Home Malware Programs Rogue Anti-Spyware Programs Windows Threats Destroyer

Windows Threats Destroyer

Posted: March 1, 2012

Threat Metric

Threat Level: 10/10
Infected PCs: 93
First Seen: March 1, 2012
OS(es) Affected: Windows

Windows Threats Destroyer Screenshot 1Windows Threats Destroyer claims to be able to detect and take care of an entire spectrum of PC threats that encompass everything from phishing attacks to viruses, but a close look at Windows Threats Destroyer's features will show that Windows Threats Destroyer is just another fake anti-virus product that's been cloned from previous examples of the same. As a FakeVimes-derived rogue anti-virus program Windows Attacks Preventor is identical to such PC threats as Privacy Guard Pro, PrivacyGuard Pro 2.0, Extra Antivirus, Fast Antivirus 2009, Presto TuneUp, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, Live PC Care, PC Live Guard, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus and Smart Security. Windows Threats Destroyer should be removed from your PC whenever you have access to anti-malware software of good repute. Until you do so, fraudulent warning messages, browser redirect attacks and blockades against your real security software are likely to haunt your PC while Windows Threats Destroyer is active.

Windows Threats Destroyer – a True Destroyer of Threats... to Itself

Windows Threats Destroyer's rather ominous name may be memorable, but all of Windows Threats Destroyer's features and even its appearance are all cheap copies of preexisting aspects of other brands of Rogue.VirusDoctor scamware. While Windows Threats Destroyer will make every attempt to fool you into believing that there's a teeming swarm of PC threats assaulting your computer, Windows Threats Destroyer doesn't have any real anti-virus or threat removal capabilities, and as such, should be ignored whenever its many fake alerts appear.

SpywareRemove.com malware researchers have also concluded that likely attacks from Windows Threats Destroyer aren't limited to these fake security pop-ups, or even inaccurate simulations of system scans. Windows Threats Destroyer may also:

  • Launch itself without your permission when Windows starts (by inserting startup entries into the Windows Registry).
  • Remain open in the background as a memory process even if you attempt to close its visible window.
  • Attack your web browser to constrict your ability to load PC security sites or to force you to visit Windows Threats Destroyer's homepage.
  • Block certain system tools, such as Task Manager, which Windows Threats Destroyer may replace with its own fake security functions.
  • Prevent you from running anti-malware scanners or other security applications that could remove Windows Threats Destroyer without trouble.

Taking Windows Threats Destroyer Out to the Trash

Due to Windows Threats Destroyer's proclivity for launching itself right along with Windows, it's recommended that you launch your OS in a way that prevents Windows Threats Destroyer from loading before you try to delete Windows Threats Destroyer. Common options for achieving this include booting into Safe Mode, booting from a removable drive or loading a second OS, and any of these choices should allow you to scan your PC with suitable software and remove Windows Threats Destroyer and any related PC threats.

Since Windows Threats Destroyer is still newly-identified as of March 2012, you may want to update your anti-malware software before you attempt a scan. Although the scamware that Windows Threat Destroyer is based on are fairly old, Windows Threat Destroyer may include updates that make it more difficult to detect than its ancestors, and having an updated threat database will insure as much accuracy in threat detection as possible.

Windows Threats Destroyer, like other members of its family, is designed to attack Windows-based computers, and SpywareRemove.com malware researchers note that Linux, Mac and other operating systems should be safe from Windows Threats Destroyer attacks.

Windows Threats Destroyer Screenshot 2Windows Threats Destroyer Screenshot 3Windows Threats Destroyer Screenshot 4Windows Threats Destroyer Screenshot 5Windows Threats Destroyer Screenshot 6Windows Threats Destroyer Screenshot 7Windows Threats Destroyer Screenshot 8Windows Threats Destroyer Screenshot 9Windows Threats Destroyer Screenshot 10Windows Threats Destroyer Screenshot 11

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%APPDATA%\Protector-rxi.exe File name: Protector-rxi.exe
Size: 1.89 MB (1894400 bytes)
MD5: 89c3bd82bc57b2b7bdc4acd8b49b6b45
Detection count: 20
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: March 1, 2012

One Comment

Loading...