From their EULA paragraph 3: "THE TOOLBAR MAY BE OFFERED TO YOU BUNDLED WITH ANOTHER THIRD PARTY SOFTWARE APPLICATION A "THIRD PARTY APPLICATION".. SUCH THIRD PARTY APPLICATION IS OWNED
Trang 1applications are often installed with a number of other adware programs at the same time causing an extreme load on the PC It has also been noted that these applications have been force installed by web sites (affiliates) or Windows Media files Company claims it no longer distributes n-case although it is unknown how many legacy installations are still in circulation
http://www.180searchassistant.com/home.html
-
2-Seek
This adware product is in the form of a toolbar downloaded via active X control It
is very similar to the behavior of ISTBar and 2020Search
http://www.2-seek.com
-
2000Cracks
Also known as: 2000Cracks.100 Bigorna.100 GateCrasher.110 NetController.108 Sparta.110 VagrNocker.120 VagrNocker.200
-
2020Search
Also known as: Istbar.2020Search
This toolbar is installed by active x drive by download from their website You must first check a box signaling that you have read their very long EULA It will prompt you to install the file and before you know it you have toolbar on your IE browser From their EULA paragraph 3: "THE TOOLBAR MAY BE OFFERED
TO YOU BUNDLED WITH ANOTHER THIRD PARTY SOFTWARE
APPLICATION (A "THIRD PARTY APPLICATION") SUCH THIRD PARTY APPLICATION IS OWNED OR LICENSED BY A THIRD PARTY AND THIS EULA DOES NOT APPLY TO YOUR USE OF SUCH OTHER THIRD PARTY APPLICATION, REGARDLESS OF WHETHER THE TOOLBAR AND THE THIRD PARTY APPLICATION CAME BUNDLED TOGETHER YOU AGREE THAT 2020SEARCH SHALL NOT BE RESPONSIBLE FOR ANY LOSSES, DAMAGES, INJURIES, CAUSES OF ACTION, CLAIMS, DEMANDS OR EXPENSES, INCLUDING LEGAL FEES AND EXPENSES, OF WHATEVER KIND OR NATURE ARISING OUT OF, RELATING TO OR RESULTING FROM THE HIRD PARTY APPLICATION."
http://www.2020search.com
-
Trang 220x2p
This is an older adware Their website has been shut down due to abuses
apparently It is unknown if legacy versions still exist
http://www.20x2p.com
-
2M Free Tetris
2M Free Tetris bundle's potentially unwanted software like Comedy-Planet ,
webhancer
-
2nd-thought
Also known as: Second Thought Trojan.Win32.SecondThought.ag SecondThought SecondThought.A
Accepting their "second opinion when you surf" actually gives you a toolbar
named "Mysearch" 2nd-thought will redirect your searches as long as it is
installed on your computer Browswer hijacker that will reset your home page and often redirect your searches to porn sites Sometimes it will prevent you from changing your home page
http://www.2nd-thought.com
-
2Search
Also known as: Adware.2Search (Symantec) clsIESpy GoogleCatch 007guard 007Installer The007Guard msnnames msn names
2Search is an adware component that installs as a Browser Helper Object, tracks key words entered into search pages and displays advertisements For specific search words, this adware inserts custom results (exactly 3 results) at the top of the google’s result page Tracks search words entered in google and other search pages then sends them to its controlling server
-
2Spy! 1.4
2Spy is an application for monitoring, intercepting, and logging system messages
on your machine such as keystrokes, mouse clicks, window activations, and so on 2Spy can log everything you type and do: applications you use, sites you visit on the Internet, email you write, games you play, music you listen to, and more It can even log noncharacter keys It can silently capture your desktop or active window
at various specified intervals and save it as an image onto disk It will add time
Trang 3stamps to all events and log every caption in the active window title bar, as well as text on all controls It can stay totally invisible from the user: it is invisible in the task list, in the task bar notification area, and in the system tray 2Spy saves
everything to a log file that can be located in any folder you like The log is saved
as a standard text file and can be seen or deleted directly from 2Spy In addition, the log file can be dynamically encrypted You can protect unauthorized access to 2Spy with a password This product is no longer available for download
http://www.freedownloadscenter.com/U /2Spy_1_4.html
-
3D Falling Icons
3D Falling Icons installs 180search Assistant, Seekmo Search Assistant, and Zango Search Assistant along with it From EULA : The Licensed Software will run in the background on your computer and may periodically direct you to our sponsors’ websites By installing and/or using the Licensed Software you grant permission for 180 to periodically display sponsors’ websites to you
-
3rdEye
Also known as: third eye 3rd Eye
From their website: "3rdEye Software emails all logfiles to you secretly Monitor activity from anywhere Automatically Records: Keystrokes & Passwords typed Screenshots of websites visited" This keylogger's home page no longer exists It is unknown if legacy versions are still in cirulation
http://3rdeye.ws/
-
404Search
404Search is adware targeted at 404search.com It uses sites controlled by the Kanoodle search engine The 404search engine uses an IE BHO named
404search.dll
http://www.404search.com
-
4Arcade PBar
Also known as: SeekITAll Toolbar PBar
This is an EffectiveBrand Toolbar It attaches to your Internet Explorer It then redirects searches and shows pop ups to its affiliates This toolbar uses several
Trang 4third party components which makes it difficult to delete Many of the third party components, however, have only been used in EffectiveBrand products
http://www.effectivebrand.com/LandingPage.aspx/CT48597
-
764 Dialer
Dialers are software that dials a phone number This usually happens without the end user knowing about it - causing long distance charges
-
7AdPower Dialer
This dialer makes it easy for their advertisers to collect statistics on their product From their website: "Our service includes: Worldwide billing Statistics/reports are
in real time with drill down capabillities Unlimited Webmaster and Technical Support GlobalPhon supplies you content to market your traffic better"
http://globalphon.com/index.asp
-
7AdPro
This adware makes it easier for Madison Administration Inc to show you ads from their affiliates From their website: "Each ad delivered points directly to your site allowing you to control your content and try new approaches instantly." This is refering their advertiser portion of their website
http://www.7adpower.com
-
7FaSSt
Also known as: 7search FSInstall
The addresses of all Explorer windows are passed to the server
fstrack.7search.com This includes the URLs of all web pages visited, pseudo-URLs like 'about:', and the names of folders, images and other objects in local file system A unique user ID is used to track you across addresses visited Cookies are also issued if you use the search toolbar
http://www.7search.com/
-
96mm
Allows attacker remote access to computer
Trang 5-
??rvices.exe Trojan
A polymorphing Trojan that uses multiple startup entries
@KeyLogger Home 2.15
From the Website: "So how do you know what your staff, children, spouse or significant other type on your computer when you are away from it? Are they working on your account - or playing solitaire? @KeyLogger surveillance software can tell you exactly who is doing what on which PC at any time during the day or night The @KeyLogger records every keystroke made on your computer on every window, emails, messages, documents, web pages, usernames, even on password protected boxes, and more." Their site has been listed for sale Legacy versions of this software are still in circulation
-
A Better Internet
Also known as: ABetterInternet SPYW_BISPY.A [Trend Micro] PSW.Bispy.A [Trend Micro] TR/BiSpy.DLL.B [Trend Micro] Adware.Binet [Pest Patrol] ceres nail.exe nail DRPMon Best Offers Network binet
This adware program has an EXE and a DLL file component The EXE
component looks for certain registry entries and deletes them, while the DLL component maintains a particular registry entry related to a BHO Often this
product is bundled with more than one adware program Reports of Ceres and Nail.exe being bundled and distributed through unlicensed content via BitTorrent Company denies responsability of distribution and claims this occured through
"rogue affiliate distributors"
http://www.bestoffersnetworks.com/
-
A-311 Death 1.02
Allows remote control of the infected machine
-
Trang 6A-Trojan 2.0