Adware.Sogou
Scorekort för hot
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards är utvärderingsrapporter för olika skadliga hot som har samlats in och analyserats av vårt forskarteam. EnigmaSoft Threat Scorecards utvärderar och rangordnar hot med hjälp av flera mätvärden inklusive verkliga och potentiella riskfaktorer, trender, frekvens, prevalens och persistens. EnigmaSoft Threat Scorecards uppdateras regelbundet baserat på våra forskningsdata och mätvärden och är användbara för ett brett spektrum av datoranvändare, från slutanvändare som söker lösningar för att ta bort skadlig programvara från sina system till säkerhetsexperter som analyserar hot.
EnigmaSoft Threat Scorecards visar en mängd användbar information, inklusive:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Allvarlighetsnivå: Den fastställda svårighetsgraden för ett objekt, representerad numeriskt, baserat på vår riskmodelleringsprocess och forskning, som förklaras i våra hotbedömningskriterier .
Infekterade datorer: Antalet bekräftade och misstänkta fall av ett visst hot som upptäckts på infekterade datorer som rapporterats av SpyHunter.
Se även Kriterier för hotbedömning .
| Popularity Rank: | 3,673 |
| Hotnivå: | 80 % (Hög) |
| Infekterade datorer: | 32,499 |
| Först sett: | November 20, 2015 |
| Senast sedd: | January 25, 2026 |
| Operativsystem som påverkas: | Windows |
Adware.Sogou är ett potentiellt oönskat reklamprogram. Adware.Sogou kan smyg installeras på en maskin och det levereras ofta med skadlig kod som trojaner. Adware.Sogou kan ändra Internet Explorer-hemsidan eller och söksidan för att visa annonser i form av popup-fönster, banners eller länkar.
Innehållsförteckning
SpyHunter upptäcker och tar bort Adware.Sogou
Filsysteminformation
| # | Filnamn | MD5 |
Detektioner
Detektioner: Antalet bekräftade och misstänkta fall av ett särskilt hot som upptäckts på infekterade datorer enligt rapporter från SpyHunter.
|
|---|---|---|---|
| 1. | bdupdate.exe | 3be0e8890a088580ff6840940d1d0988 | 104 |
| 2. | tools_update.exe | b18a0019f427178286ae667dbc350469 | 9 |
| 3. | %ProgramFiles%\Common Files\Sogou PXP\p2psvr.exe | ||
| 4. | %ProgramFiles%\P4P\p4pipc.dll | ||
| 5. | %ProgramFiles%\P4P\SoDALib.dll |
Registerinformation
Kataloger
Adware.Sogou kan skapa följande katalog eller kataloger:
| %PROGRAMFILES%\tools\update |
| %PROGRAMFILES(x86)%\tools\update |
Analys rapport
Allmän information
| Family Name: | Trojan.Sogou |
|---|---|
| Signature status: | Hash Mismatch |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
b06a18fd2f9acb3b3fc9f32b3ae2852a
SHA1:
c59366ed5c8e1b47f64af03c870793104afba75d
Filstorlek:
203.90 KB, 203904 bytes
|
|
MD5:
76a87cc9960bce8a5eca578d26cedb29
SHA1:
b594dca4b75301d6e52033ffc7b49d1bdf626fe1
Filstorlek:
9.52 MB, 9517720 bytes
|
|
MD5:
a20348f065f642f03c1912fbf586196e
SHA1:
b813f3e662fafe5fba9933d28a993bc39bde894e
SHA256:
8BB883C65FC0339FBE0BE370E3AA7D5102EEC6BC823609DDD90A9A590A03D7EB
Filstorlek:
1.95 MB, 1946600 bytes
|
|
MD5:
70b868cb848faaccdd470676e5ea2536
SHA1:
693407e313df2e68904b6b88bd9e44899f2f5149
SHA256:
E27068DEF6897F7AB202EA541560F717540AB9AD72C73C699D6A33C8CBDF8C00
Filstorlek:
545.73 KB, 545728 bytes
|
|
MD5:
ae39c7b386b372c9a1bf1ed57c3a360f
SHA1:
fb99c99c5b159c1b6658d58a279c1b5d7f09fea9
SHA256:
AC7D8ED76116F01904C812A416AD968A970D1F75BF66503679CD826C998080DF
Filstorlek:
1.48 MB, 1480768 bytes
|
Show More
|
MD5:
cbcc292ee264028646aac724d9b9c9a0
SHA1:
d635e2aec646d1cf2355d7e05f70f8e9bc6f123f
