Publishers

G DATA INTERNET SECURITY G DATA INTERNET SECURITY





A way to uninstall G DATA INTERNET SECURITY from your PC

G DATA INTERNET SECURITY is a Windows application. Read below about how to uninstall it from your PC. It was coded for Windows by G DATA Software AG. Further information on G DATA Software AG can be seen here. G DATA INTERNET SECURITY is usually set up in the C:\Program Files (x86)\G DATA\InternetSecurity folder, depending on the user's option. The complete uninstall command line for G DATA INTERNET SECURITY is C:\ProgramData\G Data\Setups\{AC68D2FF-1674-4C16-A536-A69FC11BBD82}\setup.exe /InstallMode=Uninstall /_DoNotShowChange=true. The application's main executable file is called GDSC.exe and occupies 2.53 MB (2652280 bytes).

The executables below are part of G DATA INTERNET SECURITY. They take an average of 27.56 MB (28897976 bytes) on disk.

  • ASK.exe (423.62 KB)
  • AVK.exe (424.62 KB)
  • avkcmd.exe (1.19 MB)
  • AVKService.exe (948.12 KB)
  • AVKWCtlx64.exe (3.88 MB)
  • avkwscpe.exe (442.27 KB)
  • BootCDWizard.exe (1.71 MB)
  • GDGadgetInst32.exe (3.38 MB)
  • RansomwareRemovalHelper.exe (312.12 KB)
  • RansomwareRemovalResultNotifier.exe (2.71 MB)
  • AvkCKS.exe (289.77 KB)
  • AVKKid.exe (429.12 KB)
  • AVKTray.exe (2.22 MB)
  • AutorunDelayLoader.exe (424.12 KB)
  • GDFirewallTray.exe (1.79 MB)
  • GDFwAdmin.exe (421.62 KB)
  • GDFwSvcx64.exe (3.07 MB)
  • InitInstx64.exe (288.12 KB)
  • GDLog.exe (646.62 KB)
  • GDSC.exe (2.53 MB)
  • Reisswlf64.exe (146.12 KB)
...click to view all...

This info is about G DATA INTERNET SECURITY version 25.1.0.12 alone. For other G DATA INTERNET SECURITY versions please click below:

...click to view all...
Many files, folders and Windows registry data will not be uninstalled when you are trying to remove G DATA INTERNET SECURITY from your PC.

Directories left on disk:
  • C:\Program Files\G DATA\InternetSecurity

Generally, the following files remain on disk:
  • C:\Program Files\G DATA\InternetSecurity\ASK\ask.dll
  • C:\Program Files\G DATA\InternetSecurity\ASK\ASK.exe
  • C:\Program Files\G DATA\InternetSecurity\ASK\ASK.nl.dll
  • C:\Program Files\G DATA\InternetSecurity\ASK\GDASpam.dll
  • C:\Program Files\G DATA\InternetSecurity\ASK\GDcf.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\AVK.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\AVK.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\AVK.nl.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\avkcmd.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\AVKScanJobC.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\AVKService.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\AVKService.nl.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\AVKWCtl.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\Avkwctl.nl.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\avkwsc.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\avkwscpe.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\initrd17.xz
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\isolinux\boot.png
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\isolinux\chain.c32
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\isolinux\isolinux.bin
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\isolinux\isolinux.cfg
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\isolinux\ruscii_8x16.psf
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\isolinux\vesamenu.c32
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\linux17
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\FileBlSrv.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\RansomwareRemoval.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\RansomwareRemoval64.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\RansomwareRemovalHelper.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\RansomwareRemovalResultNotifier.de.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\RansomwareRemovalResultNotifier.en.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\RansomwareRemovalResultNotifier.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\RansomwareRemovalResultNotifier.fr.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\gdata.sqf
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\mod-av.sqf
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\moddrv17.sqf
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\mod-rsw.sqf
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\update.sqf
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCDWizard.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCDWizard.nl.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\drives.ini
  • C:\Program Files\G DATA\InternetSecurity\AVK\GDGadgetInst32.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\IConn.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\MiniIcpt2.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\ScanObjectBrowser.nl.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\ScanObjectBrowserW.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\ShellExt.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\ShellExt.nl.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\SOBFilesNSE.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\SysIcpt.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\syslinux.alt
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\$SETUP.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\$UNINSTALL.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{012058A6-B05D-4E34-8902-18CB4B2964EE}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{01546300-2425-4587-90D6-D590102945C6}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{026AC436-750E-470D-8507-7930ACC4C2FD}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{02E03C0E-0CA2-4BE8-89F6-62708FE0B17B}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{04D2E834-6CD0-40E4-916A-85C8CCE94CC3}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{059D41E2-858C-46FD-87A8-A4E936496A00}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{07365EE1-241F-48F1-9573-DB1601F3CBC6}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{08C154C6-AAC7-4F74-9D9C-39165B2A15F5}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{0914C3E1-C27C-4B42-8864-901B53B2367C}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{0918B5E4-15D4-405A-BA39-7766E349CD6B}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{0AE43D12-861F-49DB-BB10-DCE71A9E5223}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{0C33F16E-F6C2-4BFF-92B0-3C4773DAA97E}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{0CE8E160-565C-4B0D-BC76-3027C80D90F0}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{0E37B146-237E-4443-B423-FE0EDB4BB3C0}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{0FA4714F-D05F-4FC3-B273-9919DA062B4B}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{102EF464-D3C5-4348-8D16-E8FEDC63EC4E}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{112801C9-C5B1-4E74-B3A6-833DA3F3656B}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{116187A5-3F25-412E-AD33-4919EDA0C0F4}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{11C295D5-3E3D-4713-BB09-61DDEF570013}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{11DF59EC-13F4-421F-B16E-E585E66CBD1B}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{1578B145-E895-4C05-97CD-8CCB9F27CD5F}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{15FBD729-983E-45AE-8153-8831AFF5B437}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{18BB6181-00B6-485C-8090-6BDAD8467CEA}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{19C7A019-75A4-4612-817C-2C27B208FD82}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{1A3448CF-5DB0-4240-B5C4-67EB6EE5089A}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{1D88A872-B906-4FD1-B38E-DE18232A41EB}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{1FF5153C-3D5B-4C92-8A4C-6104EFAFF4B8}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{2043A6F4-9A11-4B33-A704-7E42DEA0CE2E}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{24BD3B47-ACB5-4CE0-A7FE-4ED885EDE585}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{24DE20E2-5100-4CB7-A55F-16F5DCB2E3DC}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{28CA646D-999F-4065-A3E4-1264396D702D}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{2C7D7307-B0C5-446C-A735-139C49C71B90}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{336AD54B-CDD8-46A8-BE65-8A9DAF15A0D0}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{34E3C11F-9220-48C4-B93D-E84FD620AF73}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{387A3C7D-E3D3-468F-BC00-720EE4F84C98}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{3A0EC93D-A456-4BA6-849E-5E1E1BB5E789}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{3A5044AD-AFE2-4801-9A6E-9B4CEF778641}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{3B573528-C3D7-4BD2-B945-EB19ED621FE3}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{3C888E23-E5EA-47EF-B151-DF7F4B9879FE}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{3D0F1052-183D-49EB-91D9-EDDDC96BD461}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{4151E357-B08C-4F92-94D6-6068B3AF5479}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{46381FF7-4D5A-4F8F-9625-3D1370233D12}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{495F3B81-83B1-4319-899C-D5F878DD841D}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{4BEF9088-1CFB-41E2-B769-B95EEE20AE64}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{4D96831E-9BA4-4197-B0CC-EF346E5B9090}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{4DF2ACAF-F0DE-4ABB-8155-8645B8DE1833}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{51AB8565-7F32-4F82-A87A-44B6DBDDD21F}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{528EFD3E-8188-4D7F-9A53-AA83158EAEDA}.wpk

Use regedit.exe to manually remove from the Windows Registry the keys below:
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{AC68D2FF-1674-4C16-A536-A69FC11BBD82}

Additional values that you should clean:
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\AVKService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\AVKWCtl\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\GDFwSvc\ImagePath


A way to remove G DATA INTERNET SECURITY with Advanced Uninstaller PRO

G DATA INTERNET SECURITY is a program released by the software company G DATA Software AG. Frequently, computer users decide to erase this program. Sometimes this can be efortful because doing this by hand requires some experience regarding removing Windows applications by hand. One of the best EASY approach to erase G DATA INTERNET SECURITY is to use Advanced Uninstaller PRO. Here are some detailed instructions about how to do this:





1. If you don't have Advanced Uninstaller PRO on your Windows PC, install it. This is good because Advanced Uninstaller PRO is an efficient uninstaller and all around tool to optimize your Windows computer.

DOWNLOAD NOW

  • navigate to Download Link
  • download the setup by pressing the DOWNLOAD button
  • install Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. It's recommended to take your time to get familiar with Advanced Uninstaller PRO's design and wealth of functions available. Advanced Uninstaller PRO is a very good Windows tool.

3. Press the General Tools category
Go to General Tools


4. Click on the Uninstall Programs button
Go to Uninstall Programs


5. A list of the programs installed on the PC will be made available to you

6. Navigate the list of programs until you locate G DATA INTERNET SECURITY or simply activate the Search field and type in "G DATA INTERNET SECURITY". If it exists on your system the G DATA INTERNET SECURITY application will be found automatically. After you select G DATA INTERNET SECURITY in the list , some data regarding the application is shown to you:


  • Star rating (in the left lower corner). The star rating tells you the opinion other users have regarding G DATA INTERNET SECURITY, from "Highly recommended" to "Very dangerous".
  • Reviews by other users - Press the Read reviews button.
  • Technical information regarding the application you wish to remove, by pressing the Properties button.
7. Press the Uninstall button. A window asking you to confirm will come up. accept the removal by pressing the Uninstall button. Advanced Uninstaller PRO will automatically uninstall G DATA INTERNET SECURITY.
Uninstall G DATA INTERNET SECURITY


8. After uninstalling G DATA INTERNET SECURITY, Advanced Uninstaller PRO will ask you to run a cleanup. Click Next to go ahead with the cleanup. All the items that belong G DATA INTERNET SECURITY which have been left behind will be found and you will be able to delete them. By removing G DATA INTERNET SECURITY using Advanced Uninstaller PRO, you can be sure that no registry items, files or folders are left behind on your computer.

Your PC will remain clean, speedy and ready to serve you properly.



Geographical user distribution

  • 10.0
  • Windows 7 (6.1)
  • Windows 8.1 (6.3)
  • Windows Vista (6.0)
  • Windows XP (5.1)
  • Windows 8 (6.2)
Software Application


Disclaimer

The text above is not a recommendation to uninstall G DATA INTERNET SECURITY by G DATA Software AG from your computer, we are not saying that G DATA INTERNET SECURITY by G DATA Software AG is not a good application for your PC. This text only contains detailed info on how to uninstall G DATA INTERNET SECURITY in case you want to. The information above contains registry and disk entries that Advanced Uninstaller PRO stumbled upon and classified as "leftovers" on other users' PCs.

2016-06-20 / Written by Andreea Kartman for Advanced Uninstaller PRO

follow @DeeaKartman
Last update on: 2016-06-20 00:42:50.620