1. Symantec/
  2. Security Response/
  3. Adware.Lamhok


February 13, 2007 11:37:47 AM
Risk Impact:
File Names:
Win32st.dll,although this may vary.
Systems Affected:

When Adware.Lamhok is executed, it registers itself as the default protocol handler in Internet Explorer and Windows Explorer. When any request is passed to this protocol handler, it displays a specific Web page.

This action causes that Web page to be displayed when Internet Explorer attempts to access a URL that does not begin with a known moniker. Examples of known monikers include:
  • http:
  • ftp:
  • mailto:

Summary| Technical Details| Removal

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
2016 Internet Security Threat Report, Volume 21
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube