1. /
  2. Security Response/
  3. Adware.SmartBrowser

Adware.SmartBrowser

Updated:
February 13, 2007 11:46:45 AM
Type:
Adware
Risk Impact:
Medium
File Names:
BHO.1.0.1.xxx.dll
Systems Affected:
Windows 2000, Windows 95, Windows 98, Windows Me, Windows Server 2003, Windows XP

When Adware.SmartBrowser is installed, it performs the following actions:
  1. Creates the following files:

    • [INSTALLATION FOLDER]\thingies.lish.enctext
    • [INSTALLATION FOLDER]\thingies.lish.enctext.tmp

      Note: [INSTALLATION FOLDER] is a variable that refers to the location where Adware.SmartBrowser was initially installed.

  2. Creates the following registry subkeys:

    HKEY_CLASSES_ROOT\CLSID\{00000185-C745-43D2-44F1-01A1C789C738}
    HKEY_CLASSES_ROOT\CLSID\{00000185-B716-11D3-92F3-00D0B709A7D8}
    HKEY_CLASSES_ROOT\Interface\{00000183-C745-43D2-44F1-01A1C789C738}
    HKEY_CLASSES_ROOT\TypeLib\{00000182-C745-43D2-44F1-01A1C789C738}
    HKEY_CLASSES_ROOT\BHO.iBHO
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
    \Explorer\Browser Helper Objects
    \{00000185-C745-43D2-44F1-01A1C789C738}
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
    \Explorer\Browser Helper Objects
    \{00000185-B716-11D3-92F3-00D0B709A7D8}
    HKEY_CURRENT_USER\Software\System

  3. Creates the following legitimate registry subkey if not already present:

    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
    \Explorer\BrowseNewProcess

  4. Adds the value:

    "BrowseNewProcess" = "yes"

    to the registry subkey:

    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
    \Explorer\BrowseNewProcess

    so that all new Internet Explorer windows run as a separate process.

  5. Retrieves configuration and update information from the update.smart-browser.com domain.

  6. May download and install additional components depending on the response received from the above domain.

Summary| Technical Details| Removal

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
Internet Security Threat Report