x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF
Active Scan. Scan your PC free
Panda Protection

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

RegistryOptimizer

Threat LevelLow threatDamageHighDistributionNot widespread
Common name:RegistryOptimizer
Technical name:Adware/RegistryOptimizer
Threat level:Medium
Alias:not-a-virus:FraudTool.Win32.RegistryOptimizer,
Type:Adware
Effects:  

It is an adware program which deceives users and warns them of unexisting threats in their computers. In order to eliminate them, they are enticed to purchase a certain program. It can reach the computer through banners or pop-up windows which are displayed in certain websites.

Affected platforms:

Windows 2003/XP/2000/NT/ME/98/95

First detected on:July 24, 2009
Detection updated on:July 29, 2009
StatisticsNo

Brief Description 

    

RegistryOptimizer is an adware program that passes itself off as a solution which analyses the Windows Registry. It deceives users warning them of unexisting threats in their computers so that they purchase a certain program that removes them from the computer.

RegistryOptimizer can reach the computer when the user accesses certain websites which display banners or pop-up windows which lead to the download of this program.

Visible Symptoms 

    

RegistryOptimizer is easy to recognize, as it shows the following symptoms:

  • When it is run, an installer of the program is opened and several screens are displayed, which users need to accept to complete the installation. The following are some of the screens that are displayed:

  • Once installed, it starts scanning the computer in search for possible malware: