广告软件搜狗
威胁评分卡
EnigmaSoft 威胁记分卡
EnigmaSoft 威胁记分卡是针对不同恶意软件威胁的评估报告,由我们的研究团队收集和分析。 EnigmaSoft 威胁记分卡使用多个指标对威胁进行评估和排名,包括现实世界和潜在风险因素、趋势、频率、普遍性和持续性。 EnigmaSoft 威胁记分卡会根据我们的研究数据和指标定期更新,对广泛的计算机用户有用,从寻求解决方案以从系统中删除恶意软件的最终用户到分析威胁的安全专家。
EnigmaSoft 威胁记分卡显示各种有用的信息,包括:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
严重性级别:根据我们的风险建模过程和研究,确定的对象的严重性级别,以数字形式表示,如我们的威胁评估标准中所述。
受感染计算机: SpyHunter 报告的在受感染计算机上检测到的特定威胁的确认和疑似案例数量。
另请参阅威胁评估标准。
| Popularity Rank: | 3,673 |
| 威胁级别: | 80 % (高的) |
| 受感染的计算机: | 32,499 |
| 初见: | November 20, 2015 |
| 最后一次露面: | January 25, 2026 |
| 受影响的操作系统: | Windows |
Adware.Sogou 是一种隐匿垃圾广告程序。 Adware.Sogou 可以偷偷安装到一台机器上,它通常与木马等恶意软件捆绑在一起。 Adware.Sogou 能够修改 Internet Explorer 主页或搜索页面,以弹出窗口、横幅或链接的形式显示广告。
目录
SpyHunter 检测并删除 广告软件搜狗
文件系统详情
| # | 文件名 | MD5 |
检测
检测数: SpyHunter 报告的在受感染计算机上检测到的特定威胁的确认和疑似案例数量。
|
|---|---|---|---|
| 1. | bdupdate.exe | 3be0e8890a088580ff6840940d1d0988 | 104 |
| 2. | tools_update.exe | b18a0019f427178286ae667dbc350469 | 9 |
| 3. | %ProgramFiles%\Common Files\Sogou PXP\p2psvr.exe | ||
| 4. | %ProgramFiles%\P4P\p4pipc.dll | ||
| 5. | %ProgramFiles%\P4P\SoDALib.dll |
注册表详情
目录
广告软件搜狗 可能会创建以下目录或目录:
| %PROGRAMFILES%\tools\update |
| %PROGRAMFILES(x86)%\tools\update |
分析报告
一般信息
| Family Name: | Trojan.Sogou |
|---|---|
| Signature status: | Hash Mismatch |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
b06a18fd2f9acb3b3fc9f32b3ae2852a
SHA1:
c59366ed5c8e1b47f64af03c870793104afba75d
文件大小:
203.90 KB, 203904 bytes
|
|
MD5:
76a87cc9960bce8a5eca578d26cedb29
SHA1:
b594dca4b75301d6e52033ffc7b49d1bdf626fe1
文件大小:
9.52 MB, 9517720 bytes
|
|
MD5:
a20348f065f642f03c1912fbf586196e
SHA1:
b813f3e662fafe5fba9933d28a993bc39bde894e
SHA256:
8BB883C65FC0339FBE0BE370E3AA7D5102EEC6BC823609DDD90A9A590A03D7EB
文件大小:
1.95 MB, 1946600 bytes
|
|
MD5:
70b868cb848faaccdd470676e5ea2536
SHA1:
693407e313df2e68904b6b88bd9e44899f2f5149
SHA256:
E27068DEF6897F7AB202EA541560F717540AB9AD72C73C699D6A33C8CBDF8C00
文件大小:
545.73 KB, 545728 bytes
|
|
MD5:
ae39c7b386b372c9a1bf1ed57c3a360f
SHA1:
fb99c99c5b159c1b6658d58a279c1b5d7f09fea9
SHA256:
AC7D8ED76116F01904C812A416AD968A970D1F75BF66503679CD826C998080DF
文件大小:
1.48 MB, 1480768 bytes
|
Show More
|
MD5:
cbcc292ee264028646aac724d9b9c9a0
SHA1:
d635e2aec646d1cf2355d7e05f70f8e9bc6f123f
SHA256:
7A23721779E84873A1EF9ADD789B754EEA00F90A180A4C831410C6F0339B26FF
文件大小:
46.26 KB, 46264 bytes
|
|
MD5:
ca78f15a4ca31fd56fb07893b80d0b8e
SHA1:
7df80c26b5eb291e0cb248503f379c2bfbbb7568
SHA256:
6B94735D4076F9CE930E8ED8995EEF85152AB553CDA03EA28297F854434E2121
文件大小:
1.95 MB, 1946544 bytes
|
|
MD5:
f352c6eae6613183221cf9d24fbad06c
SHA1:
097317ab43c15d67ae5a4b68ba083e8d8a68869c
SHA256:
9040FDF54B462797755A05BAFD378AF3AD38E28D663C80C2F873F48DBAD7F384
文件大小:
470.12 KB, 470120 bytes
|
|
MD5:
b6ab761a2941bcaadc23bcef8f7b4060
SHA1:
3dba655fd506fabab8ccd642d21a97d58934231c
SHA256:
