Home Rogue Websites Antiwareprotect.com

Antiwareprotect.com

Posted: April 30, 2009

Antiwareprotect.com is a browser hijacker promoting the rogue anti-spyware application Spyware Protect 2009. Due to trojan viruses infiltrating your system and modifying browser settings, you will find your web-surfing activities becoming diverted to the Antiwareprotect.com domain. Here you will be subject to aggressive adware praising Spyware Protect 2009 and its promised malware removal capabilities. Fabricated testimonials are also available, just in case you needed extra persuasion in purchasing this fake spyware remover.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 %WINDOWS%\aazalirt.exe
    2 %WINDOWS%\dkekkrkska.exe
    3 %WINDOWS%\dkewiizkjdks.exe
    4 %WINDOWS%\iddqdops.exe
    5 %WINDOWS%\ienotas.exe
    6 %WINDOWS%\iqmcnoeqz.exe
    7 %WINDOWS%\irprokwks.exe
    8 %WINDOWS%\jikglond.exe
    9 %WINDOWS%\jiklagka.exe
    10 %WINDOWS%\jrjakdsd.exe
    11 %WINDOWS%\jungertab.exe
    12 %WINDOWS%\kitiiwhaas.exe
    13 %WINDOWS%\kkwknrbsggeg.exe
    14 %WINDOWS%\klopnidret.exe
    15 %WINDOWS%\krkdkdkee.exe
    16 %WINDOWS%\krkmahejdk.exe
    17 %WINDOWS%\krtawefg.exe
    18 %WINDOWS%\krujmmwlrra.exe
    19 %WINDOWS%\ktknamwerr.exe
    20 %WINDOWS%\kuruhccdsdd.exe
    21 %WINDOWS%\ooorjaas.exe
    22 %WINDOWS%\oranerkka.exe
    23 %WINDOWS%\oropbbsee.exe
    24 %WINDOWS%\otnnbektre.exe
    25 %WINDOWS%\otowjdseww.exe
    26 %WINDOWS%\otpeppggq.exe
    27 %WINDOWS%\rkaskssd.exe
    28 %WINDOWS%\ronitfst.exe
    29 %WINDOWS%\seeukluba.exe
    30 %WINDOWS%\skaaanret.exe
    31 %WINDOWS%\sysguardn.exe
    32 %WINDOWS%\tobmygers.exe
    33 %WINDOWS%\tobykke.exe
    34 %WINDOWS%\zibaglertz.exe
    35 Spyware Protect 2009.lnk
    36 Uninstall Spyware Protect 2009.lnk

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\AvScanHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "sysguardn"
Loading...