Adware.Lop.Popup
種類
Adware
危険度/拡散度
/
発見日
[korea] 2006-12-12 [Foreign] 0000-00-00
Virobot対応
2006-12-12 [Able to detect & repair]
[Summary] [Adware.Lop.Popup] pretends to be a plug-in file for automatic execution. If user executes this file, malicious code is installed for showing pop-ups for adult advertisement.

[Detailed Information] *Related URL* [Adware.Lop.Popup] accesses to below URLs: 1. http://www.p****ndl.com/in****l.php 2. http://****.nb.*****oo**up.com/bins/int/np_pkz.int *File* [Adware.Lop.Popup] creates files like below: - (Administrator Account Folder)\Application Data\drivetimebook\B02BAC26 - (Administrator Account Folder)\Application Data\drivetimebook\emzccnvw.exe - (Administrator Account Folder)\Application Data\drivetimebook\fyjypcgx.exe - (Administrator Account Folder)\Application Data\drivetimebook\gpl bind dupe.exe - (Administrator Account Folder)\Application Data\drivetimebook\rownzhgy.exe - (Administrator Account Folder)\Application Data\drivetimebook\tsmrnluz.exe - (Administrator Account Folder)\Application Data\drivetimebook\upszyzjb.exe - (Administrator Account Folder)\Application Data\drivetimebook\Wipe Mapi Pure.exe - (Root Folder)\Documents and Settings\All Users\Application Data\Iso Bows Acid Move\downloadsurf.exe - (Root Folder)\Documents and Settings\All Users\Application Data\Iso Bows Acid Move\errormags.exe - (Root Folder)\Documents and Settings\All Users\Application Data\Iso Bows Acid Move\Extra Dupe.exe - (Root Folder)\Documents and Settings\All Users\Application Data\Iso Bows Acid Move\Play meet.exe - (Root Folder)\Documents and Settings\All Users\Application Data\Iso Bows Acid Move\Type Nurb.exe - (Root Folder)\Documents and Settings\All Users\Application Data\Iso Bows Acid Move\Plus Noun 4 - (Programs Folder)\Download Plugin\DlPlugin-Moz\buddy.dat - (Programs Folder)\Download Plugin\DlPlugin-Moz\buddy.exe - (Programs Folder)\Download Plugin\DlPlugin-Moz\npdlplug.dll - (Programs Folder)\Download Plugin\DlPlugin-Moz\setup2.exe - (Programs Folder)\Download Plugin\DlPlugin-Moz\vendor.txt *Registry* [Adware.Lop.Popup] creates registries like below: - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Download Plugin - HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\LoadBendReal - HKCU\Software\Microsoft\Windows\CurrentVersion\Meow Poll Bend - HKCU\Software\DOG FIND UPLOAD - HKCU\Software\Download Plugin - HKCU\Software\Microsoft\Internet Explorer\New Windows\Allow\dns-look-up.com - HKCU\Software\Microsoft\Internet Explorer\New Windows\Allow\www.dns-look-up.com - HKCU\Software\Microsoft\Internet Explorer\New Windows\Allow\netsearchsoft.com - HKCU\Software\Microsoft\Internet Explorer\New Windows\Allow\www.netsearchsoft.com - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AcidMoveTonsRoad - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\That Test *Folder* [Adware.Lop.Popup] creates folders like below: - (Administrator Account Folder)\Application Data\drivetimebook - (Root Folder)\Documents and Settings\All Users\Application Data\Iso Bows Acid Move - (Programs Folder)\Download Plugin\DlPlugin-Moz - (Programs Folder)\Download Plugin - (Programs Folder)\drivetimebook *Notation* - (System Folder) could be different by OS and generally this is 'C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), C:\Windows\System32 (Windows XP)'. - (Windows Folder) could be different by OS and generally this is 'C:\Windows (Windows 95/98/Me/XP), C:\Winnt (Windows NT/2000)'. - (Desktop Folder) could be different by OS and generally this is 'C:\Documents and Settings\(User Account)\Desktop'.
[How to repair] 1. If you are WinXP/ME users, please be inactivate System Recovery Function. The reason why being inactivate of the system recovery is to clean the virus completely. You can refer to MS technical documents(Q263455) for more details. 2. Update the engine module for the latest one. To repair this virus, you need to update the engine for the latest one. a. ViRobot products users -Download the latest engine files via our website (www.hauri.net) b. Non-ViRobot products users - Use the LiveCall (Free Scan) via the website (http://www.livecall.co.kr) - Use the trial version of ViRobot products (30days only) 3. How to scan the virus. a. Run your ViRobot, and choose all files in scan option. - ViRobot Desktop 5.x : [Tools] -> [Configuration] -> [Spyware/Adware Scan] : Check all files - LiveCall (Free Scan) : [Advanced Scan] : Check b. Repair all viruses detected. c. If [Auto-repair after rebooting] message shows up, please try to re-scan after rebooting the PC.