Adware.Win32.WowSearch.GB
Windows

Threat Type: Adware
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.
TECHNICAL DETAILS
Arrival Details
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It may be manually installed by a user.
Installation
This Adware adds the following folders:
- %Program Files%\EZ YouTube Video Downloader
- %Program Files%\EZ YouTube Video Downloader\{8167E8F2-A770-4EFB-BA53-8A511051CD9B}
- %Program Files%\EZ YouTube Video Downloader\{8167E8F2-A770-4EFB-BA53-8A511051CD9B}\chrome\content
- %Program Files%\EZ YouTube Video Downloader\{8167E8F2-A770-4EFB-BA53-8A511051CD9B}\chrome\skin
- %Program Files%\EZ YouTube Video Downloader\{8167E8F2-A770-4EFB-BA53-8A511051CD9B}\defaults
- %Program Files%\EZ YouTube Video Downloader\{8167E8F2-A770-4EFB-BA53-8A511051CD9B}\defaults\preferences
- %Program Files%\Security Updates Service
- %User Temp%\ns{random}.tmp
(Note: %Program Files% is the default Program Files folder, usually C:\Program Files in Windows 2000, Server 2003, and XP (32-bit), Vista (32-bit), 7 (32-bit), and 8 (32-bit), or C:\Program Files (x86) in Windows XP (64-bit), Vista (64-bit), 7 (64-bit), and 8 (64-bit).. %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista, 7, and 8.)
It drops the following files:
- %Program Files%\EZ YouTube Video Downloader\{8167E8F2-A770-4EFB-BA53-8A511051CD9B}\chrome.manifest
- %Program Files%\EZ YouTube Video Downloader\{8167E8F2-A770-4EFB-BA53-8A511051CD9B}\chrome\content\main.js
- %Program Files%\EZ YouTube Video Downloader\{8167E8F2-A770-4EFB-BA53-8A511051CD9B}\chrome\content\main.xul
- %Program Files%\EZ YouTube Video Downloader\{8167E8F2-A770-4EFB-BA53-8A511051CD9B}\chrome\skin\icon48.png
- %Program Files%\EZ YouTube Video Downloader\{8167E8F2-A770-4EFB-BA53-8A511051CD9B}\defaults\preferences\prefs.js
- %Program Files%\EZ YouTube Video Downloader\{8167E8F2-A770-4EFB-BA53-8A511051CD9B}\install.rdf
- %Program Files%\EZ YouTube Video Downloader\{8167E8F2-A770-4EFB-BA53-8A511051CD9B}\yvd.xpi.7z
- %Program Files%\EZ YouTube Video Downloader\install.ico
- %Program Files%\EZ YouTube Video Downloader\uninstall.exe
- %Program Files%\EZ YouTube Video Downloader\yvd.dll
- %Program Files%\Security Updates Service\search_checker.exe
- %Program Files%\Security Updates Service\winupdsvc.exe
- %User Temp%\jsonparser.dll
- %User Temp%\ns{random}.tmp
- %User Temp%\ns{random}.tmp\inetc.dll
- %User Temp%\ns{random}.tmp\LogEx.dll
- %User Temp%\ns{random}.tmp\modern-wizard.bmp
- %User Temp%\ns{random}.tmp\ns{random}.tmp
- %User Temp%\ns{random}.tmp\nsDialogs.dll
- %User Temp%\ns{random}.tmp\nsExec.dll
- %User Temp%\ns{random}.tmp\nsis7z.dll
- %User Temp%\ns{random}.tmp\nsProcess.dll
- %User Temp%\ns{random}.tmp\System.dll
- %User Temp%\ns{random}.tmp\UAC.dll
- %User Temp%\ns{random}.tmp\version.dll
- %User Temp%\PrefJsonCpp.exe
- %User Temp%\sqlite3.exe
- %User Temp%\ytvd.json
- %User Temp%\ytvd.json_backup
- %User Temp%\ytvd_install.log
(Note: %Program Files% is the default Program Files folder, usually C:\Program Files in Windows 2000, Server 2003, and XP (32-bit), Vista (32-bit), 7 (32-bit), and 8 (32-bit), or C:\Program Files (x86) in Windows XP (64-bit), Vista (64-bit), 7 (64-bit), and 8 (64-bit).. %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista, 7, and 8.)
Other System Modifications
This Adware adds the following registry keys:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Ext\
Settings\{fdbfea30-ec51-4b8d-b4f0-8ca4f7253c0a}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
CLSID\{FDBFEA30-EC51-4B8D-B4F0-8CA4F7253C0A}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
CLSID\{FDBFEA30-EC51-4B8D-B4F0-8CA4F7253C0A}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\EZ YouTube Video Downloader
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Explorer\
Browser Helper Objects\{FDBFEA30-EC51-4B8D-B4F0-8CA4F7253C0A}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Policies\
Ext
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
EZ YouTube Video Downloader
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
HKEY_USERS\.DEFAULT\Software\
Microsoft\Windows\CurrentVersion\
Ext\Settings\{fdbfea30-ec51-4b8d-b4f0-8ca4f7253c0a}
HKEY_USERS\{SID}\Software\
Microsoft\Windows\CurrentVersion\
Ext\Settings\{fdbfea30-ec51-4b8d-b4f0-8ca4f7253c0a}
It adds the following registry entries:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Ext\
Settings\{fdbfea30-ec51-4b8d-b4f0-8ca4f7253c0a}
Flags = 1024
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
CLSID\{FDBFEA30-EC51-4B8D-B4F0-8CA4F7253C0A}
(Default) = EZ YouTube Video Downloader {version}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
CLSID\{FDBFEA30-EC51-4B8D-B4F0-8CA4F7253C0A}\InprocServer32
(Default) = %Program Files%\EZYOUT~1\yvd.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
CLSID\{FDBFEA30-EC51-4B8D-B4F0-8CA4F7253C0A}\InprocServer32
ThreadingModel = Apartment
HKEY_LOCAL_MACHINE\SOFTWARE\EZ YouTube Video Downloader
loc_inst_chr_ext = ""
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Explorer\
Browser Helper Objects\{FDBFEA30-EC51-4B8D-B4F0-8CA4F7253C0A}
NoExplorer = 1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Policies\
Ext
IgnoreFrameApprovalCheck = 1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
EZ YouTube Video Downloader
DisplayIcon = %Program Files%\EZ YouTube Video Downloader\install.ico
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
EZ YouTube Video Downloader
DisplayName = EZ YouTube Video Downloader
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
EZ YouTube Video Downloader
DisplayVersion = {version}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
EZ YouTube Video Downloader
Publisher = XtensionPlus
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
EZ YouTube Video Downloader
UninstallString = %Program Files%\EZ YouTube Video Downloader\uninstall.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
EZ YouTube Video Downloader
URLInfoAbout = http://{BLOCKED}o.tv/
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\
Firefox\Extensions
{8167E8F2-A770-4EFB-BA53-8A511051CD9B} = %Program Files%\EZ YouTube Video Downloader\{8167E8F2-A770-4EFB-BA53-8A511051CD9B}
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
chrome_se_last_update = 0
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
chrome_se_next_update = 1
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
chrome_tab_last_update = 0
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
distributor_id = 0
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
firefox_se_last_update = 0
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
firefox_se_next_update = 1
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
firefox_tab_last_update = 0
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
first_run = 0
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
ie_se_last_update = 0
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
ie_se_next_update = 1
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
ie_tab_last_update = 0
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
last_build_check = 0
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
name = Security Updates Service
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
next_build_check = 1
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
tmp = C:\Users\DYITUS~1\AppData\Local\Temp\
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
url = http://{BLOCKED}o.tv/youtubedownloader/update.jsp
HKEY_LOCAL_MACHINE\SOFTWARE\SecurityUpdatesService
version = 1.2.1
HKEY_USERS\.DEFAULT\Software\
Microsoft\Windows\CurrentVersion\
Ext\Settings\{fdbfea30-ec51-4b8d-b4f0-8ca4f7253c0a}
Flags = 1024
HKEY_USERS\{SID}\Software\
Microsoft\Windows\CurrentVersion\
Ext\Settings\{fdbfea30-ec51-4b8d-b4f0-8ca4f7253c0a}
Flags = 1024
Other Details
This Adware connects to the following possibly malicious URL:
- http://myvdo.tv/{BLOCKED}downloader/update.jsp
- http://sso.{BLOCKED}r.com/domain/myvdo.tv
- http://xsso.{BLOCKED}o.tv
- http://{BLOCKED}nplus.com/thank.htm