Home Rogue Websites Security-pc-care.com

Security-pc-care.com

Posted: March 23, 2010

Security-pc-care.com is a rogue website which promotes the rogue antivirus programs Windows Defender 2010 and XP AntiMalware 2010. The hackers behind this cyber scam have designed security-pc-care.com to produce a fake system scan which reports false results. Security-pc-care.com will claim the sytem is infected with malware and that purchasing one of its rogue programs will provide a solution. Do not fall for this blatant lie and have security-pc-care.com and all related threats removed from the compromised computer immediately.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 %UserProfile%\Local Settings\Application Data\ave.exe
    2 Ave.exe

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\Classes\.exeHKEY_CURRENT_USER\Software\Classes\.exe | @ = "secfile"HKEY_CURRENT_USER\Software\Classes\.exe | Content Type = "application/x-msdownload"HKEY_CURRENT_USER\Software\Classes\.exe\DefaultIconHKEY_CURRENT_USER\Software\Classes\.exe\shellHKEY_CURRENT_USER\Software\Classes\.exe\shell\openHKEY_CURRENT_USER\Software\Classes\.exe\shell\open\commandHKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command | @ = "%AppData%\ave.exe" /START "%1" %*HKEY_CURRENT_USER\Software\Classes\.exe\shell\open\command | IsolatedCommand = "%1" %*HKEY_CURRENT_USER\Software\Classes\.exe\shell\runasHKEY_CURRENT_USER\Software\Classes\.exe\shell\runas\commandHKEY_CURRENT_USER\Software\Classes\.exe\shell\startHKEY_CURRENT_USER\Software\Classes\.exe\shell\start\commandHKEY_CURRENT_USER\Software\Classes\secfileHKEY_CURRENT_USER\Software\Classes\secfile\DefaultIconHKEY_CURRENT_USER\Software\Classes\secfile\shellHKEY_CURRENT_USER\Software\Classes\secfile\shell\openHKEY_CURRENT_USER\Software\Classes\secfile\shell\open\commandHKEY_CURRENT_USER\Software\Classes\secfile\shell\open\command | @ = "%AppData%\ave.exe" /START "%1" %*HKEY_CURRENT_USER\Software\Classes\secfile\shell\open\command | IsolatedCommand = "%1" %*HKEY_CURRENT_USER\Software\Classes\secfile\shell\runasHKEY_CURRENT_USER\Software\Classes\secfile\shell\runas\commandHKEY_CURRENT_USER\Software\Classes\secfile\shell\startHKEY_CURRENT_USER\Software\Classes\secfile\shell\start\command
Loading...