ViRobot

Security Info

  • Security Center
    • Spyware
  • Security Dictionary
  • Security Service
  • Free Download!!

Threats DB

Spyware.RegText.46080

Aliases  
Typical Symptoms  Create Desktop icons,Modify Home page,Move to the particular site
Discovered  [korea] 2010-07-08
 [Foreign] 0000-00-00
Type  Adware ActiveField  
Damage/Distribution
Origin  others Encryption  NO
Target of infection  Download by Malicious code,Webpage,Execution
Scan engine needed
2010-07-08 [Able to detect & repair]
  • Free trial download
Description

[Symptoms of Infection]

Spyware.RegText.46080 creates IE short-cut icon on desktop without user agreement.
 

[PIC 1] IE Short-cut icon on desktop


[ PIC 2] Pop-up site on short-cut icon click


<Related URL>

 

hxxp://(...).6fh.net/?2

<File>

[Spyware.RegText.46080] creates files like below.
 

(Windows Folder)\RegText.reg

<Registry>

[Spyware.RegText.46080] creates registries like below.

 

HKLM\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell
HKLM\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\Open(&O)
HKLM\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\Open(&O)\Command
HKLM\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\??(&R)
HKLM\SOFTWARE\Classes\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\??(&R)\CommandHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu\{871C5380-42A0-1069-A2EA-08002B30309D}: 0x00000001HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel\{871C5380-42A0-1069-A2EA-08002B30309D}: 0x00000001
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu\{871C5380-42A0-1069-A2EA-08002B30309D}: 0x00000001
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktopCleanupWizard: 0x00000001HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}

<Notation>

- "(Programs Folder)" could be different by OS and generally this is "C:\Program Files\"
- "(User Account Folder)" could be different by OS and generally this is "C:\Documents and Settings\(User Account)\"
- "(Windows Folder)" could be different by OS and generally this is "C:\Windows\"
- "(System Folder)" could be different by OS and generally this is "C:\Windows\System32\".


Removal Instructions

[How to repair]

 

1. If you are WinXP/ME users, please be inactivate System Recovery Function.
The reason why being inactivate of the system recovery is to clean the virus completely.
You can refer to MS technical documents(Q263455) for more details.


2. Update the engine module for the latest one.
To repair this virus, you need to update the engine for the latest one.


a. ViRobot products users
-Download the latest engine files via our website (www.hauri.net)


b. Non-ViRobot products users
- Use the LiveCall (Free Scan) via the website (http://www.livecall.co.kr)
- Use the trial version of ViRobot products (30days only)


3. How to scan the virus.


a. Run your ViRobot, and choose all files in scan option.
- ViRobot Desktop 5.x : [Tools] -> [Configuration] -> [Spyware/Adware Scan] : Check all files
- LiveCall (Free Scan) : [Advanced Scan] : Check


b. Repair all viruses detected.

 


List
Copyright 2008 @ HAURI Inc. All rights reserved. SiteMap