![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy6yIYum942Er3g8rBCo4boTXvIbveHmMYG05kX0H59DNsYhsllEyGeVqYFyAr4J9Rm3R2Rw-kTzCRFEwFZhcFVJ53GERvKyDsIDcN0kUy_Jpv3tfJffi93OfGtVtygd6Q_CF3/s200-r/registry_doctor.png)
pcvirusremover2008 .com (78.157.142.47; 92.62.101.67)
registrydoctorpro2008 .com
powerfulvirusremover2008 .com
registrydoctor2008 .com
topregistrydoctor2008 .com
securefileshredder2009 .com
securefilesshred .com
registrydoctor2008-scan .com
registrydoctor2008-pro .com
prosecureexpertcleanerpro .com
supersecurefileshredder .com
hypersecurefileshredder .com
securefilesshredder .com
secureexpertcleaner .com
winsecureexpertcleaner .com
prosecureexpertcleaner .com
yoursecureexpertcleaner .com
bestsecureexpertcleaner .com
mysecureexpertcleaner .com
energysavecenter .com
virusremover2008plus .com
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi96NDwBzf-HXQZYNb4fo9hSmMOlKwG7ceEo4SKRaP-RFUxIv4LZqhoIyMt9TsEf2tQvPt12UlREEpUEQnQmE8jgZ_QQSTZuKUlgHpfg6HnRWZKkeLklC4a6WQrZ3ssv_wmjHV6/s200-r/virus_remover.png)
antimalwareguard .com
malwarecrash .com
antimalwareguardpro .com
antimalwaremasterpro .com
xp-antispyware-2009 .com (206.161.120.21)
xp-antispyware2009 .com (206.161.120.20)
xp-as-2009 .com (206.161.120.24)
xpantispyware-2009 .com (206.161.120.22)
xpas2009 .com (206.161.120.23)
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgog1Ics9pl3MO1vwSRWPavJ_hG_rFeQA2gplLbuXEWqF7N2e8d7LZGWvSanLOZV9ys-fEhiPdgkI2GL5A-Tg2Gun6Qh710lrL657haLVYnoDWnp4WfB2yEuXsrI3LUq1FNmr7c/s200-r/advanced_antivirus.png)
registryupdate .org (216.122.218.11)
antivirus-2009-pro .net (217.20.175.44)
a-a-v-2008 .com (92.241.163.27)
aav2008 .com
adv-a-v .com
ietoolsupdate .com (208.72.168.84)
iexplorerfile .com
Registrants of notice for cross-checking purposes :
Sagent Group (adminsagent@gmail.com)
Billy A. Schmitt (admiragroup@yahoo.com)
Shestakov Yuriy (alexvasiliev1987@cocainmail.com)
Andrej Kazanski (akazanski@europe.com)
Related posts:
Violating OPSEC for Increasing the Probability of Malware Infection
A Diverse Portfolio of Fake Security Software - Part Eight
A Diverse Portfolio of Fake Security Software - Part Seven
A Diverse Portfolio of Fake Security Software - Part Six
A Diverse Portfolio of Fake Security Software - Part Five
A Diverse Portfolio of Fake Security Software - Part Four
A Diverse Portfolio of Fake Security Software - Part Three
A Diverse Portfolio of Fake Security Software - Part Two
Diverse Portfolio of Fake Security Software
No comments:
Post a Comment