Friday
2008-11-30, 14:44
The following instructions have been created to help you to get rid of "SearchEx" manually.
Use this guide at your own risk; software should usually be better suited to remove malware, since it is able to look deeper.
If this guide was helpful to you, please consider donating towards this site (http://www.safer-networking.org/index.php?page=donate).
Threat Details:
Categories:
adware
trojan
Description:
The newest form of this is documented by McAfee: http://vil.mcafee.com/dispVirus.asp?virus_k=100052
Removal Instructions:
Start Menu:
Please remove the following items from your start menu.
To check where they are pointing to, right-click them and choose "Properties" from the context menu appearing.
Groups named "Valintines Day Card".
Files:
Please use Windows Explorer or another file manager of your choice to locate and delete these files.
The file at "<$SYSDIR>\homepage.dll".
The file at "<$SYSDIR>\HmePge.dll".
The file at "<$SYSDIR>\IEBrw.dll".
The file at "<$SYSDIR>\iebrw.dll".
The file at "<$SYSDIR>\OmePage.dll".
Make sure you set your file manager to display hidden and system files. If SearchEx uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify files!
Folders:
Please use Windows Explorer or another file manager of your choice to locate and delete these folders.
The directory at "<$PROGRAMFILES>\Valintines Day Card".
Make sure you set your file manager to display hidden and system files. If SearchEx uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify folders!
Registry:
You can use regedit.exe (included in Windows) to locate and delete these registry entries.
A key in HKEY_CLASSES_ROOT\ named "IEBrowserHelper.IEObj", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "HomePage.HomePg", plus associated values.
Delete the registry key "{1A98BCA2-0BD1-47DE-9710-C7665F7F1FCB}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{1A98BCA2-0BD1-47DE-9710-C7665F7F1FCB}" at "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\".
Delete the registry key "{A116A5C1-AD77-446C-992A-F56200B112DB}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{A116A5C1-AD77-446C-992A-F56200B112DB}" at "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\".
Delete the registry key "{46BF7070-1B2D-4EFF-91C7-0A40167E1893}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{7E74DC1C-73C4-47BC-BE06-F9DD4F6EDFD0}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{4B209BAD-5B93-4ED4-846E-DCDBD4B3F6C7}" at "HKEY_CLASSES_ROOT\TypeLib\".
Delete the registry key "{B5AEFEA0-CA6F-4C44-971B-050108DF49E4}" at "HKEY_CLASSES_ROOT\TypeLib\".
Delete the registry value "{1A98BCA2-0BD1-47DE-9710-C7665F7F1FCB}" at "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks\".
Delete the registry value "{1A98BCA2-0BD1-47DE-9710-C7665F7F1FCB}" at "HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\UrlSearchHooks\".
If SearchEx uses rootkit technologies, use our RegAlyzer (http://www.safer-networking.org/index.php?page=regalyzer), RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
Final Words:
If neither Spybot-S&D nor self help did resolve the issue or you would prefer one on one help,
Please read these instructions (http://forums.spybot.info/showthread.php?t=288) before requesting assistance,
Then start your own thread in the Malware Removal Forum (http://forums.spybot.info/forumdisplay.php?f=22) where a volunteer analyst will advise you as soon as available.
Use this guide at your own risk; software should usually be better suited to remove malware, since it is able to look deeper.
If this guide was helpful to you, please consider donating towards this site (http://www.safer-networking.org/index.php?page=donate).
Threat Details:
Categories:
adware
trojan
Description:
The newest form of this is documented by McAfee: http://vil.mcafee.com/dispVirus.asp?virus_k=100052
Removal Instructions:
Start Menu:
Please remove the following items from your start menu.
To check where they are pointing to, right-click them and choose "Properties" from the context menu appearing.
Groups named "Valintines Day Card".
Files:
Please use Windows Explorer or another file manager of your choice to locate and delete these files.
The file at "<$SYSDIR>\homepage.dll".
The file at "<$SYSDIR>\HmePge.dll".
The file at "<$SYSDIR>\IEBrw.dll".
The file at "<$SYSDIR>\iebrw.dll".
The file at "<$SYSDIR>\OmePage.dll".
Make sure you set your file manager to display hidden and system files. If SearchEx uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify files!
Folders:
Please use Windows Explorer or another file manager of your choice to locate and delete these folders.
The directory at "<$PROGRAMFILES>\Valintines Day Card".
Make sure you set your file manager to display hidden and system files. If SearchEx uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify folders!
Registry:
You can use regedit.exe (included in Windows) to locate and delete these registry entries.
A key in HKEY_CLASSES_ROOT\ named "IEBrowserHelper.IEObj", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "HomePage.HomePg", plus associated values.
Delete the registry key "{1A98BCA2-0BD1-47DE-9710-C7665F7F1FCB}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{1A98BCA2-0BD1-47DE-9710-C7665F7F1FCB}" at "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\".
Delete the registry key "{A116A5C1-AD77-446C-992A-F56200B112DB}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{A116A5C1-AD77-446C-992A-F56200B112DB}" at "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\".
Delete the registry key "{46BF7070-1B2D-4EFF-91C7-0A40167E1893}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{7E74DC1C-73C4-47BC-BE06-F9DD4F6EDFD0}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{4B209BAD-5B93-4ED4-846E-DCDBD4B3F6C7}" at "HKEY_CLASSES_ROOT\TypeLib\".
Delete the registry key "{B5AEFEA0-CA6F-4C44-971B-050108DF49E4}" at "HKEY_CLASSES_ROOT\TypeLib\".
Delete the registry value "{1A98BCA2-0BD1-47DE-9710-C7665F7F1FCB}" at "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks\".
Delete the registry value "{1A98BCA2-0BD1-47DE-9710-C7665F7F1FCB}" at "HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\UrlSearchHooks\".
If SearchEx uses rootkit technologies, use our RegAlyzer (http://www.safer-networking.org/index.php?page=regalyzer), RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
Final Words:
If neither Spybot-S&D nor self help did resolve the issue or you would prefer one on one help,
Please read these instructions (http://forums.spybot.info/showthread.php?t=288) before requesting assistance,
Then start your own thread in the Malware Removal Forum (http://forums.spybot.info/forumdisplay.php?f=22) where a volunteer analyst will advise you as soon as available.