PC Defender 360 Interface

PC Defender 360 is a rogue software program that displays fake security warnings about nonexistent threats that it has detected on computers that it has compromised. PC Defender 360 also makes registry changes so that it starts automatically with Windows. Those changes also include a modification that prevents you from starting applications. Any attempts at starting other applications will be an exercise in futility. Because instead of the intended application starting, PC Defender 360 will display a warning stating that the application executable that you just tried to open is infected with some type of virus or trojan.

PC Defender 360 can be acquired by visits to compromised and malicious websites and also by the installation of trojans claiming to be Flash players that are needed to watch online video content. It can also be acquired through spam email messages and may also be bundled with questionable free downloadable software programs.

A possible code that you can register the rogue program with is: ?O?Z?L?W?I?T?F?Q?C?N?Y?K?V?H?S?E

Entering the registration code may slow down the pop ups that the fake program displays. It may also help with the removal of the program as well.

The PC Defender 360 Rogue will display fake security warnings that include:


Vulnerabilities Found

Background scan for security breaches has been finished. Serious problems have been detected. Safeguard your system against exploits, malware and viruses right now by activating Proactive Defence.

PC Defender 360 Firewall Alert

iexplore.exe is infected with Trojan-Downloader.JS.Agent.ftu. Private data can be stolen by third parties, including credit card details and passwords.

Security Alert

Vulnerabilities Found

Background scan for security breaches has been finished. Serious problems have been detected. Safeguard your system against exploits, malware and viruses right now by activating Proactive Defence.

Upgrade to full version of PC Defender 360 software package now! Clean your system and ward off new attacks against your system integrity and sensitive data. FREE daily updates and online protection from web-based intrusions are already in the bundle.

Your PC is still infected with dangerous viruses. Activate antivirus protection to prevent data loss and avoid the theft of your credit card details.

PC Defender 360 Firewall has blocked a program from accessing the Internet. Internet Explorer Internet Browser is infected with worm SVCHOST.Stealth.Keyloger. This worm is trying to send your credit card details using Internet Explorer Internet Browser to connect to remote host.


How to remove the rogue PC Defender 360 program from your computer.

  1. First restart the infected computer into “Safe Mode with Networking”.

  1. Next, log into the affected user account or an account with administrative rights, if the affected account only has limited rights.
  2. Once the desktop appears, open a web browser and download a copy of the utilities listed below:
  1. Once the needed software has been downloaded, execute the copy of “rKill”. Allow it time to terminate any detected malicious processes that it finds running on your computer.
  2. After “rKill” completes, execute the copy of “Temp File Cleaner” to remove your temporary files.
  3. Next, after the “Temp File Cleaner” completes, decompress the copy of “Emsisoft Emergency Kit” by clicking on it’s executable.
  4. Once the kit has been decompressed, execute it by clicking on “Start.exe”.
  5. After the kit opens, click on “Emergency Kit Scanner”.

  1. Next, at the security status screen, click on “Update Now” to update the definition files of the kit.

  1. After the kit has been updated, perform a deep scan of the compromised computer.

  1. After the deep scan completes, remove the malicious files and configuration entries that it has found on your computer.
  2. Next, restart the computer normally.

At this point your computer should be free of the PC Defender 360 rogue. But if the infection still remains, utilize one of our alternate removal guides to resolve your situation such as our Ice Cyber Crime Center Ransomware removal guide.

Smith Technical Resources makes no guarantees or claims that the information contained in this article will help you completely remove the above listed malicious program(s) from your computer.  There are several variations of each particular virus in the wild . And the procedure listed above may not be adequate for the specific version of the virus that your computer has been compromised by.

If you feel uncomfortable performing any of the procedures that we've listed on this page, please contact a professional computer repair company in your area and have them complete the needed repairs on your computer. Smith Technical Resources takes no responsibility for any possible damage that could result from your use of the above instructions.

Windows XP Advanced Options Menu

©Smithtechres.com 2013 All Rights Reserved. Website Privacy Policy. Site Map

Emsisoft Emergency Kit Interface Emsisoft emergency kit screen Emisoft emergency kit scan pc options screen.
Share on Twitter Share on Stumble Upon Share on Digg Share on Delicious

Providing cost-effective local computer repair and network support in the middle Tennessee area

Phone (615)596-2592

Remote Access Portal

Remote Access Icon
Home About Us Onsite Services Online Services Self Help Pricing Blog Inquiries

You may also be interested in the following tutorials: