Jump to content

Recommended Posts

  • Staff

What is AntiVirus Studio 2010?

The Malwarebytes research team has determined that AntiVirus Studio 2010 is a fake anti-malware application. These so-called "rogues" use intentional false positives to convince users that their systems have been compromised. Then they try to sell you their software, claiming it will remove these threats. In extreme cases the false threats are actually the very trojans that advertise or even directly install the rogue. You are strongly advised to follow our removal instructions below.

How do I know if I am infected with AntiVirus Studio 2010?

This is how the main screen of the rogue application looks:

main.png

You will find these icons on your desktop and in your taskbar:

icons.png

And see these warnings:

warning1.png

warning3.png

warning6.png

warning7.png

How did AntiVirus Studio 2010 get on my computer?

Rogue programs use different methods for spreading themselves. This particular one was installed by a trojan.

How do I remove AntiVirus Studio 2010?

Our program Malwarebytes' Anti-Malware can detect and remove this rogue application.

  • Please download Malwarebytes' Anti-Malware to your desktop.
  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a check-mark is placed next to the following:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware

    [*]Then click Finish.

    [*]If an update is found, it will download and install the latest version.

    [*]Once the program has loaded, select Perform quick scan, then click Scan.

    [*]When the scan is complete, click OK, then Show Results to view the results.

    [*]Be sure that everything is checked, and click Remove Selected. Reboot your computer if prompted.

    [*]When completed, a log will open in Notepad. The rogue application should now be gone.

Is there anything else I need to do to get rid of AntiVirus Studio 2010?

  • No, Malwarebytes' Anti-Malware removes AntiVirus Studio 2010 completely.

Note: in some cases this malware blocked the execution of legitimate programs. If you run into such an event and ignoring the warnings does not help, rename the desired executable to firefox.exe

How would the full version of Malwarebytes' Anti-Malware help protect me?

We hope our application has helped you eradicate this malicious software. If your current security solution let this infection through, you might please consider purchasing the FULL version of Malwarebytes' Anti-Malware for additional protection.

As you can see below the full version of Malwarebytes' Anti-Malware would have protected you against the AntiVirus Studio 2010 rogue. It would have warned you before the rogue could install itself, giving you a chance to stop it before it became too late.

protection1.png

protection.png

Technical details for experts

Signs in a HijackThis log:

C:\Documents and Settings\{username}\Desktop\load.exe
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\AntiVirus Studio 2010.exe
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securitycenter.exe

O4 - HKCU\..\Run: [45cwseuwf8sk] C:\Documents and Settings\{username}\Desktop\load.exe
O4 - HKCU\..\Run: [AntiVirus Studio 2010] "C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\AntiVirus Studio 2010.exe" /STARTUP
O4 - HKCU\..\Run: [SecurityCenter] C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securitycenter.exe

Note: the startup name for the installer load.exe is random

Alterations made by the installer:

  File System
===============

Adds the folder C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010
Adds the file taskmgr.dll"="08:43 01/10/10 115200 bytes
Adds the file securityhelper.exe"="14:58 02/10/10 2819584 bytes
Adds the file securitycenter.exe"="08:43 01/10/10 312832 bytes
Adds the file AntiVirus Studio 2010.exe"="08:43 01/10/10 1651712 bytes
In the existing folder C:\Documents and Settings\{username}\Application Data\Microsoft\Internet Explorer\Quick Launch
Adds the file AntiVirus Studio 2010.lnk"="13:20 07/10/10 1942 bytes
In the existing folder C:\Documents and Settings\{username}\Local Settings\Temp
Adds the file _6.tmp"="13:20 07/10/10 0 bytes
Adds the file ~DFA583.tmp"="13:22 07/10/10 114688 bytes
Adds the file 02c9c3c35bdx5.exe"="13:20 07/10/10 49152 bytes
Adds the file 17dkf.exe"="13:20 07/10/10 102400 bytes
Adds the file 1iowieoo.exe"="13:21 07/10/10 41984 bytes
Adds the file 2010yo.exe"="13:21 07/10/10 86016 bytes
Adds the file 472a10e2ebxd9.exe"="13:20 07/10/10 47104 bytes
Adds the file 56493.exe"="13:20 07/10/10 61440 bytes
Adds the file 8gmsed-bd.exe"="13:20 07/10/10 58368 bytes
Adds the file ae0965a7157cd.exe"="13:20 07/10/10 48128 bytes
Adds the file al3erfa3.exe"="13:20 07/10/10 25600 bytes
Adds the file aler3fa.exe"="13:20 07/10/10 26624 bytes
Adds the file alerfa.exe"="13:20 07/10/10 23552 bytes
Adds the file alerfa2.exe"="13:21 07/10/10 24576 bytes
Adds the file alerfa322.exe"="13:20 07/10/10 27648 bytes
Adds the file aqfitrlxi2.exe"="13:20 07/10/10 45056 bytes
Adds the file backd-efq.exe"="13:20 07/10/10 7168 bytes
Adds the file brdss.exe"="13:20 07/10/10 72704 bytes
Adds the file bzqa43d.exe"="13:20 07/10/10 57344 bytes
Adds the file cocksucker.exe"="13:20 07/10/10 82944 bytes
Adds the file cosock.exe"="13:20 07/10/10 75776 bytes
Adds the file cunifuc.exe"="13:20 07/10/10 39936 bytes
Adds the file dc_3.exe"="13:20 07/10/10 65536 bytes
Adds the file dd10x10.exe"="13:20 07/10/10 35840 bytes
Adds the file ddhelp.exe"="13:20 07/10/10 74752 bytes
Adds the file ddoll3342.exe"="13:20 07/10/10 43008 bytes
Adds the file destroyer.exe"="13:20 07/10/10 97280 bytes
Adds the file dkfjd93.exe"="13:20 07/10/10 83968 bytes
Adds the file ds7hw.exe"="13:20 07/10/10 28672 bytes
Adds the file eelnvd13.exe"="13:20 07/10/10 52224 bytes
Adds the file eephilpe.exe"="13:20 07/10/10 19456 bytes
Adds the file exppdf_w.exe"="13:20 07/10/10 8192 bytes
Adds the file fe.exe"="13:20 07/10/10 92160 bytes
Adds the file format.exe"="13:20 07/10/10 99328 bytes
Adds the file gedx_ae09.exe"="13:20 07/10/10 12288 bytes
Adds the file gpupz2a.exe"="13:20 07/10/10 16384 bytes
Adds the file hardwh.exe"="13:20 07/10/10 71680 bytes
Adds the file hhbboll_2.exe"="13:20 07/10/10 34816 bytes
Adds the file hiphop.exe"="13:20 07/10/10 87040 bytes
Adds the file hjkgfddd.exe"="13:21 07/10/10 78848 bytes
Adds the file hodeme.exe"="13:20 07/10/10 94208 bytes
Adds the file htfad4.exe"="13:20 07/10/10 31744 bytes
Adds the file hvipws9.exe"="13:20 07/10/10 54272 bytes
Adds the file jdhellwo3.exe"="13:20 07/10/10 53248 bytes
Adds the file jkfuckfu.exe"="13:22 07/10/10 46080 bytes
Adds the file jofcdks.exe"="13:20 07/10/10 36864 bytes
Adds the file kgn.exe"="13:20 07/10/10 33792 bytes
Adds the file kilslmd.exex"="13:20 07/10/10 38912 bytes
Adds the file kjdh_gf_jjdhgd.exe"="13:20 07/10/10 50176 bytes
Adds the file kjh102k3.exe"="13:20 07/10/10 79872 bytes
Adds the file kn.a.exe"="13:20 07/10/10 4096 bytes
Adds the file kock.exe"="13:20 07/10/10 81920 bytes
Adds the file ljts-23.exe"="13:21 07/10/10 64512 bytes
Adds the file lols.exe"="13:20 07/10/10 95232 bytes
Adds the file lorsk.exe"="13:20 07/10/10 76800 bytes
Adds the file ploper.exe"="13:20 07/10/10 80896 bytes
Adds the file poertd.exe"="13:20 07/10/10 91136 bytes
Adds the file ppddfcfux.exxe"="13:20 07/10/10 44032 bytes
Adds the file pswwg3c.exe"="13:20 07/10/10 32768 bytes
Adds the file qwedvor.exe"="13:20 07/10/10 101376 bytes
Adds the file qwklrvjhqlkj.exe"="13:20 07/10/10 22528 bytes
Adds the file r0life.exe"="13:20 07/10/10 40960 bytes
Adds the file rator.exe"="13:20 07/10/10 69632 bytes
Adds the file rtfme.exe"="13:20 07/10/10 103424 bytes
Adds the file safe.exe"="13:20 07/10/10 89088 bytes
Adds the file snowif.exe"="13:20 07/10/10 68608 bytes
Adds the file sycre.exe"="13:20 07/10/10 67584 bytes
Adds the file test.exe"="13:20 07/10/10 98304 bytes
Adds the file timem.exe"="13:20 07/10/10 88064 bytes
Adds the file warsddd_w.exe"="13:20 07/10/10 14336 bytes
Adds the file wefgetn_00.exe"="13:21 07/10/10 13312 bytes
Adds the file wergfq.exe"="13:20 07/10/10 77824 bytes
Adds the file winlogoff.exe"="13:20 07/10/10 100352 bytes
Adds the file wqefqw7e.exe"="13:20 07/10/10 15360 bytes
Adds the file wrcud12.exe"="13:20 07/10/10 11264 bytes
Adds the file wrfwe_di.exe"="13:20 07/10/10 60416 bytes
In the existing folder C:\Documents and Settings\{username}\Start Menu\Programs
Adds the file AntiVirus Studio 2010.lnk"="13:20 07/10/10 1970 bytes
Adds the folder C:\Documents and Settings\{username}\Start Menu\Programs\AntiVirus Studio 2010
Adds the file How to Activate AntiVirus Studio 2010.lnk"="13:20 07/10/10 1208 bytes
Adds the file Help AntiVirus Studio 2010.lnk"="13:20 07/10/10 1182 bytes
Adds the file AntiVirus Studio 2010.lnk"="13:20 07/10/10 1976 bytes
Adds the file Activate AntiVirus Studio 2010.lnk"="13:20 07/10/10 1996 bytes

