Home Malware Programs Rogue Anti-Spyware Programs Windows Pro Defence Kit

Windows Pro Defence Kit

Posted: March 18, 2014

Threat Metric

Threat Level: 10/10
Infected PCs: 12
First Seen: March 18, 2014
Last Seen: January 8, 2020
OS(es) Affected: Windows


Windows Pro Defence Kit Screenshot 1Windows Pro Defence Kit is a new clone of old, rogue anti-malware products that claim to offer your PC security services, when their real functions involve displaying fake information, attempting to defraud you of money and blocking most legitimate programs that could help your PC. Connected to infamous families like Tritax and FakePAV and belonging to the FakeVimes family, Windows Pro Defence Kit is just as much a danger to you as previous members of these scamware groups, and malware experts always urge you to remove Windows Pro Defence Kit as fast as possible. The use of additional security procedures usually will be needed before you can use any anti-malware utilities that can isolate and uninstall Windows Pro Defence Kit safely.

The Defence Kit that's Plundering Your Wallet

Windows Pro Defence Kit is another update given to previous, equally fake anti-malware products that pretend to scan your PC for threats – only to, inevitably, find new infections continuously. While Windows Pro Defence Kit doesn't detect real threat, Windows Pro Defence Kit is capable of pulling up lists of legitimate threat names in its fraudulent system scanner results. More significantly than that, malware researchers also have connected Windows Pro Defence Kit's fraudulent security functions with attacks that can block unrelated applications.

The latter usually will trigger for security-related products, such as Task Manager or major anti-virus brands. Windows Pro Defence Kit also can prevent you from using some brands of Web browsers or instant messaging programs. Whatever its target might be, Windows Pro Defence Kit's attack will display a fake firewall alert that implies that the associated program has been compromised by threats with network communication capabilities. When paying Windows Pro Defence Kit its requested fee, Windows Pro Defence Kit will pretend to remove this threat from your computer, which malware experts naturally don't recommend, since Windows Pro Defence Kit wastes money, in exchange for no real security features at all.

Taking the Professional Recourse to Windows Pro Defence Kit's Attacks

Windows Pro Defence Kit is no more of a net advantage to your PC's security than any Trojan would be, and malware researchers find its removal to be essential for your PC's safety and privacy. Because of its habit of terminating other programs, you often will find it necessary to disable Windows Pro Defence Kit before Windows Pro Defence Kit can be uninstalled. Safe Mode combined with common backup OS devices, such as USB drives, will give you the perfect environment for doing so. With Windows Pro Defence Kit disabled, thorough anti-malware scans should be used for removing Windows Pro Defence Kit and for making sure that no other threatening software has compromised your PC. Most scamware products like Windows Pro Defence Kit benefit from the attacks of related PC threats, such as Trojan downloaders.

Distribution methods for Windows Pro Defence Kit may encompass fake software updates, fraudulent online scanners and mislabeled spam attachments, many of which may be traced to corrupted websites or links. Strong browser security is an essential step in blocking potential installation methods for Windows Pro Defence Kit, which is more difficult to remove than Windows Pro Defence Kit is to detect and delete before Windows Pro Defence Kit's installed. Similar precautions are just as relevant to clones of Windows Pro Defence Kit, which malware experts have examined under diverse names such as Privacy Guard Pro, PrivacyGuard Pro 2.0, Extra Antivirus, Fast Antivirus 2009, Presto TuneUp, Windows Security Suite, Smart Virus Eliminator, Packed.Generic.245, Volcano Security Suite, Windows Enterprise Suite, Enterprise Suite, Additional Guard, Live PC Care, PC Live Guard, Live Enterprise Suite, Security Antivirus, My Security Wall, CleanUp Antivirus and Smart Security.

Windows Pro Defence Kit Screenshot 2Windows Pro Defence Kit Screenshot 3Windows Pro Defence Kit Screenshot 4Windows Pro Defence Kit Screenshot 5Windows Pro Defence Kit Screenshot 6Windows Pro Defence Kit Screenshot 7Windows Pro Defence Kit Screenshot 8Windows Pro Defence Kit Screenshot 9Windows Pro Defence Kit Screenshot 10Windows Pro Defence Kit Screenshot 11Windows Pro Defence Kit Screenshot 12Windows Pro Defence Kit Screenshot 13Windows Pro Defence Kit Screenshot 14Windows Pro Defence Kit Screenshot 15Windows Pro Defence Kit Screenshot 16Windows Pro Defence Kit Screenshot 17Windows Pro Defence Kit Screenshot 18Windows Pro Defence Kit Screenshot 19Windows Pro Defence Kit Screenshot 20Windows Pro Defence Kit Screenshot 21Windows Pro Defence Kit Screenshot 22Windows Pro Defence Kit Screenshot 23Windows Pro Defence Kit Screenshot 24Windows Pro Defence Kit Screenshot 25Windows Pro Defence Kit Screenshot 26Windows Pro Defence Kit Screenshot 27Windows Pro Defence Kit Screenshot 28Windows Pro Defence Kit Screenshot 29

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



svc-qtgs.exe File name: svc-qtgs.exe
Size: 1.22 MB (1226240 bytes)
MD5: a9a08bef52b281d00861201fa8ec132b
Detection count: 27
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: January 8, 2020

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "S_SC" = %AppData%\svc-[RANDOM CHARACTERS].exeHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "ZSFT" = %AppData%\svc-[RANDOM CHARACTERS].exeHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "MS-SEC" = %AppData%\svc-[RANDOM CHARACTERS].exeHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "SD-986-001" = %AppData%\svc-[RANDOM CHARACTERS].exeHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations "LowRiskFileTypes" = ".zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments "SaveZoneInformation" = 1HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" = "%AppData%\svc-[RANDOM CHARACTERS].exe"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorAdmin" = 0HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "ConsentPromptBehaviorUser" = 0HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bckd "ImagePath" = 22.sys HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "EnableLUA" = 0HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "EnableVirtualization" = 0HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exeHKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exeHKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exeHKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exeHKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exeHKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exeHKEY_LOCAL_MACHINE\Software\microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe

Additional Information

The following messages's were detected:
# Message
1Error
Potential malware detected. It is recommended to activate the protection and perform a thorough system scan to remove the malware.
2Error
Software without a digital signature detected. Your system files are at risk. We strongly advise you to activate your protection.
3Firewall has blocked a program from accessing the Internet
Malwarebytes' Anti-Malware
C:\program files\malwarebytes' anti-malware\mbam.exe
C:\program files\malwarebytes' anti-malware\mbam.exe
is suspected to have infected your PC.
This type of virus intercepts entered data and transmits them to a remote server.

Loading...