Remove “Your Windows Is Infected With (2) Viruses” Winsecurity Scam

Remove “Your Windows Is Infected With (2) Viruses” Winsecurity Scam

This article aims to show you how to remove the online scamming message “Your Windows Is Infected With (2) Viruses”, coming from completely from your computer.

New online scamming virus-like notifications have beug appearing in the Wild, very similar to the “Your system is heavily damaged by (4) virus!” scam. The messages have begun appearing as a resul of a web redired to a URL which displays a pop-up with them. The objective of those messages is to get victims to install a suspicious phone application which will install a software on the victim’s computer, known as PCSmartCleanup. The software has been reported to be suspicious and demand money to fix non-existent issues on your computer. This is the main reason why we strongly advise you to remove completely this scamming messages from your browser and PC by reading the following article.

Threat Summary
TypeScam / Browser Redirect
Short DescriptionA browser redirect to a usually random URL which displays a tab locking message, asking victims to download a rogue antivirus program.
SymptomsA new tab on your browser may display a message saying “Your Windows Is Infected With (2) Viruses”.
Distribution MethodVia Adware or advertising malware installed on your computer or by being redirected from a suspicious site.
Detection Tool See If Your System Has Been Affected by


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss

How Does Winsecurity Virus Spread

In order to be widespread, the scam may take advantage of an ad-supported software, known as potentially unwanted programs on your computer. This software may cause multiple web browser redirects, among which may be the following scam. Such programs are often known as adware or browser hijackers and they may be installed via other adware on your PC or via software bundling. Bundling is an aggressive marketing trick to slither software such as the one causing the “Your Windows Is Infected With (2) Viruses” pop-ups to appear. This means that if you have downloaded a free program installer of your favorite media player or any other freeware, you may have also installed the Winsecurity scamming message program on your PC as well.

Other methods by which you can land on the Winsecurity web page is if you have visited suspicious website that has a script which causes the redirects or pop-ups of this scam to appear directly on your computer. Some suspicious websites have smart methods that bypass any ad-blockers or similar programs of such type.

Winsecurity Scam “Virus” – Activity and Purpose

The end goal of the Winsecurity scamming program is to show a fake message with instructions within it on how to download a fake antivirus program, also known as rogue antivirus. Such software performs a fake scan of your computer, shortly after which aims to convince you to pay money in order to perform the removal of those viruses. This scamming practice often results in victims paying the cyber-criminals online and even risking their financial details by exposing their credit card number, security code and other credentials.

The most often seen message of the Winsecurity scam appears in the following way:

It pretends to give victims a deadline which is couple of minutes and dispays a fake countdown timer in order to get victims to panic. However, when the timer runs out, nothing happens, it is only a scareware tactic. The message which tricks inexperienced victims into clicking the “REMOVE” button and downloading the fake removal software is the following:

Your Windows Windows 10 is infected with (2) Viruses!
25 September 2017
Your Windows Windows 10 is infected with (2) Viruses. The pre-scan found traces of (2) malware and (1)
phishing/spyware. System damage: 28.1% – Immediate removal required!
The removal of (2) Viruses is required immediately to prevent further system damage. loss of Apps. Photos
or other files.
Traces of (1) PhishingISpyware were found on your computer. Personal and banking information are at
2 minutes and 0 seconds

In addition to displaying this message, the web links which may be presented to you in correlation to this message may be malicious as well. Most of them usually have tracking technologies embedded directly within them, such as:

  • Cookies.
  • Tags.
  • Flash cookies (LSOs).
  • Pixels.
  • Geo-locators.

These technologies are not malicious by essence, but they may be authorized to collect different information from your computer and store it. Such info may be:

  • Your location and language.
  • Browsing history.
  • Online clicks.
  • Online search history.

In addition to this, the website itself may use those technolgoies when you purchase the fake antivirus software as well. This is likely done with the purpose to collect your personal and financial information.
Similar to many tech support scams, the “Your Windows Is Infected With (2) Viruses” scam may also display a fake telephone number which aims to get you to call a fake tech support agent. Beside the risk of the call subscribing your number to services that may ramp up your telephone bill, the person on the other side may want you information as well. This is why, it is strongly recommended not to call any number provided there and to immediately remove the “Your Windows Is Infected With (2) Viruses” scam with an anti-malware software which is specifically used to tackle low-level threats like this one as well as high end ones.

How to Remove “Your Windows Is Infected With (2) Viruses” Scam

Since this scam can appear both on your computer as well as mobile device, we have divided the removal instructions into removal for computers and mobile devices as well.

If you have started seeing pop-ups, just like or similar to the “Your Windows Is Infected With (2) Viruses” scam, you should immediately shut down your web browser and follow the instructions below to remove it and protect your PC in the future as well. Since manual removal may be a tricky process, experts strongly advise to use an advanced anti-malware software to get rid of the “Your Windows Is Infected With (2) Viruses” scam with an automatic scan of your computer by using an anti-malware software.

PC Removal Instructions:

Manually delete from Windows and your browser

Note! Substantial notification about the threat: Manual removal of requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1.Remove or Uninstall in Windows

Remove or Uninstall in Windows.

Step 1: Remove/Uninstall in Windows

Here is a method in few easy steps to remove that program. No matter if you are using Windows 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program get left behind, and that can lead to unstable work of your PC, mistakes with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it. To do that:

  • Hold the Windows Logo Button and “R” on your keyboard. A Pop-up window will appear (fig.1).
  • uninstall-virus-fig1

  • In the field type in “appwiz.cpl” and press ENTER (fig.2).
  • uninstall-virus-fig2

  • This will open a window with all the programs installed on the PC.
    Select the program that you want to remove, and press “Uninstall” (fig.3).
  • uninstall-virus-fig3

    Follow the instructions above and you will successfully uninstall

    2.Remove from Your Browser

    Remove from Your Browser.

    Remove a toolbar from Mozilla FirefoxRemove a toolbar from Google Chrome Remove a toolbar from Internet Explorer Remove a toolbar from Safari
    Start Mozilla Firefox Open the menu window


    Select the “Add-ons” icon from the menu


    Select and click “Remove


    After is removed, restart Mozilla Firefox by closing it from the red “X” in the top right corner and start it again.

    Start Google Chrome and Open the drop menu


  • Move the cursor over “Tools” and then from the extended menu choose “Extensions
  • uninstall-fig8

  • From the opened “Extensions” menu locate and click on the garbage bin icon on the right of it.
  • uninstall-fig9

  • After is removed, restart Google Chrome by closing it from the red “X” in the top right corner and start it again.
  • Start Internet Explorer:

  • Click “‘Tools’ to open the drop menu and select ‘Manage Add-ons’
  • uninstall-fig10

  • In the ‘Manage Add-ons’ window, make sure that in the first window ‘Add-on Types’, the drop menu ‘Show’ is on ‘All add-ons’
  • uninstall-fig11

    Select to remove, and then click ‘Disable’. A pop-up window will appear to inform you that you are about to disable the selected toolbar, and some additional toolbars might be disabled as well. Leave all the boxes checked, and click ‘Disable’.


    After has been removed, restart Internet Explorer by closing it from the red ‘X’ in the top right corner and start it again.

    Start Safari

    Open the drop menu by clicking on the sprocket icon in the top right corner.

    From the drop menu select ‘Preferences’
    In the new window select ‘Extensions’
    Click once on
    Click ‘Uninstall’


    A pop-up window will appear asking for confirmation to uninstall Select ‘Uninstall’ again, and the will be removed.

    3.Fix registry entries created by on your PC

    Fix registry entries created by on your PC.

    Some malicious scripts may modify the registry entries of your computer to change different settings. This is why manual clean up of your Windows Registry Database is strongly recommended. Since the tutorial on how to do this is a bit lenghty, we recommend following our instructive article about fixing registry entries.

    Automatically remove by downloading an advanced anti-malware program

    1. Remove with SpyHunter Anti-Malware Tool

    Remove with SpyHunter Anti-Malware Tool

    1. Install SpyHunter to scan for and remove Scan with SpyHunter to Detect and Remove
    Step 1: Click here to go to SpyHunter’s download instruction page.
    Step 2: Guide yourself by the download instructions provided for each browser.
    Step 3: After you have installed SpyHunter, wait for it to automatically update.


