Security Defender Removal Guide

Threat Level:
Rate this Article:
Comments (0)
Article Views: 10377
Category: Fake Antispyware

It has become increasingly more and more difficult even for experienced users to distinguish between gamine and rubbish security tools like Security Defender. This is because of the level of sophistication the developers behind Security Defender and similar rogues invest in their rubbish applications. Security Defender enters the system surreptitiously and will not relent until the user either decides to pay for its worthless software or remove Security Defender from the system completely. Despite what Security Defender would like its prospective victims to believe, it certainly does not have the ability to detect or remove any type of threat from the system.

Browser hijacking websites and bundled third party website downloads constitute some of the more popular forms of distribution for Security Defender. Other tactics include making use fake online malware scanners and infected online flash ads.

Once Security Defender manages to root itself into the system the rogue will start its attack by generating a fake system scan. This fake system scan was designed to inform the user that his system is being attacked, and that he should pay for Security Defender in order to protect his system. Following this fake scan, Security Defender will spam the user with various falsely generated security messages in the form of annoying pop up messages:

Security Defender Firewall Alert
Suspicious activity in your registry system space was detected. Rogue malware detected in your system. Data leaks and system damage are possible. Please use a deep scan option.

Harmful software detected
Security Defender has detected malicious software that may cause crash of your computer. Click Remove All button to remove them now.

Security Defender
Viruses have been found in your system. We highly recommend you to get license for Security Defender to remove immediately harmful software.

Of course none of these fake alerts can be trusted, and users should never believe anything received from Security Defender. Symptoms reported along with the Security Defender infection range from increased erratic system behavior, poor system performance and blocked Internet connections.

Security Defender will be responsible for a lot of damage to your PC. Limit this damage and destroy Security Defender permanently with the help of a genuine and powerful security tool. This investment will also offer adequate protection against similar attacks in future.

Download Remover for Security Defender *
*SpyHunter scanner, published on this site, is intended to be used only as a detection tool. To use the removal functionality, you will need to purchase the full version of SpyHunter.

Security Defender Screenshots:

Security Defender
Security Defender
Security Defender

Security Defender technical info for manual removal:

Files Modified/Created on the system:

# File Name File Size (Bytes) File Hash
1Security Defender.lnk
203e5c2ca-9a05-418d-b277-d7db924dcb95_46.avi43741 bytesMD5: 50451521c2528c39278d3a85250c1200
7%ProgramFiles%\Security Defender\Security Defender.dll
8%AppData%\Microsoft\Internet Explorer\Quick Launch\Security Defender.lnk
9%ProgramFiles%\Security Defender
10b0636e59-ba8e-4fb4-afd1-e3ff51fdd12c_34.avi1858560 bytesMD5: 6f614e7a50f4ac5523358ad5576611a1
112283880F-EF87-4aac-8EBD-C9BCC8494AF5_47.avi80610 bytesMD5: 370aa0648b6deff8a7a499843d6f0307
12Security Defender.dll1090048 bytesMD5: 1c75d2463adfdd2d1a462a096dec92fe
14b31a8294-09b7-4487-974a-deb2578a502e_34.avi1784832 bytesMD5: 558cdbe9ac8039dfbc29ec2181b99e2d
1613cbb1a7-243b-4c2d-a4f0-957e7ace64dd_34.avi1830400 bytesMD5: 601ddf36f1f78f6835c5179101d0b778
17%UserProfile%\Local Settings\Application Data\App
18%ALLUSERSPROFILE%\Start Menu\Programs\Startup
19%ALLUSERSPROFILE%\Application Data[random].mkv
20%ALLUSERSPROFILE%\Application Data[random].avi
21d09cfb1c-9bb8-4ad1-a467-d105a674c81a_.mkv868 bytesMD5: 92c4bc9e861f77ac4d5975a6dbb332aa
22%UserProfile%\Start Menu\Programs\Startup

Registry Modifications:

The following Registry Keys were created:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{56a10a26-dc02-40f1-a4da-8fa92d06b357}
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "56a10a26-dc02-40f3-a4da-8fa92d06b357_33"
  • HKEY_CLASSES_ROOT\CLSID\{56a10a26-dc02-40f1-a4da-8fa92d06b357}
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "56a10a26-dc02-40f3-a4da-8fa92d06b357_33"


Your email address will not be published.


Enter the numbers in the box to the right *