How to remove WinPC Defender

  • March 17, 2009

WinPC Defender is a new rogue anti-spyware program discovered by security analyst S!Ri and is a clone of the programs named XP Police Antivirus and IE Security. Like its predecessors, this program is installed and advertised through the use of Trojans that display fake security alerts on your computer. These security alerts state that your computer is infected and that you should click on them in order to download software that will protect you. Once you click on these alerts, the Trojan will automatically download and install the program on your computer.

  • WinPC Defender screen
  • Scanning screen
  • Warning after scan is finished
  • Scan results
  • Privacy Keeper settings
  • Firewall settings
  • Firewall Warning pop-up
  • Internet Explorer Hijacked
  • False Security Alert

When WinPC Defender is installed it will scan your computer and display a variety of infections that cannot be removed unless you purchase the program. These infections, though, do not actually exist on your computer. Instead WinPC Defender is programmed to always show the same scan results regardless of the computer it is run on. It does this in order to scam you into thinking that you are infected and hoping that you will purchase the program in order to remove the infections. When S!Ri was testing this rogue he had registered his copy of the program to see if even the registered version would remove these so-called infections. Even when the program was registered, it still would not remove any of the infections and continued to state that your computer was infected.

A byproduct of this program running on your computer is an endless barrage of false warnings and Internet Explorer hijackings. These alerts are programmed to stay on top of your desktop so that if you have any running applications you need to close the alerts before you can get back to the screen you were working on. Even more annoying is that when you close these alerts you will then have to wade through a bunch of "Are you sure?" screens before the alert will close. The alerts that we saw when testing included a Firewall Warning and a Trojan alert. The text of these alerts are:

Trojan detected!
A piece of malicious code was found in your system which can replicate itself if no action is taken. Click here to have your system cleaned by WinPC Defender

Firewall Warning
Hidden file transfer to remote host was detected.

This program, in addition to the nag screens, will hijack your Internet Explorer browser so that it randomly shows a warning when you are browsing the web. While browsing the web, you may be shown a Insecure Internet Activity. Threat of virus attack screen, instead of the page you are trying to browse to. This screen will contain an option to continue to the page or purchase WinPC Defender. Regardless of the choice you select, you will still be brought to the purchase page for this program.

As you can see, this program has only one purpose and that is to trick you into thinking you are infected so that you purchase it. Please ignore any warnings that this program may display and instead use the free removal guide below to remove WinPC Defender and any associated malware.

 

Self Help Guide

This guide contains advanced information, but has been written in such a way so that anyone can follow it. Please ensure your data is backed up before proceeding.

If you are uncomfortable making changes to your computer or following these steps, do not worry! Instead you can get free one-on-one help by asking in the forums.

To remove WinPC Defender, follow these steps:

1

This removal guide may appear overwhelming due to the amount of the steps and numerous programs that will be used. It was only written this way to provide clear, detailed, and easy to understand instructions that anyone can use to remove this infection for free. Before using this guide, we suggest that you read it once and download all necessary tools to your desktop. After doing so, please print this page as you may need to close your browser window or reboot your computer.

2

Now please download RogueKiller and save it to your desktop. RogueKiller will scan your computer for unwanted programs that may have been installed on your computer without your knowledge. You can download RogueKiller from the following URL:

img
RogueKiller
3

When RogueKiller has finished downloading, please double-click on the Setup.exe icon that now appears on your desktop. Once you double-click on the icon the RogueKiller setup will begin. Please follow the prompts to install the program onto your computer.

Keep clicking next until you are at a screen asking you to enter license information. If you have purchased RogueKiller in the past, you can enter your license in this screen. Otherwise, click on the Next and keep following the prompts until the program is installed.

4

RogueKiller should now launch automatically and display a User Account Control prompt asking if you wish to run the program. Click on the Yes button and RogueKiller will start and display the main screen shown below.

RogueKiller Main Screen Prompt

5

Now click on the Scan button and you should come to the Scan Settings screen. Do not make any changes and then click on the Start Scan

RogueKiller will now scan your computer for infections, as shown below. This process can take quite a while, so please be patient as RogueKiller scans your computer.

RogueKiller Scanning the Computer

6

When RogueKiller has finished scanning your computer, it will display a screen showing what was found.

RogueKiller Log

Please review the list of detected files and put a checkmark in those entries that you wish RogueKiller to remove. When ready, click on the Remove Selected button.

RogueKiller will now remove the selected items and display a Removal Finished screen. At this screen you can click on the Finish button and then click on the same button at the next screen to finish the RogueKiller removal process.

