Inexperienced and naïve PC users may find it easy to fall for the deceitful lies sold as whole truths by the well-documented and despised Defense Center rogue antispyware application. This rogue, which emanates from the same family of rogueware as Protection Center and Data Protection, was never designed to be of any benefit to an infected PC. Of course this rogueware will do everything in its power to come across as a genuine and powerful security tool to its prospective victims. The truth is that despite this rogue’s seemingly genuine looking appearance, it certainly does not have the ability to detect, quarantine or remove any type of threat from a PC.
Defense Center is nothing more than a malicious infection in itself, only out to steal PC users’ money while leaving them with nothing of value in return. It uses various seditious and sly methods of infiltration to break past installed security software in order to securely root itself in the system. Some of the tactics employed by Defense Center include rubbish online malware scanners and subversive browser hijacking sites. As of late it has also been reported that Defense Center infects online flash ads with its Trojans and malware, and also bundles itself together with third party website downloads and updates.
Once the rogue is securely rooted, it will be configured to launch each time the user logs on to Windows. This will initiate a fake security system scan each time, which will inevitably yield many fake results. These fake results only form part of Defense Center’s attack on the system, and should enjoy no attention. The user will find himself presented with various fake security notifications in the form of pop up messages. These pop ups are also falsely generated, and should be disregarded. Some of the most popular alerts to be on the lookout for include the following:
Warning! Adware detected!
Adware module detected on your PC!
Zlob.Porn.Ad adware has been detected. This adware module advertises websites with explicit content. Be advised of such content being possibly illegal. Please click the button below to locate and remove this threat now.
Antivirus Alert - Critical threat detected
Network attack detected
Network attack has been detected. Process is attempting to access your private data.
A security threat detected on your computer. TrojanASPX.JS.Win32. It strongly recommended to remove this threat right now. Click on the message to remove it
As a further attack, Defense Center will prevent the user from accessing the Internet, or from launching applications on the infected PC. This is done to further panic and frustrates the user into succumbing to Defense Center’s tactics and spending his money on its rubbish. It is also done to prevent the user from possibly executing or downloading an application with the ability to detect and remove Defense Center from the system. Each time the user attempts to run a program, Defense Center will present the following fake security notification:
Warning! Virus threat detected!
Virus activity detected!
Net-Worm.Win32 has been detected. This adware module advertises websites with explicit content. Be advised of such content being possibly illegal. Please click the button below to locate and remove this threat.
Defense Center has the potential to destroy your PC, or at least cause permanent damage should it go untreated. Don’t pay for this rubbish, instead obliterate Defense Center with the help of a properly functioning security tool which will not only erase Defense Center but also protect against similar attacks in future.
|#||File Name||File Size (Bytes)||File Hash|
|1||Bf3.exe||169472 bytes||MD5: d1a06ac9249d9c2554358d0fb5b4d965|
|3||Defense Center Support.lnk|
|5||sshnas21.dll||216064 bytes||MD5: 70bd4a85f5a25e0f46900e213884e565|
|6||esentutl64.exe||418304 bytes||MD5: e16da8bb88cae88fe72f8969a43e745b|
|8||defcnt.exe||1661952 bytes||MD5: 221fdf14fd5bad8d2240c2095fdadedd|
|10||mschrt20ex.dll||301568 bytes||MD5: 57b453403e62b43ae880b9e280825923|
|11||wscsvc32.exe||220160 bytes||MD5: 657bd95834e67585b275cd8be7af0e99|
|#||Process Name||Process Filename||Main module size|