Technical details:
Categories: BHO,Toolbar
Netster.Smart.Browse Files:
[%PROFILE%]\netster.dll
[%SYSTEM%]\netster.dll
[%SYSTEM%]\_netster.dll
[%WINDOWS%]\system\netster.dll
[%WINDOWS%]\system\_netster.dll
[%PROFILE%]\netster.dll
[%SYSTEM%]\netster.dll
[%SYSTEM%]\_netster.dll
[%WINDOWS%]\system\netster.dll
[%WINDOWS%]\system\_netster.dll
Netster.Smart.Browse Registry Keys:
HKEY_CLASSES_ROOT\clsid\{359f7e49-1ea0-4671-92e9-61e32fe25c5e}
HKEY_CLASSES_ROOT\clsid\{856d6a8e-a24c-498a-a55a-2b25c606a6b4}
HKEY_CLASSES_ROOT\clsid\{acc63168-5876-439b-95bc-3bae59ca860c}
HKEY_CLASSES_ROOT\clsid\{b98f79f4-3619-49fb-a7e7-b737e58c5727}
HKEY_CLASSES_ROOT\interface\{aa644580-8f8a-4f8b-9263-42e14c7c2fcb}
HKEY_CLASSES_ROOT\interface\{b4fadc3f-7c5f-4fc8-a050-dbeb2c119dd5}
HKEY_CLASSES_ROOT\interface\{eed9bcbf-d40e-408f-8080-e4afc9fddb36}
HKEY_CLASSES_ROOT\interface\{f5619700-a76a-462b-abdd-6372ff10eab7}
HKEY_CLASSES_ROOT\netster.bho
HKEY_CLASSES_ROOT\netster.bho.1
HKEY_CLASSES_ROOT\netster.initscript
HKEY_CLASSES_ROOT\netster.initscript.1
HKEY_CLASSES_ROOT\netster.netsterband
HKEY_CLASSES_ROOT\netster.netsterband.1
HKEY_CLASSES_ROOT\netster.netsterph
HKEY_CLASSES_ROOT\netster.netsterph.1
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{b98f79f4-3619-49fb-a7e7-b737e58c5727}
HKEY_CLASSES_ROOT\typelib\{e1c643a6-8b7b-4f28-b652-f712fe4f7402}
HKEY_LOCAL_MACHINE\software\classes\clsid\{856d6a8e-a24c-498a-a55a-2b25c606a6b4}
HKEY_LOCAL_MACHINE\software\classes\clsid\{b98f79f4-3619-49fb-a7e7-b737e58c5727}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{b98f79f4-3619-49fb-a7e7-b737e58c5727}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{856d6a8e-a24c-498a-a55a-2b25c606a6b4}
HKEY_LOCAL_MACHINE\software\netster
Netster.Smart.Browse Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
Netster.Smart.Browse indications of infection
This symptoms of Netster.Smart.Browse detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
DKS Trojan Information
SCN Toolbar Information
BestSearchEngine Trojan Information
Forbot.gen Backdoor Removal instruction
oxado.com Tracking Cookie Removal
No comments:
Post a Comment