267187B1247E5F4C4B9A76E57DEA47FC619DE444AA56EDA91CB731017235C5F7
文件大小:
462.45 KB, 462448 bytes
|
|
MD5:
89403c88a438fd262b889ca8d84eb39a
SHA1:
a83f23ff4fadbf1172d1d9061130613152e4990c
SHA256:
4CCEE1C442AF9D5759DA5FE62A82907602518BE29DCB9908A4E760371A47EA7B
文件大小:
551.29 KB, 551288 bytes
|
|
MD5:
e46759dd45ad2a419e22e879394d5187
SHA1:
c425e4f20dd8c34047c13e9fa24adbd5ca4d4ed0
SHA256:
6D1517C9ABEBA196E1273A5015D1E539D663A0B4AAD28D52548516DB20A7B2CB
文件大小:
1.95 MB, 1946584 bytes
|
|
MD5:
b9f69d30bf1dcd784751c70f3183ac6a
SHA1:
5f1f561509374902c5630f4a1969f24335d13da7
SHA256:
D469EC7B7D15C5792B41EC59104FC7555F04C31E2BF489CDB3E5C7E78B3B9479
文件大小:
1.61 MB, 1612288 bytes
|
|
MD5:
c25b2a407eeec50bf55fd0ada0e091e3
SHA1:
fe594cf2a0e0a75f13451467ec01f6fc9f1ba991
SHA256:
AFBAE459621D8D1FE7EF21FD5394B5FD286C1AA29643BD8DD5C0BCCDBBE25B8E
文件大小:
579.69 KB, 579688 bytes
|
|
MD5:
6bbf07a9c75e0be6dab3b846542a98c1
SHA1:
3a4fb56e9bdd4e2269fc7d2bf8fd0acce8866651
SHA256:
2D80D0B1D139B8533257CCC02D887D5755ADB93E2C368CCD02C58648C422D7FF
文件大小:
1.95 MB, 1946544 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has been packed
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is 64-bit executable
Show More
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Show More
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| 姓名 | 价值 |
|---|---|
| Company Name | Sogou.com Inc. |
| File Description |
|
| File Version |
Show More
|
| Internal Name |
|
| Legal Copyright |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
Show More
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Sogou.com | Class 3 Public Primary Certification Authority | Root Not Trusted |
| Beijing Sogou Technology Development Co., Ltd. | DigiCert SHA2 Assured ID Code Signing CA | Hash Mismatch |
| Sogou.com | Symantec Class 3 SHA256 Code Signing CA | Self Signed |
| Beijing Sogou Technology Development Co., Ltd. | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Sogou.com | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
File Traits
- HighEntropy
- Installer Version
- x64
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 5,138 |
|---|---|
| Potentially Malicious Blocks: | 18 |
| Whitelisted Blocks: | 4,042 |
| Unknown Blocks: | 1,078 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe\sgdownloadpipenew2 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 786432 |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | 数据 | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | ⠍ ȁ ⋡ 龡^ Ū 紘Çó 獖}Ŵ ⦘· Ŵ 좟Êh , ֢ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | 꿤 ȁ 獖} | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Anti Debug |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
open C:\WINDOWS\system32\regsvr32.exe /s C:\WINDOWS\system32\SogouTSF.ime
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\fb99c99c5b159c1b6658d58a279c1b5d7f09fea9_0001480768.,LiQMAxHB
|