    Step1: After the update process has finished, click on the ‘Scan Computer Now’ button.
    Step2: After SpyHunter has finished scanning your PC for any files, click on the ‘Fix Threats’ button to remove them automatically and permanently.
    Step3: Once the intrusions on your PC have been removed, it is highly recommended to restart it.

    2. Back up your data to secure it against attacks related to in the future

    Back up your data to secure it against attacks in the future

    IMPORTANT! Before reading the Windows backup instructions, we highly recommend to back up your data automatically with cloud backup and insure it against any type of data loss on your device, even the most severe. We recommend reading more about and downloading SOS Online Backup .

    1. For Windows 7 and earlier 1. For Windows 8, 8.1 and 10 1. Enabling the Windows Defense Feature (Previous Versions)

    1-Click on Windows Start Menu
    2-Type Backup And Restore
    3-Open it and click on Set Up Backup
    4-A window will appear asking you where to set up backup. You should have a flash drive or an external hard drive. Mark it by clicking on it with your mouse then click on Next.
    5-On the next window, the system will ask you what do you want to backup. Choose the ‘Let Me Choose’ option and then click on Next.
    6-Click on ‘Save settings and run backup’ on the next window in order to protect your files from possible attacks by

    1-Press Windows button + R
    2-In the window type ‘filehistory’ and press Enter
    3-A File History window will appear. Click on ‘Configure file history settings’
    4-The configuration menu for File History will appear. Click on ‘Turn On’. After its on, click on Select Drive in order to select the backup drive. It is recommended to choose an external HDD, SSD or a USB stick whose memory capacity is corresponding to the size of the files you want to backup.
    5-Select the drive then click on ‘Ok’ in order to set up file backup and protect yourself from

    1- Press Windows button + R keys.
    2- A run windows should appear. In it type ‘sysdm.cpl’ and then click on Run.
    3- A System Properties windows should appear. In it choose System Protection.
    5- Click on Turn on system protection and select the size on the hard disk you want to utilize for system protection.
    6- Click on Ok and you should see an indication in Protection settings that the protection from is on.
    Restoring a file via Windows Defense feature:
    1-Right-click on the encrypted file, then choose Properties.
    2-Click on the Previous Versions tab and then mark the last version of the file.
    3-Click on Apply and Ok and the file encrypted by should be restored.

    Optional: Using Alternative Anti-Malware Tools

    Remove Using Other Alternative Tools

    STOPZilla Anti Malware
    1. Download and Install STOPZilla Anti-malware to Scan for And Remove
    Step 1: Download STOPZilla by clicking here.
    Step 2: A pop-up window will appear. Click on the ‘Save File’ button. If it does not, click on the Download button and save it afterwards.
    Step 3: After you have downloaded the setup, simply open it.
    Step 4: The installer should appear. Click on the ‘Next’ button.
    Step 5: Check the ‘I accept the agreement’ check circle if not checked if you accept it and click the ‘Next’ button once again.
    Step 6: Review and click on the ‘Install’ button.
    Step 7: After the installation process has completed click on the ‘Finish’ button.

    2. Scan your PC with STOPZilla Anti Malware to remove all associated files completely.
    Step 1: Launch STOPZilla if you haven’t launched it after install.
    Step 2: Wait for the software to automatically scan and then click on the ‘Repair Now’ button. If it does not scan automatically, click on the ‘Scan Now’ button.
    Step 3: After the removal of all threats and associated objects, you should Restart your PC.

    Smartphone and Tablet Removal Instructions:

    1. Back up the data on your device

    Back up the data on your phone

    CAUTION! Before attempting any removals and drive formatting on your device, you should know that it is essential to save all your important contacts and files from your phone. There are several methods to backup your files:

    Method I: Using online backup software or a memory card if the device supports it.

    Method II: Connecting to another device and copying the data directly.

    This is a bit risky option since the device may have malware on it. This is why, first you need to enter the device’s Safe Mode:

    For RAZR Droid Devices:

    1.Switch off the smartphone and remove the battery for a few seconds then plug it back in.

    2.Switch the phone on.

    3.You should see a Motorola Dual Core screen appearing. You should press and hold the Volume up, and Volume Down keys on the side of the smartphone. Hold them until the lock screen shows up with ‘Safe Mode’ written in the lower corner.

    For HTC Devices:

    1.Switch off the smartphone and remove the battery for a few seconds then plug it back in.

    2.Turn on your phone while simultaneously holding down the Menu Button. When it starts, keep pressing the Menu Button until you see ‘Safe Mode’ menu appearing in the lower corner.

    For Nexus devices:

    1.Switch off the smartphone and remove the battery for a few seconds then plug it back in.
    2.Turn on the phone.
    3.When the welcome Logo Screen shows up, hold the trackball while pressing it until a lock screen shows up, or you see ‘Safe Mode’ written in the bottom corner.

    For Other Motorola Devices:

    1.Switch off the smartphone and remove the battery for a few seconds then plug it back in.
    2.Hold down the Menu Button after you press it while turning on the phone. When it boots, hold the button down upon seeing the lock screen or feeling the phone vibrate.

    For Moto G Devices:
    1.Press the Power Button and hold it on until the list with options pop-up.
    2.Hold the Power off button and wait for a ‘Reboot to Safe Mode’ option to appear.
    3.Tap it and let the phone reset.

    For Samsung Galaxy Devices:

    1.While the device is on, hold down the Power Button and wait for the Options List.
    2.Wait for a ‘Restart to Safe Mode’ option to appear.
    3.Choose this setting. The device will restart.

    For Apple Devices:

    1. While your device is locked, hold down the Power Button and the Home Button until you see a white Apple logo.
    2. Once you see the logo, let go from those buttons and start holding the Volume Up button. (Give it a little time to boot up)
    3. Now the phone should boot in Safe Mode without any third-parties running.

    And now it is time to proceed by doing the actual backup:

    Apple iOS

    1. Connect your device and select it in iTunes.
    2. From the Backups section go to Manually Back Up and Restore and tap on Back Up Now.


    1. Connect your device via USB to a computer and select Use as a Media Device. You may also see use as file transfer option.
    2. Go to your phone from My Computer and copy all the files you need.
    3. If the phone has an option to install its drivers onto your computer, select it and install them since this will simplify the process of copying your contact list on your computer.

    2. Hard-reset your device and remove

    Hard-Reset Your Smartphone

    For Apple iPhone and iPad Devices:

    Option I: Via the device

    1.Back up your data using iCloud or another backup method.
    2. Go to the Settings menu and go to General.
    3. On the bottom, tap on Reset.
    4. Tap on Erase All Content and Settings.
    5. Confirm it by tapping on the red Erase button and then type your password.

    Option II: Via iTunes

    1. Connect your device and open iTunes.
    2. Click on the device‘s name and model to open the dialog box.
    3. From there, click on the button “Restore”

    For Android Devices:

    After you have backed up your files, you should perform a clean wipe-out of your phone. This can happen either via one of the options in Safe Mode or by entering your device’s Recovery Mode. Several methods exist in order to enter Recovery Mode of your device:


    For Nexus Devices: – Hold the Volume Down + Volume Up + Power button until a Recovery menu appears. After that, you should select the Wipe Data/Factory reset option. Nexus 4 may work with Volume Up + Power + Volume Down.

    For Samsung Devices: – Hold the Volume Up + Power Button + Home Button until a Recovery menu appears. After that, you should select the Wipe Data/Factory reset option.

    For Motorola Droid X Devices: Hold the Home Button + Power Button until a Recovery menu appears. After that, you should select the Wipe Data/Factory reset setting.

    For other devices with camera buttons on them: Hold the Volume Up + Camera Button until a Recovery Menu appears. After this, you should choose the Wipe Data/Factory reset option.

    Also in case you have backed up your device in a Google Account, you will be able to restore your data after a complete wipe-out by just logging into your Google Account with you email and password.


    Ventsislav Krastev

    Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

    More Posts - Website

    Follow Me:

    Leave a Comment

    Your email address will not be published. Required fields are marked *

    Time limit is exhausted. Please reload CAPTCHA.

    Share on Facebook Share
    Share on Twitter Tweet
    Share on Google Plus Share
    Share on Linkedin Share
    Share on Digg Share
    Share on Reddit Share
    Share on Stumbleupon Share