Threat Database Rogue Websites Www1.savewayforurown-pc.in

Www1.savewayforurown-pc.in

Www1.savewayforurown-pc.in is a malicious domain disguised as a legitimate online system scanner. Trojans are used to poison users' browsers causing them to be redirected to Www1.savewayforurown-pc.in. Www1.savewayforurown-pc.in conducts a fake online system scan which automatically claims that the system is infected with several dangerous malware. Fake pop-up alerts may also be displayed in an attempt to trick the user into thinking that his/her system is in danger and the only solution is to purchase the "full" version of CleanUp Antivirus. Never purchase any software recommended by Www1.savewayforurown-pc.in and use a reliable security tool to scan your system and remove the rogue domain as well as any associated malware.

File System Details

Www1.savewayforurown-pc.in may create the following file(s):
# File Name Detections
1. %Documents and Settings%\All Users\Application Data\345d567\sqlite3.dll
2. %Documents and Settings%\[UserName]\Recent\FS.dll
3. %Documents and Settings%\[UserName]\Recent\tjd.sys
4. %Documents and Settings%\All Users\Application Data\345d567\mozcrt19.dll
5. %Documents and Settings%\[UserName]\Recent\DBOLE.sys
6. %Documents and Settings%\[UserName]\Recent\PE.exe
7. %Documents and Settings%\All Users\Application Data\345d567\CU345d.exe
8. %Documents and Settings%\[UserName]\Recent\DBOLE.dll
9. %Documents and Settings%\[UserName]\Recent\grid.exe
10. %Documents and Settings%\All Users\Application Data\345d567\CUA.ico
11. %Documents and Settings%\All Users\Application Data\345d567\CUASys\vd952342.bd
12. %Documents and Settings%\All Users\Application Data\CUCAISTUA\CUEWA.cfg
13. %Documents and Settings%\[UserName]\Application Data\CleanUp Antivirus\cookies.sqlite
14. %Documents and Settings%\[UserName]\Desktop\CleanUp Antivirus.lnk
15. %Documents and Settings%\[UserName]\Recent\eb.tmp
16. %Documents and Settings%\[UserName]\Recent\pal.tmp
17. %Documents and Settings%\[UserName]\Recent\tjd.tmp
18. %Documents and Settings%\All Users\Application Data\345d567\46.mof
19. %Documents and Settings%\All Users\Application Data\345d567\CUASys
20. %Documents and Settings%\All Users\Application Data\CUCAISTUA
21. %Documents and Settings%\[UserName]\Application Data\CleanUp Antivirus
22. %Documents and Settings%\[UserName]\Application Data\Microsoft\Internet Explorer\Quick Launch\CleanUp Antivirus.lnk
23. %Documents and Settings%\[UserName]\Recent\CLSV.tmp
24. %Documents and Settings%\[UserName]\Recent\pal.drv
25. %Documents and Settings%\[UserName]\Recent\tempdoc.tmp
26. %Documents and Settings%\All Users\Application Data\345d567
27. %Documents and Settings%\All Users\Application Data\345d567\BackUp
28. %Documents and Settings%\All Users\Application Data\345d567\Quarantine Items
29. %Program Files%\Mozilla Firefox\searchplugins\search.xml
30. %Documents and Settings%\[UserName]\Application Data\CleanUp Antivirus\Instructions.ini
31. %Documents and Settings%\[UserName]\Recent\cb.tmp
32. %Documents and Settings%\[UserName]\Recent\exec.tmp
33. %Documents and Settings%\[UserName]\Recent\tempdoc.drv
34. %Documents and Settings%\[UserName]\Start Menu\CleanUp Antivirus.lnk

Registry Details

Www1.savewayforurown-pc.in may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform "Library1.00195"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List "%Documents and Settings%\All Users\Application Data\345d567\CU345d.exe"
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download "RunInvalidSignatures" = "1"
HKEY_CLASSES_ROOT\Software\Microsoft\Internet Explorer\SearchScopes "URL" = "http://findgala.com/?&uid=195&q={searchTerms}"
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download "CheckExeSignatures" = "no"
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer "PRS" = "http://127.0.0.1:27777/?inj=%ORIGINAL%"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "CleanUp Antivirus"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List "%Documents and Settings%\All Users\Application Data\345d567\CU345d.exe"

Trending

Most Viewed

Loading...