Windows Server Defender
Posted: December 19, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 2/10 |
---|---|
Infected PCs: | 38 |
First Seen: | December 20, 2012 |
---|---|
OS(es) Affected: | Windows |
Win Server Defender is a fake anti-malware product that detects infections with intentional inaccuracy to make its 'security features' look purchase-worthy. Despite breaking from the usual naming convention of referencing specific versions of Windows, Win Server Defender has been identified as a member of WinPC Defender, a group of scamware programs that often block other applications and websites for malicious purposes. SpywareRemove.com malware researchers recommend that you remove Win Server Defender whenever you see Win Server Defender on your PC by using a trustworthy brand of anti-malware product, and suggest avoiding malicious sites (particularly those known to host drive-by-download exploits) that are common distribution points for PC threats like Win Server Defender.
How Win Server Defender Defends Itself (By Attacking Everything on Your Computer)
Win Server Defender uses the appearance of anti-malware software but doesn't have any ability to block malware, detect malware or detect malicious activity that targets your computer. Like all members of FakeRean, the only purpose of Win Server Defender is to deceive you about the presence of PC threats and take advantage of this using it as an excuse to intimidate you into buying a registration key. Win Server Defender and similar scamware programs often are installed by malicious advertisements and sites that use drive-by-download exploits that are often paired with fake system scans and/or software updates.
To complete the illusion of its fake security features, Win Server Defender displays both fake system scans and a range of different pop-up warnings with inaccurate contents. Win Server Defender may identify Trojans and other PC threats by technical names, claim that your Registry is being modified without your permission or warn you about information theft attacks. However, these attacks actually aren't taking place, and SpywareRemove.com malware experts recommend that you ignore any fake security information that originates from Win Server Defender.
Building Up Your PC's Defenses versus Win Server Defender
Despite its protests that Win Server Defender is your only chance of disinfecting your PC, Win Server Defender should be considered to be just as malicious and illegal as all other members of FakeRean's family of fake anti-malware scanners such as Ultimate Defender, SystemDefender, IE Defender, Advanced XP Defender, XP Defender, WinDefender2008, PCTotalDefender, PC Defender 2008, Personal Defender 2009, WinDefender 2009, Perfect Defender 2009, Total Defender, Malware Defender 2009, WinPC Defender, PC Privacy Defender, Smart Defender Pro, Rogue.UltimateDefender, FraudTool.LastDefender.b and Security Defender Pro 2015. First and foremost, you never should spend money on Win Server Defender, which should be deleted ASAP.
Anti-malware software can be used to remove Win Server Defender whenever it's required, although Win Server Defender may try to block prominent brands of anti-malware scanners. If you're incapable of using the software that you'd like to remove Win Server Defender, SpywareRemove.com malware analysts suggest stopping Win Server Defender beforehand by using Safe Mode or other techniques that can disable Win Server Defender's startup exploit.
SpywareRemove.com malware experts also consider it critical to emphasize that, besides blocking security-related programs, Win Server Defender also can modify Windows security settings or even redirect your browser away from safe sites to warning error pages. These attacks will persist until Win Server Defender is removed in its entirety, and leave your PC vulnerable to attacks from other sources.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%AllUsersProfile%\Desktop\Win Server Defender.lnk
File name: %AllUsersProfile%\Desktop\Win Server Defender.lnkFile type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%CommonAppData%\pcdfdata\
File name: %CommonAppData%\pcdfdata\Group: Malware file
%CommonAppData%\pcdfdata\support.ico
File name: %CommonAppData%\pcdfdata\support.icoMime Type: unknown/ico
Group: Malware file
%CommonAppData%\pcdfdata\uninst.ico
File name: %CommonAppData%\pcdfdata\uninst.icoMime Type: unknown/ico
Group: Malware file
%CommonAppData%\pcdfdata\app.ico
File name: %CommonAppData%\pcdfdata\app.icoMime Type: unknown/ico
Group: Malware file
%CommonAppData%\pcdfdata\config.bin
File name: %CommonAppData%\pcdfdata\config.binFile type: Binary File
Mime Type: unknown/bin
Group: Malware file
%CommonAppData%\pcdfdata\defs.bin
File name: %CommonAppData%\pcdfdata\defs.binFile type: Binary File
Mime Type: unknown/bin
Group: Malware file
%CommonAppData%\pcdfdata\vl.bin
File name: %CommonAppData%\pcdfdata\vl.binFile type: Binary File
Mime Type: unknown/bin
Group: Malware file
%CommonAppData%\pcdfdata\[RANDOM CHARACTERS].exe
File name: %CommonAppData%\pcdfdata\[RANDOM CHARACTERS].exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
%CommonStartMenu%\Programs\Win Server Defender\
File name: %CommonStartMenu%\Programs\Win Server Defender\Group: Malware file
%CommonStartMenu%\Programs\Win Server Defender\Remove Win Server Defender.lnk
File name: %CommonStartMenu%\Programs\Win Server Defender\Remove Win Server Defender.lnkFile type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%CommonStartMenu%\Programs\Win Server Defender\Win Server Defender.lnk
File name: %CommonStartMenu%\Programs\Win Server Defender\Win Server Defender.lnkFile type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
%CommonStartMenu%\Programs\Win Server Defender\Win Server Defender Help and Support.lnk
File name: %CommonStartMenu%\Programs\Win Server Defender\Win Server Defender Help and Support.lnkFile type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
Registry Modifications
HKEY..\..\{Value}HKEY_CLASSES_ROOT\.exe "(Default)" = "[RANDOM CHARACTERS]"HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command "(Default)" = ""%CommonAppData%\pcdfdata\[RANDOM CHARACTERS].exe" /ex "%1" %*"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\..{RunKeys}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "pcdfsvc" = "%CommonAppData%\pcdfdata\[RANDOM CHARACTERS].exe /min"HKEY_LOCAL_MACHINE\Software\[APPLICATION]\Microsoft\Windows\CurrentVersion\Uninstall..{Uninstaller}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\pcdfdata
Additional Information
# | Message |
---|---|
1 | System Security Alert!
Unknown program is scanning your system registry right now! Identify the theft detected! |
2 | System Security Alert!
Vulnerabilities found Background scan for security breaches has been finished. Serious problems have been detected. Safeguard your system against exploits, malware and viruses right now by activating Proactive Defence. |
3 | Win Server Defender Firewall Alert
Iexplore.exe is infected with Banker.Deus. Private data can be stolen by third parties, including credit card details and passwords. |
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.