Registry
===============
[HKEY_CURRENT_USER\Software\AntiVirus Studio 2010]
"LastUpdateDate"="'2010/9/16'"
"LastTimeStamp"="186"
"BackgroundScanTimeout"="1"
"BackgroundScan"="1"
"MinimizeOnStart"="0"
"AutomaticallyUpdates"="1"
"ScanSystemOnStartup"="1"
"SoftID"="'AntiVirus Studio 2010'"
"InstallDir"="'C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010'"
"ADVid"="'93'"
"(Default)"="'C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010'"
"BuyUrl"="'9213E182D88955043FDF326FE4079BCA82EDD6B8E25ABB2925100F325033DEE2FA8667'"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\AntiVirus Studio 2010]
"DisplayIcon"="'"C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securityhelper.exe",1'"
"UninstallString"="'"C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securityhelper.exe" /UNINSTALL'"
"DisplayName"="'AntiVirus Studio 2010'"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
"45cwseuwf8sk"="'C:\Documents and Settings\{username}\Desktop\load.exe'"
"AntiVirus Studio 2010"="'"C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\AntiVirus Studio 2010.exe" /STARTUP'"
"SecurityCenter"="'C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securitycenter.exe'"

Malwarebytes' Anti-Malware log:

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4766

Windows 5.1.2600 Service Pack 3
Internet Explorer 6.0.2900.5512

10/7/2010 1:32:15 PM
mbam-log-2010-10-07 (13-32-15).txt

Scan type: Quick scan
Objects scanned: 123137
Time elapsed: 5 minute(s), 13 second(s)

Memory Processes Infected: 3
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 3
Folders Infected: 2
Files Infected: 62

Memory Processes Infected:
C:\Documents and Settings\{username}\Desktop\load.exe (Trojan.Agent) -> Unloaded process successfully.
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\AntiVirus Studio 2010.exe (Rogue.AntivirusStudio) -> Unloaded process successfully.
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securitycenter.exe (Rogue.AntivirusStudio) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\Software\AntiVirus Studio 2010 (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\AntiVirus Studio 2010 (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\45cwseuwf8sk (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\antivirus studio 2010 (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\securitycenter (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.

Folders Infected:
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010 (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Start Menu\Programs\AntiVirus Studio 2010 (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\{username}\Desktop\load.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\AntiVirus Studio 2010.exe (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securitycenter.exe (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securityhelper.exe (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\taskmgr.dll (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Start Menu\Programs\AntiVirus Studio 2010\Activate AntiVirus Studio 2010.lnk (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Start Menu\Programs\AntiVirus Studio 2010\AntiVirus Studio 2010.lnk (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Start Menu\Programs\AntiVirus Studio 2010\Help AntiVirus Studio 2010.lnk (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Start Menu\Programs\AntiVirus Studio 2010\How to Activate AntiVirus Studio 2010.lnk (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Start Menu\Programs\AntiVirus Studio 2010.LNK (Rogue.AntivirusStudio2010) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Application Data\Microsoft\Internet Explorer\Quick Launch\AntiVirus Studio 2010.LNK (Rogue.AntivirusStudio2010) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\02c9c3c35bdx5.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\17dkf.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\472a10e2ebxd9.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\56493.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\8gmsed-bd.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\ae0965a7157cd.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\al3erfa3.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\alerfa.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\backd-efq.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\bzqa43d.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\cocksucker.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\cosock.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\cunifuc.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\dc_3.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\dd10x10.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\ddhelp.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\ddoll3342.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\dkfjd93.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\ds7hw.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\eelnvd13.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\eephilpe.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\exppdf_w.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\fe.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\gedx_ae09.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\gpupz2a.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\hardwh.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\hhbboll_2.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\hiphop.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\hodeme.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\hvipws9.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\jdhellwo3.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\jofcdks.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\kilslmd.exex (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\kjdh_gf_jjdhgd.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\lols.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\lorsk.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\ppddfcfux.exxe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\pswwg3c.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\qwedvor.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\qwklrvjhqlkj.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\r0life.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\rator.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\snowif.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\sycre.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\test.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\timem.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\wergfq.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\winlogoff.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\wqefqw7e.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\wrcud12.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\wrfwe_di.exe (Trojan.Downloader) -> Quarantined and deleted successfully.

As mentioned before the full version of Malwarebytes' Anti-Malware could have protected your computer against this threat.

We use different ways of protecting your computer(s):

  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention

Save yourself the hassle and get protected.

Link to post
Share on other sites

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.