Home Malware Programs Browser Hijackers Hohosearch.com

Hohosearch.com

Posted: March 16, 2016

Threat Metric

Ranking: 7,587
Threat Level: 5/10
Infected PCs: 32,038
First Seen: March 16, 2016
Last Seen: October 16, 2023
OS(es) Affected: Windows


Hohosearch.com is a misleading search platform that you should not trust because Hohosearch.com may show manipulated results. Hohosearch.com is closely related to a browser hijacker that may take control of Google Chrome, Mozilla Firefox and Internet Explorer. Hohosearch.com may make Hohosearch.com your homepage automatically. The harmful extension relies solely on drive-by downloads to enter. The people behind the hijacker may promote it in a deceptive way. For example, they may assure Hohosearch.com will improve your searching experience or help you with online purchases. In this case, you may authorize its installation without knowing its true purpose. On the other hand, the browser hijacker may enter in complete silence hidden in a software bundle. When it comes to this method, the users may have no idea they are about to load additional components besides the main program. Hohosearch.com may cause annoying automatic redirections to hohosearch.com or other equally questionable sites. You also may notice the unreliable search platform whenever you open new tabs. There are a few very good reasons not to use it. Hohosearch.com may show many sponsored links that lead to partner sites, which is a hidden way of advertising. The results on the first page may consist almost exclusively of such ads. Most of these ads may not be labeled adequately, so you may not suspect they are not the best-matching results to your query. The first problem of this activity is that you may start visiting irrelevant pages that don't offer what you need. However, an even more disturbing scenario is that some links may take you to corrupted sites that may attempt to infect or trick you. You should delete the browser hijacker immediately with a leading malware removal application to stop the redirections to Hohosearch.com.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%PROGRAMFILES%\Dravsynlether\Drvcoretsk.exe File name: Drvcoretsk.exe
Size: 344.56 KB (344560 bytes)
MD5: 79ea00725e9e522050c99bdd10e25e36
Detection count: 2,298
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Dravsynlether
Group: Malware file
Last Updated: April 30, 2016
C:\AdwCleaner\FileQuarantine\C\Program Files (x86)\Dravsynlether\Drvcoresrv.exe.vir File name: Drvcoresrv.exe.vir
Size: 302.23 KB (302232 bytes)
MD5: 761362671a52bc96fe6d6cd236664366
Detection count: 2,038
Mime Type: unknown/vir
Path: C:\AdwCleaner\FileQuarantine\C\Program Files (x86)\Dravsynlether\Drvcoresrv.exe.vir
Group: Malware file
Last Updated: December 4, 2022
%PROGRAMFILES%\Dravsynlether\Drvcoresrv.exe File name: Drvcoresrv.exe
Size: 302.33 KB (302336 bytes)
MD5: f9e641fa29146f804b5fb41f26324474
Detection count: 660
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Dravsynlether
Group: Malware file
Last Updated: December 30, 2019
%PROGRAMFILES%\Dravsynlether\Drvcoretsk.exe File name: Drvcoretsk.exe
Size: 344.56 KB (344560 bytes)
MD5: 6b186143e451fcd2bc856820204f8993
Detection count: 237
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Dravsynlether
Group: Malware file
Last Updated: December 30, 2019
%PROGRAMFILES%\Dravsynlether\Drvcoresrv.exe File name: Drvcoresrv.exe
Size: 302.3 KB (302304 bytes)
MD5: 98c9187dd980e274c5ea01574be1ddef
Detection count: 65
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Dravsynlether
Group: Malware file
Last Updated: April 30, 2016
%PROGRAMFILES%\Dravsynlether\Drvcoretsk.exe File name: Drvcoretsk.exe
Size: 380.91 KB (380912 bytes)
MD5: 20fb9077cff0d9efe8b07c60d1f15874
Detection count: 62
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Dravsynlether
Group: Malware file
Last Updated: April 30, 2016
%PROGRAMFILES(x86)%\Dravsynlether\Drvcoresrv.exe File name: Drvcoresrv.exe
Size: 299.5 KB (299504 bytes)
MD5: a24ba486be8322064cab697fbd6afcdd
Detection count: 42
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\Dravsynlether
Group: Malware file
Last Updated: April 30, 2016
%PROGRAMFILES(x86)%\Dravsynlether\Drvcoretsk.exe File name: Drvcoretsk.exe
Size: 344.56 KB (344560 bytes)
MD5: e6b075237077a7d259a73d8b235004ea
Detection count: 21
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\Dravsynlether
Group: Malware file
Last Updated: April 30, 2016
%PROGRAMFILES(x86)%\Dravsynlether\Drvcoretsk.exe File name: Drvcoretsk.exe
Size: 347.32 KB (347328 bytes)
MD5: 37e1b96c94901f79a27da66ffe57fb80
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES(x86)%\Dravsynlether
Group: Malware file
Last Updated: April 30, 2016
%PROGRAMFILES%\Dravsynlether\Drvcoretsk.exe File name: Drvcoretsk.exe
Size: 380.91 KB (380912 bytes)
MD5: 65c91e728939e32f3e50a8ea3b61e577
Detection count: 9
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Dravsynlether
Group: Malware file
Last Updated: April 30, 2016
%PROGRAMFILES%\Dravsynlether\Drvcoresrv.exe File name: Drvcoresrv.exe
Size: 480.21 KB (480214 bytes)
MD5: d44b7c3ae931aff48b4ad6392a93a062
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Dravsynlether
Group: Malware file
Last Updated: April 30, 2016
%PROGRAMFILES%\Dravsynlether\Drvcoretsk.exe File name: Drvcoretsk.exe
Size: 522.2 KB (522204 bytes)
MD5: e43645c65045e3f59f6bd2e8385a7432
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Dravsynlether
Group: Malware file
Last Updated: April 30, 2016
%PROGRAMFILES%\Dravsynlether\Drvcoresrv.exe File name: Drvcoresrv.exe
Size: 380.61 KB (380615 bytes)
MD5: 00c260b00bd02470e717b9b2229b8116
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Dravsynlether
Group: Malware file
Last Updated: April 30, 2016
%PROGRAMFILES%\Dravsynlether\Drvcoresrv.exe File name: Drvcoresrv.exe
Size: 380.16 KB (380160 bytes)
MD5: 53f621a859cfdc598d972a5f690c09c8
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Dravsynlether
Group: Malware file
Last Updated: April 30, 2016
%PROGRAMFILES%\Dravsynlether\Drvcoretsk.exe File name: Drvcoretsk.exe
Size: 414.19 KB (414192 bytes)
MD5: 0cc857d6a62de30d6faaa96a5b88707c
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\Dravsynlether
Group: Malware file
Last Updated: April 30, 2016

Registry Modifications

The following newly produced Registry Values are:

File name without pathhttp_www.hohosearch.com_0.localstoragehttp_www.hohosearch.com_0.localstorage-journalRegexp file mask%WinDir%\System32\Tasks\Arahick Controls%WinDir%\System32\Tasks\Chaekgrewege Verfier%WinDir%\System32\Tasks\Pituward DebugerHKEY..\..\..\..{RegistryKeys}SOFTWARE\hohosearchSoftwareSoftware\Microsoft\Internet Explorer\DOMStorage\hohosearch.comSOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Arahick ControlsSOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Chaekgrewege VerfierSOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Pituward DebugerSOFTWARE\Wow6432Node\hohosearchSoftwareHKEY_LOCAL_MACHINE\Software\[APPLICATION]\Microsoft\Windows\CurrentVersion\Uninstall..{Uninstaller}Uninstall - amzUninstall - stoUninstall - wsy1

Additional Information

The following directories were created:
%PROGRAMFILES%\Anumle%PROGRAMFILES%\Arikoiedrumition%PROGRAMFILES%\Arkosshocult%PROGRAMFILES%\Atatuch%PROGRAMFILES%\Bleghtatake%PROGRAMFILES%\Bmotain%PROGRAMFILES%\Bodekmuocult%PROGRAMFILES%\Chaekgrewege%PROGRAMFILES%\Chuqospatureied%PROGRAMFILES%\Ckavesycwoy%PROGRAMFILES%\Ckodeingdrenigh%PROGRAMFILES%\Cluudomclwuse%PROGRAMFILES%\Clzghthupase%PROGRAMFILES%\Decoing%PROGRAMFILES%\Dravsynlether%PROGRAMFILES%\Gawosnuwose%PROGRAMFILES%\Gizotionghequle%PROGRAMFILES%\Hqationqwich%PROGRAMFILES%\Lattionmesos%PROGRAMFILES%\Lnspmekiing%PROGRAMFILES%\Menikwaesh%PROGRAMFILES%\Nvodrqotain%PROGRAMFILES%\Phenuther%PROGRAMFILES%\Phubish%PROGRAMFILES%\Ploftdrewother%PROGRAMFILES%\Puntehesy%PROGRAMFILES%\Pwtyfemuk%PROGRAMFILES%\Reeoentrveent%PROGRAMFILES%\Roktainheqes%PROGRAMFILES%\Rowicultshimash%PROGRAMFILES%\Shoruyjjsp%PROGRAMFILES%\Wohegh%PROGRAMFILES%\hohobnd%PROGRAMFILES(x86)%\Anumle%PROGRAMFILES(x86)%\Arikoiedrumition%PROGRAMFILES(x86)%\Arkosshocult%PROGRAMFILES(x86)%\Atatuch%PROGRAMFILES(x86)%\Bleghtatake%PROGRAMFILES(x86)%\Bmotain%PROGRAMFILES(x86)%\Bodekmuocult%PROGRAMFILES(x86)%\Chaekgrewege%PROGRAMFILES(x86)%\Chuqospatureied%PROGRAMFILES(x86)%\Ckavesycwoy%PROGRAMFILES(x86)%\Ckodeingdrenigh%PROGRAMFILES(x86)%\Cluudomclwuse%PROGRAMFILES(x86)%\Clzghthupase%PROGRAMFILES(x86)%\Decoing%PROGRAMFILES(x86)%\Dravsynlether%PROGRAMFILES(x86)%\Gawosnuwose%PROGRAMFILES(x86)%\Gizotionghequle%PROGRAMFILES(x86)%\Hqationqwich%PROGRAMFILES(x86)%\Lattionmesos%PROGRAMFILES(x86)%\Lnspmekiing%PROGRAMFILES(x86)%\Menikwaesh%PROGRAMFILES(x86)%\Nvodrqotain%PROGRAMFILES(x86)%\Phenuther%PROGRAMFILES(x86)%\Phubish%PROGRAMFILES(x86)%\Ploftdrewother%PROGRAMFILES(x86)%\Puntehesy%PROGRAMFILES(x86)%\Pwtyfemuk%PROGRAMFILES(x86)%\Reeoentrveent%PROGRAMFILES(x86)%\Roktainheqes%PROGRAMFILES(x86)%\Rowicultshimash%PROGRAMFILES(x86)%\Shoruyjjsp%PROGRAMFILES(x86)%\Wohegh%PROGRAMFILES(x86)%\hohobnd%ProgramFiles(x86)%\Pituward%ProgramFiles(x86)%\Prajdomreumit%ProgramFiles(x86)%\Witupygroqoph
The following URL's were detected:
, "hohosearch");hohosearch.com\
Loading...