822-fortect-protect-your-pc-error-fix echo # echo ##################### Change directory SysWOW64 for x64 OS ##################### echo # echo Remove x86 Application's registry for x64 OS & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo change to the syswow64 directory & cd %WINDIR% & cd syswow64 echo 024 Service stop & sc stop "FortectService" & echo wait echo 024 Service delete & sc delete "FortectService" & echo wait echo 025 & taskkill /im "apc_random_id_generator.exe" /f echo 025 & tskill "apc_random_id_generator" echo 025 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 025 & del /q "%PROGRAMFILES%\Fortect\apc_random_id_generator.exe" echo 025 & del /q "%PROGRAMFILES(x86)%\Fortect\apc_random_id_generator.exe" echo 026 & del /q "%PROGRAMFILES%\Fortect\apcfile.dll" echo 026 & del /q "%PROGRAMFILES(x86)%\Fortect\apcfile.dll" echo 027 & del /q "%PROGRAMFILES%\Fortect\apchash.dll" echo 027 & del /q "%PROGRAMFILES(x86)%\Fortect\apchash.dll" echo 028 & taskkill /im "Fortect.exe" /f echo 028 & tskill "Fortect" echo 028 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 028 & del /q "%PROGRAMFILES%\Fortect\Fortect.exe" echo 028 & del /q "%PROGRAMFILES(x86)%\Fortect\Fortect.exe" echo 029 & taskkill /im "FortectMain.exe" /f echo 029 & tskill "FortectMain" echo 029 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 029 & del /q "%PROGRAMFILES%\Fortect\FortectMain.exe" echo 029 & del /q "%PROGRAMFILES(x86)%\Fortect\FortectMain.exe" echo 030 & taskkill /im "MainService.exe" /f echo 030 & tskill "MainService" echo 030 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 030 & del /q "%PROGRAMFILES%\Fortect\MainService.exe" echo 030 & del /q "%PROGRAMFILES(x86)%\Fortect\MainService.exe" echo 031 & del /q "%PROGRAMFILES%\Fortect\savapi.dll" echo 031 & del /q "%PROGRAMFILES(x86)%\Fortect\savapi.dll" echo 032 & taskkill /im "uninst.exe" /f echo 032 & tskill "uninst" echo 032 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 032 & del /q "%PROGRAMFILES%\Fortect\uninst.exe" echo 032 & del /q "%PROGRAMFILES(x86)%\Fortect\uninst.exe" echo 033 & del /q "%PROGRAMFILES%\Fortect\vk_swiftshader.dll" echo 033 & del /q "%PROGRAMFILES(x86)%\Fortect\vk_swiftshader.dll" echo 034 & del /q "%PROGRAMFILES%\Fortect\vulkan-1.dll" echo 034 & del /q "%PROGRAMFILES(x86)%\Fortect\vulkan-1.dll" echo 035 & taskkill /im "FortectTray.exe" /f echo 035 & tskill "FortectTray" echo 035 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 035 & del /q "%PROGRAMFILES%\Fortect\bin\FortectTray.exe" echo 035 & del /q "%PROGRAMFILES(x86)%\Fortect\bin\FortectTray.exe" echo 036 & taskkill /im "avupdate.exe" /f echo 036 & tskill "avupdate" echo 036 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 036 & del /q "%ALLUSERSPROFILE%\Fortect\av\avupdate.exe" echo 037 & taskkill /im "savapi.exe" /f echo 037 & tskill "savapi" echo 037 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 037 & del /q "%ALLUSERSPROFILE%\Fortect\av\savapi.exe" echo 038 & taskkill /im "savapi_restart.exe" /f echo 038 & tskill "savapi_restart" echo 038 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 038 & del /q "%ALLUSERSPROFILE%\Fortect\av\savapi_restart.exe" echo 039 & taskkill /im "savapi_stub.exe" /f echo 039 & tskill "savapi_stub" echo 039 taskkill wait & ping 127.0.0.1 -n 1 > %WINDIR%\ping_wait.txt echo 039 & del /q "%ALLUSERSPROFILE%\Fortect\av\savapi_stub.exe" echo 040 & del /q "%ALLUSERSPROFILE%\Fortect\av\scew.dll" echo Current time 2024-12-06 14:02:04 echo Remove Startup Start echo 041 & reg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Fortect" /f echo 041 & reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Fortect" /f echo 041 & reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run" /v "Fortect" /f echo 041 & reg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run" /v "Fortect" /f echo 041 & reg.exe delete "HKLM\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg\Fortect" /f echo Remove Startup End echo 042 & reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fortect" /f echo 042 & reg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\Fortect" /f echo 043 your ip is 18.97.14.90 do not delete this label. echo 044 Remove All Folder and Subfolder Start echo 045 & rmdir /s /q "%ALLUSERSPROFILE%\Fortect" echo 046 & rmdir /s /q "%PROGRAMFILES%\Fortect" echo 046 & rmdir /s /q "%PROGRAMFILES(x86)%\Fortect" echo 046 Remove All Folder and Subfolder End echo http://windowdel.com/nk.php?w=230822-fortect-protect-your-pc-error-fix
echo 047 rechange dir to system32 & cd %WINDIR% & cd system32
echo del ping_wait.txt & del /q %WINDIR%\ping_wait.txt
echo 048 & explorer.exe & echo explorer start
echo End
-----------------------------------------------------------------------------------------------------------------------------------
[복사]를 했으면 명령프롬프트 화면의 중간에서 마우스를 우클릭하여 [붙여넣기]를 선택하면 프로그램이 모두 삭제됩니다.
* 명령프롬프트에서는 운영체제 버전에 따라 단축키(Ctrl + v)가 먹히지 않는 경우도 있습니다. 마우스 우클릭으로 붙여넣기 하세요.
|
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corpation. All right reserved.
C:\Users\Administrator>
|
프로세스를 종료하면서 다음명령줄(삭제)이 너무빠르게 시작되어 파일이 삭제가 안되는 경우가 있으므로
모든 명령줄이 실행된 후 프롬프트창에서 한번 더 붙여넣기하세요.
명령줄이 모두 실행되면 명령프롬프트창은 닫으면 됩니다.
유사한 다른 프로그램 삭제하기
00703 - ASTER Multiseat 00699 - AutoClick 00701 - CleanPlus - APPDATA v2023.06.10 00704 - CleanPlus - APPDATA v2023.06.20 00709 - CoreB2B ExECM 00697 - favoriteurls v2023.01.14 00710 - FileGosu v2023.11.08 00708 - iCertPrintClient v2023.09.30 00698 - KICA SecuKitNXS 00700 - Myencrypt - APPDATA v2023.06.03 00702 - secureconnection - ALLUSERSPROFILE v2023.06.10 00711 - smartwatcht - ALLUSERSPROFILE v2023.12.28 00707 - WebToPdf v2023.08.25 00705 - Windy Everything v2023.06.21 - LOCALAPPDATA
|