Kan ikke slette Adware.Ezula
Mit Norton antivirusprogram finder Adware.Ezula men jeg kan ikke slette det, der er et link fører til denne beskrivelse:Adware.Ezula
Last Updated on: May 31, 2005 09:19:59 AM
Type: Adware
Name: Not available
Version: 1.0
Publisher: Ezula
Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP
Risk Impact: Low
detection
# Intelligent Updater Definitions*
August 18, 2003
# LiveUpdate™ Definitions **
August 18, 2003
*
Intelligent Updater definitions are released daily, but require manual download and installation.
Click here to download manually.
**
LiveUpdate definitions are usually released every Wednesday.
Click here for instructions on using LiveUpdate.
This risk can be detected only by Symantec products that support security risks. For more information on security risks, please go here.
summary
Behavior
Adware.Ezula alters Web pages viewed in Internet Explorer and can add extra links to certain keywords that advertisers target. This adware also runs under the name TopText.
Symptoms
The files are detected as Adware.Ezula.
Transmission
This Adware has to be manually installed.
technical details
File names:
eZinstall.exe
Ezula.dll
When Adware.Ezula is installed, it performs the following actions:
1. Creates the following files:
* %USERPROGRAMS%\TopText iLookup\Feedback.url
* %USERPROGRAMS%\TopText iLookup\Help.url
* %USERPROGRAMS%\TopText iLookup\My Keywords.lnk
* %USERPROGRAMS%\TopText iLookup\My Preferences.lnk
* %USERPROGRAMS%\TopText iLookup\ReadMe.url
* %USERPROGRAMS%\TopText iLookup\TopText Button Show - Hide.lnk
* %PROGRAMFILES%\eZula\basis.dst
* %PROGRAMFILES%\eZula\basis.kwd
* %PROGRAMFILES%\eZula\basis.pu
* %PROGRAMFILES%\eZula\basis.rst
* %PROGRAMFILES%\eZula\CHCON.dll
* %PROGRAMFILES%\eZula\eabh.dll
* %PROGRAMFILES%\eZula\genun.ez
* %PROGRAMFILES%\eZula\Images\arrow1.gif
* %PROGRAMFILES%\eZula\Images\arrow2.gif
* %PROGRAMFILES%\eZula\Images\button_small.gif
* %PROGRAMFILES%\eZula\Images\icon.gif
* %PROGRAMFILES%\eZula\Images\Layer_Bottom.gif
* %PROGRAMFILES%\eZula\Images\Layer_Center.gif
* %PROGRAMFILES%\eZula\Images\Layer_Top.gif
* %PROGRAMFILES%\eZula\Images\new.gif
* %PROGRAMFILES%\eZula\Images\PopUp_Follow_divider.gif
* %PROGRAMFILES%\eZula\Images\PopUp_Follow_Left.gif
* %PROGRAMFILES%\eZula\Images\PopUp_Follow_Off.gif
* %PROGRAMFILES%\eZula\Images\PopUp_Follow_On.gif
* %PROGRAMFILES%\eZula\Images\PopUp_Follow_Right.gif
* %PROGRAMFILES%\eZula\Images\PopUp_Top.gif
* %PROGRAMFILES%\eZula\Images\PopUp_Top_Bottom.gif
* %PROGRAMFILES%\eZula\Images\Side_B.gif
* %PROGRAMFILES%\eZula\Images\Side_L.gif
* %PROGRAMFILES%\eZula\Images\Side_R.gif
* %PROGRAMFILES%\eZula\Images\Side_Top.gif
* %PROGRAMFILES%\eZula\Images\spacer.gif
* %PROGRAMFILES%\eZula\INSTALL.LOG
* %PROGRAMFILES%\eZula\legend.lgn
* %PROGRAMFILES%\eZula\mmod.exe
* %PROGRAMFILES%\eZula\param.ez
* %PROGRAMFILES%\eZula\rwds.rst
* %PROGRAMFILES%\eZula\search.src
* %PROGRAMFILES%\eZula\seng.dll
* %PROGRAMFILES%\eZula\UNWISE.EXE
* %PROGRAMFILES%\eZula\upgrade.vrn
* %PROGRAMFILES%\eZula\version.vrn
* %PROGRAMFILES%\eZula\wndbannn.src
* %WINDOWS%\Downloaded Program Files\ezstub.dll
* %WINDOWS%\Downloaded Program Files\ezstub.INF
* %WINDOWS%\system32\ezstub.exe
* %WINDOWS%\eZinstall.exe
Notes:
* %USERPROGRAMS% is a variable that refers to the c:\Documents and Settings\<current user>\Start Menu\Programs folder.
