By ESGI Advisor in Browser Hijackers

The website hosts a fake search engine specialized in distributing various kinds of malware. According to ESG malware researchers, is associated with browser hijackers such as the Google Redirect Virus and the Google Redirect Hijacker. These browser hijackers are also often indicators of a severe Trojan or rootkit infection. This is why you should be very concerned if your Internet browser is taking you to the website without your authorization. This is usually the sign of a severe malware infection, often involving more than one malicious agent on the infected computer. ESG malware researchers strongly recommend scanning your computer system for malware if you have visited voluntarily or involuntarily. – Both a Result and a Source of Malware

Most malware infections are not standalone cases. There will usually be a cascade effect when it comes to malware. One of the ways in which this happens is through malicious websites like Usually, a computer user directed to will be taken there as a result of a browser hijacker infection. This browser hijacker may be relatively harmless (such as a toolbar for Internet Explorer), or it can be one of the signals of a full-fledged malware attack (such as the TDSS rootkit, one of the most dangerous malware infections in recent history.) Regardless of the source of the browser redirect, it is certain that the victim will become infected with additional malware from the website. This is because's fake search results are designed to direct computer users to websites containing malicious advertisements, fake security applications, or browser and system exploits that allow the installation of Trojans and other malware.

Avoiding Redirects

Browser hijackers associated with tend to come from two sources:

  1. Most browser hijackers associated with come from Trojan or rootkit infections. To avoid becoming infected with these kinds of browser hijackers, you should use use a reliable anti-malware program, update it regularly, and run regular system scans. ESG malware researchers also recommend staying away from unsafe websites (e.g., adult video websites or file sharing communities).
  2. browser hijackers can also come in the form of a browser helper object for Internet Explorer, or as a fake add-on for Mozilla Firefox. These kinds of components are often included in freeware downloads. If your freeware application requires that you install some kind of toolbar or add-on, ESG malware analysts recommend finding another alternative.

File System Details may create the following file(s):
# File Name Detections
1. %Documents and Settings%\All Users\Application Data\mazuki.dll
2. %WINDOWS%\system32\sstray.exe
3. %Documents and Settings%\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
4. %Documents and Settings%\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
5. %WINDOWS%\system\BCBSMP35.BPL

Registry Details may create the following registry entry or registry entries:
Software\Microsoft\Windows\CurrentVersion\Run "sstray.exe"


Most Viewed