Categories: Trojan,Adware,Downloader
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.
[Kaspersky]Trojan-Spy.Win32.Agent.iw,AdWare.Win32.BHO.ls;
[McAfee]SearchNet;
[Other]Win32/SearchNet.D,Adware.PigSearch,Adware.Rugo
Visible Symptoms:
Files in system folders:
[%SYSTEM%]\drivers\FAD.sys
[%SYSTEM%]\ntsvrs.exe
[%PROFILE_TEMP%]\lokv.exe
[%PROFILE_TEMP%]\u4hq.exe
[%SYSTEM%]\drivers\Anfad.sys
[%SYSTEM%]\drivers\svq0hve.sys
[%SYSTEM%]\drivers\xcvmp7.sys
[%SYSTEM%]\ServeHost.dat
[%SYSTEM%]\ServeHost.exe
[%SYSTEM%]\drivers\FAD.sys
[%SYSTEM%]\ntsvrs.exe
[%PROFILE_TEMP%]\lokv.exe
[%PROFILE_TEMP%]\u4hq.exe
[%SYSTEM%]\drivers\Anfad.sys
[%SYSTEM%]\drivers\svq0hve.sys
[%SYSTEM%]\drivers\xcvmp7.sys
[%SYSTEM%]\ServeHost.dat
[%SYSTEM%]\ServeHost.exe
How to detect SearchNet:
Files:
[%SYSTEM%]\drivers\FAD.sys
[%SYSTEM%]\ntsvrs.exe
[%PROFILE_TEMP%]\lokv.exe
[%PROFILE_TEMP%]\u4hq.exe
[%SYSTEM%]\drivers\Anfad.sys
[%SYSTEM%]\drivers\svq0hve.sys
[%SYSTEM%]\drivers\xcvmp7.sys
[%SYSTEM%]\ServeHost.dat
[%SYSTEM%]\ServeHost.exe
[%SYSTEM%]\drivers\FAD.sys
[%SYSTEM%]\ntsvrs.exe
[%PROFILE_TEMP%]\lokv.exe
[%PROFILE_TEMP%]\u4hq.exe
[%SYSTEM%]\drivers\Anfad.sys
[%SYSTEM%]\drivers\svq0hve.sys
[%SYSTEM%]\drivers\xcvmp7.sys
[%SYSTEM%]\ServeHost.dat
[%SYSTEM%]\ServeHost.exe
Folders:
[%PROGRAM_FILES%]\SearchNet
[%PROGRAM_FILES%]\ZSXZ
Registry Keys:
HKEY_CLASSES_ROOT\typelib\{690e010b-042a-4973-87a8-485deb8bdf68}
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\ext\stats\{2a0176fe-008b-4706-90f5-bba532a49731}
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\ext\stats\{3ce496d1-1746-41cd-9489-3c0b93df10e2}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\zsxz
HKEY_LOCAL_MACHINE\software\policies\microsoft\windows\safer\codeidentifiers\0\hashes\{04152c5b-7ca9-4bb1-8077-5ea42f787eb8}
HKEY_LOCAL_MACHINE\software\policies\microsoft\windows\safer\codeidentifiers\0\hashes\{515bafd0-86a0-4b2a-9dfe-4440bf60c355}
HKEY_LOCAL_MACHINE\software\policies\microsoft\windows\safer\codeidentifiers\0\hashes\{5c20c0e0-9a22-424f-92c8-6f408563ce98}
HKEY_LOCAL_MACHINE\software\policies\microsoft\windows\safer\codeidentifiers\0\hashes\{93506e82-31e9-47b4-901e-2d04d6aa3b86}
HKEY_LOCAL_MACHINE\software\policies\microsoft\windows\safer\codeidentifiers\0\hashes\{b9b553a9-77ff-44de-8c24-fe88ccdc4e93}
HKEY_LOCAL_MACHINE\software\policies\microsoft\windows\safer\codeidentifiers\0\hashes\{c8a82950-abe8-4b7d-a5de-19c249a9cfac}
HKEY_LOCAL_MACHINE\software\policies\microsoft\windows\safer\codeidentifiers\0\hashes\{cf3780c4-33ba-44bd-981f-e37940887d8b}
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_fad
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_remote_log
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\eventlog\application\remote log
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\fad
HKEY_CLASSES_ROOT\clsid\{3ce496d1-1746-41cd-9489-3c0b93df10e2}
HKEY_CLASSES_ROOT\iehpr.intercept
HKEY_CLASSES_ROOT\iehpr.intercept.1
HKEY_CLASSES_ROOT\interface\{52bea5f9-7e3f-490a-b7e8-9bd5dddee5df}
HKEY_CLASSES_ROOT\typelib\{158919d3-4cab-4109-9755-9ae794d5b2de}
HKEY_CLASSES_ROOT\typelib\{4a8976fe-144e-4742-8e49-d6cd3b140fd1}
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\cdnup.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{3ce496d1-1746-41cd-9489-3c0b93df10e2}
HKEY_LOCAL_MACHINE\software\searchnet
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_anfad
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\anfad
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\remote log
Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
Removing SearchNet:
You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.
Or buy it to remove ALL viruses from your computer.Also Be Aware of the Following Threats:
Hsow Trojan Removal instruction
No comments:
Post a Comment