Home Malware Programs Rogue Anti-Spyware Programs Windows Active Defender

Windows Active Defender

Posted: June 14, 2012

Threat Metric

Threat Level: 10/10
Infected PCs: 12
First Seen: June 14, 2012
Last Seen: January 8, 2020
OS(es) Affected: Windows

Windows Active Defender Screenshot 1Windows Active Defender is another entry into the annals of rogue anti-malware software that's classified under the umbrella of the Win32/FakeVimes (or simply FakeVimes) family. While Windows Active Defender doesn't have any true functions intended for the protection of your computer against viruses, rootkits and other PC threats, Windows Active Defender's pop-up alerts and system scans will display inaccurate information to convince you otherwise. Attacks by Windows Active Defender may also include the creation of junk files, browser redirects or blocking legitimate PC security applications. Since Windows Active Defender's real features place your PC in a state of considerable vulnerability, SpywareRemove.com malware experts encourage the use of exhaustive anti-malware scans to find and delete Windows Active Defender and anything else that was included in its installation attack.

Windows Active Defender: a Vigorous Offense Hiding Behind a Lackluster Defense

Windows Active Defender uses the same methodology common to all scamware: creating fake reasons to panic as an incentive for spending money on its fraudulent security software. Buying Windows Active Defender's registration key should never be considered a wise idea, even though Windows Active Defender will constantly announce the presence of everything from keyloggers to unauthorized network activity to remote attempts to steal your identity. Because Windows Active Defender's system scans and other security pretenses are all utterly fake, SpywareRemove.com malware researchers note that the best thing that you can do is ignore them wholesale.

As long as Windows Active Defender is active in memory, Windows Active Defender may also be a source of other attacks that Windows Active Defender will attempt to make look like activities of unrelated PC threats. These can include:

  • Browser redirects that promote malicious sites, including spam-based search engines. SpywareRemove.com malware researchers especially advise you to minimize contact with any sites that are promoted by Windows Active Defender's browser attacks.
  • Blocked security and anti-malware tools, up to and including basic utilities like your Windows Task Manager.
  • The creation of dummy files that Windows Active Defender may use to implicate other types of malware. These files are, in and of themselves, harmless, except insofar as they're symptoms of a Windows Active Defender infection.
  • Reduced security settings for various programs, including the Windows OS and your web browser.

The PC Security That Even Windows Active Defender Can't Defend Itself Against

Windows Active Defender should always be disabled and removed as soon as possible, assuming you have access to anti-malware products that can do so with maximum safety. If Windows Active Defender attempts to block software that could remove Windows Active Defender, SpywareRemove.com malware researchers recommend booting into Safe Mode or using other alternatives in OS boot-up techniques to ensure that Windows Active Defender can't launch. Failure to do this prior to a system scan can result in Windows Active Defender or other PC threats surviving even if they're detected.

Similar precautions should be taken against any other member of WinPC Defender, such as Ultimate Defender, SystemDefender, IE Defender, Advanced XP Defender, XP Defender, WinDefender2008, PCTotalDefender, PC Defender 2008, Personal Defender 2009, WinDefender 2009, Perfect Defender 2009, Total Defender, Malware Defender 2009, WinPC Defender, PC Privacy Defender, Smart Defender Pro, Rogue.UltimateDefender, FraudTool.LastDefender.b and Security Defender Pro 2015. Modern FakeVimes variants are particularly likely to resemble Windows Active Defender in both their appearances and naming schemes – the latter of which will usually (but not always) follow a pattern such as 'Windows [adjective] [noun].'

Windows Active Defender Screenshot 2Windows Active Defender Screenshot 3Windows Active Defender Screenshot 4Windows Active Defender Screenshot 5Windows Active Defender Screenshot 6Windows Active Defender Screenshot 7Windows Active Defender Screenshot 8Windows Active Defender Screenshot 9Windows Active Defender Screenshot 10Windows Active Defender Screenshot 11Windows Active Defender Screenshot 12

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%APPDATA%\Protector-wcsf.exe File name: Protector-wcsf.exe
Size: 1.93 MB (1939456 bytes)
MD5: 6cbcda5f9b1954a1f35fd4bbdacaa9a4
Detection count: 57
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: January 8, 2020
%AppData%\Protector-[RANDOM CHARACTERS].exe File name: %AppData%\Protector-[RANDOM CHARACTERS].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Inspector = %AppData%\Protector-[RANDOM CHARACTERS].exeHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTray.exe\"Debugger" = "svchost.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a.exe\"Debugger" = "svchost.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AlphaAV.exe\"Debugger" = "svchost.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\About.exe\"Debugger" = "svchost.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alertsvc.exe\"Debugger" = "svchost.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ackwin32.exe\"Debugger" = "svchost.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ad-Aware.exe\"Debugger" = "svchost.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alogserv.exe\"Debugger" = "svchost.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aAvgApi.exe\"Debugger" = "svchost.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alevir.exe\"Debugger" = "svchost.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AdwarePrj.exe\"Debugger" = "svchost.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\agent.exe\"Debugger" = "svchost.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adaware.exe\"Debugger" = "svchost.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\agentsvr.exe\"Debugger" = "svchost.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\advxdwin.exe\"Debugger" = "svchost.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\agentw.exe\Debugger = svchost.exeHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AlphaAV\"Debugger" = "svchost.exe"

4 Comments

  • Angie Stevens says:

    Okay, got the SpyHunter installed and somehow my internet will not access due to Windows Active Defender. HOw do I restore internet? SpyHunter has detected this Windows Active Defender and I will proceed to remove it now.

  • Michael Stevens says:

    keeps kicking me out of browsers. cannot go into internet to download anything. using neighbors laptop. what can i do?

  • Rooster says:

    @ Angie, Go into your device manager, VIA control panel/Performance and maintenance/Computer Management/Device manager. Now find your network adapters Double click on the selections and trubleshoot and or udate drivers if this does not work roll back your drivers.

  • Richard Nguyen says:

    You have to go into safe mode so Windows Active Defender won't block anything.

Loading...