* %PROGRAMFILES% is a variable that refers to the Program Files folder. By default, this is C:\Program Files.
* %WINDOWS% is a variable that refers to the Windows folder. By default, this is C:\WINNT on 2k machines and C:\Windows on XP machines.
2. Adds the value:
24F4 "eZmmod" = "C:\PROGRA~1\ezula\mmod.exe"
to the registry subkey:
HKEY_ALL_USERS\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
so that the risk runs every time Windows starts.
3. Creates the following registry subkeys:
HKEY_CLASSES_ROOT\AppID\eZulaBootExe.EXE
HKEY_CLASSES_ROOT\AppID\eZulaMain.EXE
HKEY_CLASSES_ROOT\AppID\{8A044397-5DA2-11D4-B185-0050DAB79376}
HKEY_CLASSES_ROOT\AppID\{C0335198-6755-11D4-8A73-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{07F0A543-47BA-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{07F0A545-47BA-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{19DFB2CB-9B27-11D4-B192-0050DAB79376}
HKEY_CLASSES_ROOT\CLSID\{2079884B-6EF3-11D4-8A74-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{2306ABE4-4D42-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{2BABD334-5C3F-11D4-B184-0050DAB79376}
HKEY_CLASSES_ROOT\CLSID\{3D7247DE-5DB8-11D4-8A72-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{3D7247E8-5DB8-11D4-8A72-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{55910916-8B4E-4C1E-9253-CCE296EA71EB}
HKEY_CLASSES_ROOT\CLSID\{58359010-BF36-11d3-99A2-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{B1DD8A69-1B96-11D4-B175-0050DAB79376}
HKEY_CLASSES_ROOT\CLSID\{C03351A4-6755-11D4-8A73-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{C4FEE4A7-4B8B-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{D290D6E7-BF9D-42F0-9C1B-3BC8AE769B57}
HKEY_CLASSES_ROOT\Interface\{07F0A542-47BA-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{07F0A544-47BA-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{1823BC4B-A253-4767-9CFC-9ACA62A6B136}
HKEY_CLASSES_ROOT\Interface\{19DFB2CA-9B27-11D4-B192-0050DAB79376}
HKEY_CLASSES_ROOT\Interface\{27BC6871-4D5A-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{3D7247DD-5DB8-11D4-8A72-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{3D7247F1-5DB8-11D4-8A72-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{4FD8645F-9B3E-46C1-9727-9837842A84AB}
HKEY_CLASSES_ROOT\Interface\{58359012-BF36-11D3-99A2-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{7EDC96E1-5DD3-11D4-B185-0050DAB79376}
HKEY_CLASSES_ROOT\Interface\{8A0443A2-5DA2-11D4-B185-0050DAB79376}
HKEY_CLASSES_ROOT\Interface\{8EBB1743-9A2F-11D4-8A7E-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{C03351A3-6755-11D4-8A73-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{C4FEE4A6-4B8B-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{EF0372DC-F552-11D3-8528-0050DAB79376}
HKEY_CLASSES_ROOT\Interface\{EF0372DE-F552-11D3-8528-0050DAB79376}
HKEY_CLASSES_ROOT\TypeLib\{07F0A536-47BA-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\TypeLib\{083FA8F4-84F4-11D4-8A77-0050DA2EE1BE}
HKEY_CLASSES_ROOT\TypeLib\{3D7247D1-5DB8-11D4-8A72-0050DA2EE1BE}
HKEY_CLASSES_ROOT\TypeLib\{58359011-BF36-11D3-99A2-0050DA2EE1BE}
