Home Malware Programs Potentially Unwanted Programs (PUPs) Internet Speed Checker

Internet Speed Checker

Posted: December 4, 2014

Threat Metric

Ranking: 10,459
Threat Level: 1/10
Infected PCs: 1,180
First Seen: December 4, 2014
Last Seen: October 9, 2023
OS(es) Affected: Windows

Internet Speed Checker is an adware-related application that usually installs itself as a browser add-on, extension or plugin. Internet Speed Checker is designed and published by Sailor Project. Internet Speed Checker is known to start itself automatically and uses the Crossrider toolbar framework. Once installed, Internet Speed Checker may change your homepage and default search engine. Advertisements generated by Internet Speed Checker are not related to the underlying website you are looking at, still they are always from websites that you frequently visit. This is because adware-related applications such as Internet Speed Checker are enabled to track browsing history. It is important to note that in case you decide to uninstall Internet Speed Checker, it may reinstall itself again.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:

008830de-5746-4342-944a-ba3221a38c8c-11.exe File name: 008830de-5746-4342-944a-ba3221a38c8c-11.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
C:\Program Files\internet speed checker\utils.exe File name: C:\Program Files\internet speed checker\utils.exe
MD5: 770c0268f97db97b8a626c23bccb0b84
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
008830de-5746-4342-944a-ba3221a38c8c-2.exe File name: 008830de-5746-4342-944a-ba3221a38c8c-2.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Additional Information

The following URL's were detected: