G DATA INTERNET SECURITY G DATA INTERNET SECURITY



A way to uninstall G DATA INTERNET SECURITY from your PC

G DATA INTERNET SECURITY is a Windows application. Read below about how to uninstall it from your PC. It was coded for Windows by G DATA Software AG. Further information on G DATA Software AG can be seen here. G DATA INTERNET SECURITY is usually set up in the C:\Program Files (x86)\G DATA\InternetSecurity folder, depending on the user's option. The complete uninstall command line for G DATA INTERNET SECURITY is C:\ProgramData\G Data\Setups\{AC68D2FF-1674-4C16-A536-A69FC11BBD82}\setup.exe /InstallMode=Uninstall /_DoNotShowChange=true. The application's main executable file is called GDSC.exe and occupies 2.53 MB (2652280 bytes).

The executables below are part of G DATA INTERNET SECURITY. They take an average of 27.56 MB (28897976 bytes) on disk.



  • ASK.exe (423.62 KB)
  • AVK.exe (424.62 KB)
  • avkcmd.exe (1.19 MB)
  • AVKService.exe (948.12 KB)
  • AVKWCtlx64.exe (3.88 MB)
  • avkwscpe.exe (442.27 KB)
  • BootCDWizard.exe (1.71 MB)
  • GDGadgetInst32.exe (3.38 MB)
  • RansomwareRemovalHelper.exe (312.12 KB)
  • RansomwareRemovalResultNotifier.exe (2.71 MB)
  • AvkCKS.exe (289.77 KB)
  • AVKKid.exe (429.12 KB)
  • AVKTray.exe (2.22 MB)
  • AutorunDelayLoader.exe (424.12 KB)
  • GDFirewallTray.exe (1.79 MB)
  • GDFwAdmin.exe (421.62 KB)
  • GDFwSvcx64.exe (3.07 MB)
  • InitInstx64.exe (288.12 KB)
  • GDLog.exe (646.62 KB)
  • GDSC.exe (2.53 MB)
  • Reisswlf64.exe (146.12 KB)
...click to view all...

This info is about G DATA INTERNET SECURITY version 25.1.0.12 alone. For other G DATA INTERNET SECURITY versions please click below:

...click to view all...
Many files, folders and Windows registry data will not be uninstalled when you are trying to remove G DATA INTERNET SECURITY from your PC.