HKEY_CLASSES_ROOT\TypeLib\{8A044396-5DA2-11D4-B185-0050DAB79376}
HKEY_CLASSES_ROOT\TypeLib\{C0335197-6755-11D4-8A73-0050DA2EE1BE}
HKEY_CLASSES_ROOT\EZulaAgent.eZulaCtrlHost
HKEY_CLASSES_ROOT\EZulaAgent.eZulaCtrlHost.1
HKEY_CLASSES_ROOT\eZulaAgent.IEObject
HKEY_CLASSES_ROOT\eZulaAgent.IEObject.1
HKEY_CLASSES_ROOT\EZulaAgent.PlugProt
HKEY_CLASSES_ROOT\EZulaAgent.PlugProt.1
HKEY_CLASSES_ROOT\eZulaAgent.ToolBarBand
HKEY_CLASSES_ROOT\eZulaAgent.ToolBarBand.1
HKEY_CLASSES_ROOT\EZulaBoot.InstallCtrl
HKEY_CLASSES_ROOT\EZulaBoot.InstallCtrl.1
HKEY_CLASSES_ROOT\EZulaBootExe.InstallCtrl
HKEY_CLASSES_ROOT\EZulaBootExe.InstallCtrl.1
HKEY_CLASSES_ROOT\EZulaFSearchEng.eZulaCode
HKEY_CLASSES_ROOT\EZulaFSearchEng.eZulaCode.1
HKEY_CLASSES_ROOT\EZulaFSearchEng.eZulaHash
HKEY_CLASSES_ROOT\EZulaFSearchEng.eZulaHash.1
HKEY_CLASSES_ROOT\EZulaFSearchEng.eZulaSearch
HKEY_CLASSES_ROOT\EZulaFSearchEng.eZulaSearch.1
HKEY_CLASSES_ROOT\EZulaFSearchEng.PopupDisplay
HKEY_CLASSES_ROOT\EZulaFSearchEng.PopupDisplay.1
HKEY_CLASSES_ROOT\EZulaFSearchEng.ResultHelper
HKEY_CLASSES_ROOT\EZulaFSearchEng.ResultHelper.1
HKEY_CLASSES_ROOT\EZulaFSearchEng.SearchHelper
HKEY_CLASSES_ROOT\EZulaFSearchEng.SearchHelper.1
HKEY_CLASSES_ROOT\EZulaMain.eZulaSearchPipe
HKEY_CLASSES_ROOT\EZulaMain.eZulaSearchPipe.1
HKEY_CLASSES_ROOT\EZulaMain.TrayIConM
HKEY_CLASSES_ROOT\EZulaMain.TrayIConM.1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{3D7247DE-5DB8-11D4-8A72-0050DA2EE1BE}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\eZula
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/ezstub.dll
HKEY_USERS\S-1-5-21-448539723-413027322-839522115-1003\Software\eZula
HKEY_USERS\S-1-5-21-448539723-413027322-839522115-1003\Software\eZula\Setup
HKEY_USERS\S-1-5-21-448539723-413027322-839522115-1003\Software\eZula\Setup\ID
HKEY_USERS\S-1-5-21-448539723-413027322-839522115-1003\Software\eZula\Setup\path
removal instructions
Note: Removing this adware component from the system will likely cause the program that installed it to not function as intended. The uninstaller generally identifies the programs that will not work after uninstallation.
1. Update the virus definitions.
2. Uninstall TopText using the Add/Remove Programs utility.
3. Run a full system scan and delete all the files detected as Adware.Ezula.
4. Delete the values that were added to the registry.
For specific details on each of these steps, read the following instructions.
1. Updating the virus definitions
Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
* Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
* Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).
The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.
2. Uninstalling the Adware
1. Do one of the following:
* On the Windows 98 taskbar:
1. Click Start > Settings > Control Panel.
2. In the Control Panel window, double-click Add/Remove Programs.
* On the Windows Me taskbar:
1. Click Start > Settings > Control Panel.
2. In the Control Panel window, double-click Add/Remove Programs.
If you do not see the Add/Remove Programs icon, click "...view all Control Panel options."
* On the Windows 2000 taskbar:
By default, Windows 2000 is set up the same as Windows 98. In that case, follow the instructions for Windows 98. Otherwise, click Start, point to Settings, point to Control Panel, and then click Add/Remove Programs.
* On the Windows XP taskbar:
1. Click Start > Control Panel.
2. In the Control Panel window, double-click Add or Remove Programs.
2. Click TopText.
Note: You may need to use the scroll bar to view the whole list.
3. Click Add/Remove, Change/Remove, or Remove (this varies with the operating system). Follow the prompts.
3. Scanning for and deleting the infected files
1. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
* For Norton AntiVirus consumer products: Read the document, "How to configure Norton AntiVirus to scan all files."
* For Symantec AntiVirus Enterprise products: Read the document, "How to verify that a Symantec Corporate antivirus product is set to scan all files."
2. Run a full system scan.
3. If any files are detected as infected with Adw 1946 are.Ezula, click Delete.
4. To delete the values from the registry
WARNING: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry," for instructions.
Note: This is done to make sure that all the keys are removed. They may not be there if the uninstaller removed them.
1. Click Start > Run.
2. Type regedit
Then click OK.
3. Navigate to and delete the following registry keys, if present:
Navigate to the subkey:
HKEY_ALL_USERS\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
4. In the right pane, delete the value:
"eZmmod" = "C:\PROGRA~1\ezula\mmod.exe"
5. Navigate to and delete the following registry keys, if present:
HKEY_CLASSES_ROOT\AppID\eZulaBootExe.EXE
HKEY_CLASSES_ROOT\AppID\eZulaMain.EXE
HKEY_CLASSES_ROOT\AppID\{8A044397-5DA2-11D4-B185-0050DAB79376}
HKEY_CLASSES_ROOT\AppID\{C0335198-6755-11D4-8A73-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{07F0A543-47BA-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{07F0A545-47BA-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{19DFB2CB-9B27-11D4-B192-0050DAB79376}
HKEY_CLASSES_ROOT\CLSID\{2079884B-6EF3-11D4-8A74-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{2306ABE4-4D42-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{2BABD334-5C3F-11D4-B184-0050DAB79376}
HKEY_CLASSES_ROOT\CLSID\{3D7247DE-5DB8-11D4-8A72-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{3D7247E8-5DB8-11D4-8A72-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{55910916-8B4E-4C1E-9253-CCE296EA71EB}
HKEY_CLASSES_ROOT\CLSID\{58359010-BF36-11d3-99A2-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{B1DD8A69-1B96-11D4-B175-0050DAB79376}
HKEY_CLASSES_ROOT\CLSID\{C03351A4-6755-11D4-8A73-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{C4FEE4A7-4B8B-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\CLSID\{D290D6E7-BF9D-42F0-9C1B-3BC8AE769B57}
HKEY_CLASSES_ROOT\Interface\{07F0A542-47BA-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{07F0A544-47BA-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{1823BC4B-A253-4767-9CFC-9ACA62A6B136}
HKEY_CLASSES_ROOT\Interface\{19DFB2CA-9B27-11D4-B192-0050DAB79376}
HKEY_CLASSES_ROOT\Interface\{27BC6871-4D5A-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{3D7247DD-5DB8-11D4-8A72-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{3D7247F1-5DB8-11D4-8A72-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{4FD8645F-9B3E-46C1-9727-9837842A84AB}
HKEY_CLASSES_ROOT\Interface\{58359012-BF36-11D3-99A2-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{7EDC96E1-5DD3-11D4-B185-0050DAB79376}
HKEY_CLASSES_ROOT\Interface\{8A0443A2-5DA2-11D4-B185-0050DAB79376}
HKEY_CLASSES_ROOT\Interface\{8EBB1743-9A2F-11D4-8A7E-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{C03351A3-6755-11D4-8A73-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{C4FEE4A6-4B8B-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\Interface\{EF0372DC-F552-11D3-8528-0050DAB79376}
HKEY_CLASSES_ROOT\Interface\{EF0372DE-F552-11D3-8528-0050DAB79376}
HKEY_CLASSES_ROOT\TypeLib\{07F0A536-47BA-11D4-8A6D-0050DA2EE1BE}
HKEY_CLASSES_ROOT\TypeLib\{083FA8F4-84F4-11D4-8A77-0050DA2EE1BE}
HKEY_CLASSES_ROOT\TypeLib\{3D7247D1-5DB8-11D4-8A72-0050DA2EE1BE}
HKEY_CLASSES_ROOT\TypeLib\{58359011-BF36-11D3-99A2-0050DA2EE1BE}
HKEY_CLASSES_ROOT\TypeLib\{8A044396-5DA2-11D4-B185-0050DAB79376}
HKEY_CLASSES_ROOT\TypeLib\{C0335197-6755-11D4-8A73-0050DA2EE1BE}
HKEY_CLASSES_ROOT\EZulaAgent.eZulaCtrlHost
HKEY_CLASSES_ROOT\EZulaAgent.eZulaCtrlHost.1
HKEY_CLASSES_ROOT\eZulaAgent.IEObject
HKEY_CLASSES_ROOT\eZulaAgent.IEObject.1
HKEY_CLASSES_ROOT\EZulaAgent.PlugProt
HKEY_CLASSES_ROOT\EZulaAgent.PlugProt.1
HKEY_CLASSES_ROOT\eZulaAgent.ToolBarBand
HKEY_CLASSES_ROOT\eZulaAgent.ToolBarBand.1
HKEY_CLASSES_ROOT\EZulaBoot.InstallCtrl
HKEY_CLASSES_ROOT\EZulaBoot.InstallCtrl.1
HKEY_CLASSES_ROOT\EZulaBootExe.InstallCtrl
HKEY_CLASSES_ROOT\EZulaBootExe.InstallCtrl.1
HKEY_CLASSES_ROOT\EZulaFSearchEng.eZulaCode
HKEY_CLASSES_ROOT\EZulaFSearchEng.eZulaCode.1
HKEY_CLASSES_ROOT\EZulaFSearchEng.eZulaHash
HKEY_CLASSES_ROOT\EZulaFSearchEng.eZulaHash.1
HKEY_CLASSES_ROOT\EZulaFSearchEng.eZulaSearch
HKEY_CLASSES_ROOT\EZulaFSearchEng.eZulaSearch.1
HKEY_CLASSES_ROOT\EZulaFSearchEng.PopupDisplay
HKEY_CLASSES_ROOT\EZulaFSearchEng.PopupDisplay.1
HKEY_CLASSES_ROOT\EZulaFSearchEng.ResultHelper
HKEY_CLASSES_ROOT\EZulaFSearchEng.ResultHelper.1
HKEY_CLASSES_ROOT\EZulaFSearchEng.SearchHelper
HKEY_CLASSES_ROOT\EZulaFSearchEng.SearchHelper.1
HKEY_CLASSES_ROOT\EZulaMain.eZulaSearchPipe
HKEY_CLASSES_ROOT\EZulaMain.eZulaSearchPipe.1
HKEY_CLASSES_ROOT\EZulaMain.TrayIConM
HKEY_CLASSES_ROOT\EZulaMain.TrayIConM.1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{3D7247DE-5DB8-11D4-8A72-0050DA2EE1BE}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\eZula
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/ezstub.dll
HKEY_USERS\S-1-5-21-448539723-413027322-839522115-1003\Software\eZula
KEY_USERS\S-1-5-21-448539723-413027322-839522115-1003\Software\eZula\Setup
KEY_USERS\S-1-5-21-448539723-413027322-839522115-1003\Software\eZula\Setup\ID
KEY_USERS\S-1-5-21-448539723-413027322-839522115-1003\Software\eZula\Setup\path
6. Exit the Registry Editor.