Don't turn off System Restore yet!!!
I like Malwarebytes. An excellent program, certainly a part of the cocktail of programs generally required to defeat this infection. Often several utilities are needed to remove and reverse the effects of this hostageware. The more a user has clicked on the fake antivirus messages, the more Windows features get turned off as a result. This is by design in the virus, so that the user gets frustrated enough to buy the fake program they are flogging as the cure. Then they have your credit card number, which is what they want. Their fake antivirus reports that you have many virus infections. This is a fake report, though some of the virus names may be fimiliar.
As a computer tech, in our firm, we use the following steps on this family of infections:
1. Run System Restore and choose a date prevoius to your infection. This step is very important to reverse all of the changes that the infection has made in your registry. If you don't do this step, you will most probably come to realize that the time it will take to repair all the desktop policies and other features of Windows that have been disabled will force you into a wipe and reload of your Windows anyway. If System Restore has been disable by the virus already, then we use a bootable CD called MiniPE to restore the registry.
2. After performing step #1, we then turn off System Restore in Windows.
3. Run Combofix.exe on your computer. You can download it from the site I mentioned above. There are other download sites that claim to have this important utility, but most are fake. Go with all the defaults and choose to install the Microsoft Recovery Console when it asks.
4. Install the SuperAntispyware utility and update it.
5. Run a full scan using SuperAntispyware. Remove everything it finds.
6. Run the Windows Fixes in SuperAntiSpyware. They are found in the Preferences->Fixes section. Apply them all. This will require several reboots, but will turn on most of what the virus turned off. This is like chasing a thief (the virus) out of your home. Then you have to fix what he broke while he was there (the Windows fixes)
7. Install MalWareBytes and do a full scan. Remove all that is found.
8. Use ATF cleaner to purge all temp files (a great little utility).
9. Install CCleaner.exe and do and scan both the drive and the registry.
10. Run SFC /scannow from the Run Command to replace missing or corrupt Windows files (You will likely be required to insert your Windows CD, so find it now)
11. Finally, open Internet Explorer. Click on Tools->Internet Options->Advanced->click the Reset button. This will reverse settings made by the virus in your browser.
Final Note: The organized crime family behind this identity theft virus has found a way to keep their Window on top of Task Manager, the Start Window, and other Windows features lately. I have found that Alt+F4 will close them though.
If you have any questions about these steps, please let me know.
Best of Luck!