Directories left on disk:
  • C:\Program Files\G DATA\InternetSecurity

Generally, the following files remain on disk:
  • C:\Program Files\G DATA\InternetSecurity\ASK\ask.dll
  • C:\Program Files\G DATA\InternetSecurity\ASK\ASK.exe
  • C:\Program Files\G DATA\InternetSecurity\ASK\ASK.nl.dll
  • C:\Program Files\G DATA\InternetSecurity\ASK\GDASpam.dll
  • C:\Program Files\G DATA\InternetSecurity\ASK\GDcf.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\AVK.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\AVK.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\AVK.nl.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\avkcmd.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\AVKScanJobC.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\AVKService.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\AVKService.nl.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\AVKWCtl.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\Avkwctl.nl.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\avkwsc.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\avkwscpe.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\initrd17.xz
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\isolinux\boot.png
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\isolinux\chain.c32
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\isolinux\isolinux.bin
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\isolinux\isolinux.cfg
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\isolinux\ruscii_8x16.psf
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\isolinux\vesamenu.c32
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\boot\linux17
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\FileBlSrv.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\RansomwareRemoval.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\RansomwareRemoval64.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\RansomwareRemovalHelper.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\RansomwareRemovalResultNotifier.de.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\RansomwareRemovalResultNotifier.en.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\RansomwareRemovalResultNotifier.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\dbase.dir\var\lib\gdata\RansomwareRemovalResultNotifier.fr.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\gdata.sqf
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\mod-av.sqf
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\moddrv17.sqf
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\mod-rsw.sqf
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCD\live\update.sqf
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCDWizard.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\BootCDWizard.nl.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\drives.ini
  • C:\Program Files\G DATA\InternetSecurity\AVK\GDGadgetInst32.exe
  • C:\Program Files\G DATA\InternetSecurity\AVK\IConn.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\MiniIcpt2.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\ScanObjectBrowser.nl.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\ScanObjectBrowserW.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\ShellExt.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\ShellExt.nl.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\SOBFilesNSE.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\SysIcpt.dll
  • C:\Program Files\G DATA\InternetSecurity\AVK\syslinux.alt
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\$SETUP.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\$UNINSTALL.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{012058A6-B05D-4E34-8902-18CB4B2964EE}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{01546300-2425-4587-90D6-D590102945C6}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{026AC436-750E-470D-8507-7930ACC4C2FD}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{02E03C0E-0CA2-4BE8-89F6-62708FE0B17B}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{04D2E834-6CD0-40E4-916A-85C8CCE94CC3}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{059D41E2-858C-46FD-87A8-A4E936496A00}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{07365EE1-241F-48F1-9573-DB1601F3CBC6}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{08C154C6-AAC7-4F74-9D9C-39165B2A15F5}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{0914C3E1-C27C-4B42-8864-901B53B2367C}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{0918B5E4-15D4-405A-BA39-7766E349CD6B}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{0AE43D12-861F-49DB-BB10-DCE71A9E5223}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{0C33F16E-F6C2-4BFF-92B0-3C4773DAA97E}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{0CE8E160-565C-4B0D-BC76-3027C80D90F0}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{0E37B146-237E-4443-B423-FE0EDB4BB3C0}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{0FA4714F-D05F-4FC3-B273-9919DA062B4B}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{102EF464-D3C5-4348-8D16-E8FEDC63EC4E}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{112801C9-C5B1-4E74-B3A6-833DA3F3656B}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{116187A5-3F25-412E-AD33-4919EDA0C0F4}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{11C295D5-3E3D-4713-BB09-61DDEF570013}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{11DF59EC-13F4-421F-B16E-E585E66CBD1B}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{1578B145-E895-4C05-97CD-8CCB9F27CD5F}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{15FBD729-983E-45AE-8153-8831AFF5B437}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{18BB6181-00B6-485C-8090-6BDAD8467CEA}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{19C7A019-75A4-4612-817C-2C27B208FD82}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{1A3448CF-5DB0-4240-B5C4-67EB6EE5089A}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{1D88A872-B906-4FD1-B38E-DE18232A41EB}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{1FF5153C-3D5B-4C92-8A4C-6104EFAFF4B8}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{2043A6F4-9A11-4B33-A704-7E42DEA0CE2E}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{24BD3B47-ACB5-4CE0-A7FE-4ED885EDE585}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{24DE20E2-5100-4CB7-A55F-16F5DCB2E3DC}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{28CA646D-999F-4065-A3E4-1264396D702D}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{2C7D7307-B0C5-446C-A735-139C49C71B90}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{336AD54B-CDD8-46A8-BE65-8A9DAF15A0D0}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{34E3C11F-9220-48C4-B93D-E84FD620AF73}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{387A3C7D-E3D3-468F-BC00-720EE4F84C98}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{3A0EC93D-A456-4BA6-849E-5E1E1BB5E789}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{3A5044AD-AFE2-4801-9A6E-9B4CEF778641}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{3B573528-C3D7-4BD2-B945-EB19ED621FE3}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{3C888E23-E5EA-47EF-B151-DF7F4B9879FE}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{3D0F1052-183D-49EB-91D9-EDDDC96BD461}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{4151E357-B08C-4F92-94D6-6068B3AF5479}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{46381FF7-4D5A-4F8F-9625-3D1370233D12}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{495F3B81-83B1-4319-899C-D5F878DD841D}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{4BEF9088-1CFB-41E2-B769-B95EEE20AE64}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{4D96831E-9BA4-4197-B0CC-EF346E5B9090}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{4DF2ACAF-F0DE-4ABB-8155-8645B8DE1833}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{51AB8565-7F32-4F82-A87A-44B6DBDDD21F}.wpk
  • C:\Program Files\G DATA\InternetSecurity\AVK\UpdatePGM\{528EFD3E-8188-4D7F-9A53-AA83158EAEDA}.wpk

Use regedit.exe to manually remove from the Windows Registry the keys below:
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{AC68D2FF-1674-4C16-A536-A69FC11BBD82}

Additional values that you should clean:
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\AVKService\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\AVKWCtl\ImagePath
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\GDFwSvc\ImagePath




A way to remove G DATA INTERNET SECURITY with Advanced Uninstaller PRO

G DATA INTERNET SECURITY is a program released by the software company G DATA Software AG. Frequently, computer users decide to erase this program. Sometimes this can be efortful because doing this by hand requires some experience regarding removing Windows applications by hand. One of the best EASY approach to erase G DATA INTERNET SECURITY is to use Advanced Uninstaller PRO. Here are some detailed instructions about how to do this:

1. If you don't have Advanced Uninstaller PRO already installed on your system, add it. This is good because Advanced Uninstaller PRO is a very efficient uninstaller and all around tool to maximize the performance of your system.

DOWNLOAD NOW

2. Start Advanced Uninstaller PRO. Take your time to admire Advanced Uninstaller PRO's design and number of features available. Advanced Uninstaller PRO is a very useful program.

3. Press the General Tools button
Go to General Tools


4. Press the Uninstall Programs feature
Go to Uninstall Programs


5. All the applications existing on your PC will be shown to you

6. Navigate the list of applications until you find G DATA INTERNET SECURITY or simply activate the Search field and type in "G DATA INTERNET SECURITY". If it is installed on your PC the G DATA INTERNET SECURITY application will be found automatically. When you click G DATA INTERNET SECURITY in the list of applications, some data about the application is made available to you:


  • Star rating (in the lower left corner). The star rating explains the opinion other people have about G DATA INTERNET SECURITY, ranging from "Highly recommended" to "Very dangerous".
  • Reviews by other people - Press the Read reviews button.
  • Technical information about the app you want to remove, by pressing the Properties button.
7. Press the Uninstall button. A window asking you to confirm will come up. accept the removal by pressing the Uninstall button. Advanced Uninstaller PRO will automatically uninstall G DATA INTERNET SECURITY.
Uninstall G DATA INTERNET SECURITY


8. After uninstalling G DATA INTERNET SECURITY, Advanced Uninstaller PRO will ask you to run a cleanup. Click Next to go ahead with the cleanup. All the items that belong G DATA INTERNET SECURITY which have been left behind will be found and you will be able to delete them. By removing G DATA INTERNET SECURITY using Advanced Uninstaller PRO, you can be sure that no registry items, files or folders are left behind on your computer.

Your PC will remain clean, speedy and ready to serve you properly.

DOWNLOAD NOW

Geographical user distribution

  • 10.0
  • Windows 7 (6.1)
  • Windows 8.1 (6.3)
  • Windows Vista (6.0)
  • Windows XP (5.1)
Software Application


Disclaimer

The text above is not a recommendation to uninstall G DATA INTERNET SECURITY by G DATA Software AG from your computer, we are not saying that G DATA INTERNET SECURITY by G DATA Software AG is not a good application for your PC. This text only contains detailed info on how to uninstall G DATA INTERNET SECURITY in case you want to. The information above contains registry and disk entries that Advanced Uninstaller PRO stumbled upon and classified as "leftovers" on other users' PCs.

2016-06-20 / Written by Andreea Kartman for Advanced Uninstaller PRO

follow @DeeaKartman
Last update on: 2016-06-20 00:42:50.620