7

Now you should download HitmanPro from the following location and save it to your desktop:

img
HitmanPro

When you visit the above page, please download the version that corresponds to the bit-type of the Windows version you are using.

8

Once downloaded, double-click on the file named HitmanPro.exe (for 32-bit versions of Windows) or HitmanPro_x64.exe (for 64-bit versions of Windows). When the program starts you will be presented with the start screen as shown below.

HitmanPro Start Screen

Now click on the Next button to continue with the scan process.

9

You will now be at the HitmanPro setup screen. If you would like to install the 30 day trial for HitmanPro, select the Yes, create a copy of HitmanPro so I can regularly scan this computer (recommended) option. Otherwise, if you just want to scan the computer this one time, please select the No, I only want to perform a one-time scan to check this computer option.

Kickstart Setup Options

Once you have selected one of the options, please click on the Next button.

10

HitmanPro will now begin to scan your computer for infections, adware, and potentially unwanted programs. When it has finished it will display a list of all the items that Hitman has found as shown in the image below. Please note that the items found may be different than what is shown in the image.

MalwareBytes Scan Results

You should now click on the Next button to have HitmanPro remove the detected items. When it is done you will be shown a Removal Results screen that shows the status of the various programs that were removed. At this screen you should click on the Next button and then if prompted you should click on the Reboot button. If HitmanPro does not prompt you to reboot, please just click on the Close button.

Once your computer has has restarted or you pressed the Close button, you should now be at your Windows desktop.

11

As many malware and unwanted programs are installed through vulnerabilities found in out-dated and insecure programs, it is strongly suggested that you use Secunia PSI to scan for vulnerable programs on your computer. A tutorial on how to use Secunia PSI to scan for vulnerable programs can be found here:

How to detect vulnerable and out-dated programs using Secunia Personal Software Inspector

Your computer should now be free of the WinPC Defender program. If your current security solution allowed this program on your computer, you may want to consider purchasing the full-featured version of HitmanPro to protect against these types of threats in the future.

If you are still having problems with your computer after completing these instructions, then please follow the steps outlined in the topic linked below:

Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help

Are Your Protected?

While HitmanPro will scan and clean a computer for free, the free versions do not offer real-time protection. If you want to be fully protected at all times then it is recommended that you purchase a premium version.

img

HitmanPro

Purchase the full-featured version of HitmanPro, which includes discover viruses, trojans, rootkits, spyware and other malware on up-to-date and fully protected computers using cloud protection and behavioral detections, to protect yourself against these types of threats in the future!

Disclaimer: While we do earn a commission from the sale of the above products, rest assured we only recommend them due to their effectiveness.

View Associated WinPC Defender Files

%UserProfile%\Application Data\pcdefender.exe %UserProfile%\Desktop\WinPC Defender.LNK %UserProfile%\Start Menu\WinPC Defender.LNK C:\Documents and Settings\All Users\Ta1HnnaIasEcfgF.exe c:\WINDOWS\ieocx.dll

File Location Notes:

%UserProfile% refers to the current user's profile folder. By default, this is C:\Documents and Settings\<Current User> for Windows 2000/XP, C:\Users\<Current User> for Windows Vista/7/8, and c:\winnt\profiles\<Current User> for Windows NT.

View Associated WinPC Defender Registry Information

HKEY_CURRENT_USER\Software\WinPC Defender HKEY_CLASSES_ROOT\CLSID\{39fc2065-c9c7-49cd-8942-44cc2dedc844} HKEY_CLASSES_ROOT\CLSID\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12} HKEY_CLASSES_ROOT\IEocxApp.IEocx HKEY_CLASSES_ROOT\IEocxApp.IEocx.1 HKEY_CLASSES_ROOT\Interface\{4B66E1DF-4DE3-4CDA-83B5-11673EADAB0B} HKEY_CLASSES_ROOT\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5} HKEY_CLASSES_ROOT\TypeLib\{A54DC52D-7AAD-4D40-A126-337211631EDC} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{39fc2065-c9c7-49cd-8942-44cc2dedc844} HKEY_CURRENT_USER\Control Panel\don't load "scui.cpl" HKEY_CURRENT_USER\Control Panel\don't load "wscui.cpl" HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "sysav" HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run "Content"

This is a self-help guide. Use at your own risk.

BleepingComputer.com can not be held responsible for problems that may occur by using this information. If you would like help with any of these fixes, you can ask for malware removal assistance in our Virus,Trojan,Spyware, and Malware Removal Logs forum.

If you have any questions about this self-help guide then please post those questions in our Am I infected? What do I do? and someone will help you.

Login

Remember Me
Sign in anonymously