SHA256:
7A23721779E84873A1EF9ADD789B754EEA00F90A180A4C831410C6F0339B26FF
Filstorlek:
46.26 KB, 46264 bytes
|
|
MD5:
ca78f15a4ca31fd56fb07893b80d0b8e
SHA1:
7df80c26b5eb291e0cb248503f379c2bfbbb7568
SHA256:
6B94735D4076F9CE930E8ED8995EEF85152AB553CDA03EA28297F854434E2121
Filstorlek:
1.95 MB, 1946544 bytes
|
|
MD5:
f352c6eae6613183221cf9d24fbad06c
SHA1:
097317ab43c15d67ae5a4b68ba083e8d8a68869c
SHA256:
9040FDF54B462797755A05BAFD378AF3AD38E28D663C80C2F873F48DBAD7F384
Filstorlek:
470.12 KB, 470120 bytes
|
|
MD5:
b6ab761a2941bcaadc23bcef8f7b4060
SHA1:
3dba655fd506fabab8ccd642d21a97d58934231c
SHA256:
267187B1247E5F4C4B9A76E57DEA47FC619DE444AA56EDA91CB731017235C5F7
Filstorlek:
462.45 KB, 462448 bytes
|
|
MD5:
89403c88a438fd262b889ca8d84eb39a
SHA1:
a83f23ff4fadbf1172d1d9061130613152e4990c
SHA256:
4CCEE1C442AF9D5759DA5FE62A82907602518BE29DCB9908A4E760371A47EA7B
Filstorlek:
551.29 KB, 551288 bytes
|
|
MD5:
e46759dd45ad2a419e22e879394d5187
SHA1:
c425e4f20dd8c34047c13e9fa24adbd5ca4d4ed0
SHA256:
6D1517C9ABEBA196E1273A5015D1E539D663A0B4AAD28D52548516DB20A7B2CB
Filstorlek:
1.95 MB, 1946584 bytes
|
|
MD5:
b9f69d30bf1dcd784751c70f3183ac6a
SHA1:
5f1f561509374902c5630f4a1969f24335d13da7
SHA256:
D469EC7B7D15C5792B41EC59104FC7555F04C31E2BF489CDB3E5C7E78B3B9479
Filstorlek:
1.61 MB, 1612288 bytes
|
|
MD5:
c25b2a407eeec50bf55fd0ada0e091e3
SHA1:
fe594cf2a0e0a75f13451467ec01f6fc9f1ba991
SHA256:
AFBAE459621D8D1FE7EF21FD5394B5FD286C1AA29643BD8DD5C0BCCDBBE25B8E
Filstorlek:
579.69 KB, 579688 bytes
|
|
MD5:
6bbf07a9c75e0be6dab3b846542a98c1
SHA1:
3a4fb56e9bdd4e2269fc7d2bf8fd0acce8866651
SHA256:
2D80D0B1D139B8533257CCC02D887D5755ADB93E2C368CCD02C58648C422D7FF
Filstorlek:
1.95 MB, 1946544 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has been packed
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is 64-bit executable
Show More
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Show More
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Namn | Värde |
|---|---|
| Company Name | Sogou.com Inc. |
| File Description |
|
| File Version |
Show More
|
| Internal Name |
|
| Legal Copyright |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
Show More
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Sogou.com | Class 3 Public Primary Certification Authority | Root Not Trusted |
| Beijing Sogou Technology Development Co., Ltd. | DigiCert SHA2 Assured ID Code Signing CA | Hash Mismatch |
| Sogou.com | Symantec Class 3 SHA256 Code Signing CA | Self Signed |
| Beijing Sogou Technology Development Co., Ltd. | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Sogou.com | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
File Traits
- HighEntropy
- Installer Version
- x64
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 5,138 |
|---|---|
| Potentially Malicious Blocks: | 18 |
| Whitelisted Blocks: | 4,042 |
| Unknown Blocks: | 1,078 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe\sgdownloadpipenew2 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 786432 |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | ⠍ ȁ ⋡ 龡^ Ū 紘Çó 獖}Ŵ ⦘· Ŵ 좟Êh , ֢ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | 꿤 ȁ 獖} | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Anti Debug |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
open C:\WINDOWS\system32\regsvr32.exe /s C:\WINDOWS\system32\SogouTSF.ime
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\fb99c99c5b159c1b6658d58a279c1b5d7f09fea9_0001480768.,LiQMAxHB
|