Home Malware Programs Browser Hijackers Seekdns.com

Seekdns.com

Posted: November 7, 2011

Although Seekdns.com may seem like a useful site for web searches, Seekdns.com's real purpose isn't so benign – unlike actual search engines, Seekdns.com is coded to show you irrelevant, advertisement-filled spam sites that offer money to Seekdns.com for the exposure. Because Seekdns.com doesn't use the safety regulations that normal search engines are known for, contact with Seekdns.com or sites that Seekdns.com recommends can harm your PC. The prime form of damage that SpywareRemove.com malware researchers have noted in contact with Seekdns.com is its preference for utilizing browser-hijacking Trojans. These hijack attacks can redirect your web browser to Seekdns.com in a number of ways and should be considered a sign that your PC is seriously-infected. However, as long as you remove the browser hijacker with a competent PC security program and avoid future contact with Seekdns.com, your computer shouldn't be permanently-harmed by the experience.

Seekdns.com: the Search Engine with Only Rotten Links to Sell

Seekdns.com (also known as SeekDNS) has no visible differences from a real search engine, until you attempt to use Seekdns.com, at which point you'll find that Seekdns.com isn't giving you results that match your search query at all. These irrelevant search results drive revenue back to Seekdns.com, with the whole scam being shared among similar types of fake search engines, such as QuestDNS.com, BarQuery.com, Searchqu.com, Zumie.com, Zwankysearch.com, Ziniky.com, ZinkWink.com and QueryExplorer.com. Contact with these sites or Seekdns.com may cause your PC to be attacked by drive-by-download scripts that install browser hijackers or other PC threats, and SpywareRemove.com malware researchers advise against even short visits to Seekdns.com.

If you think that your PC might be infected with a Trojan that uses browser hijacks for Seekdns.com, you'll be able to identify it by watching for symptoms like the ones below:

  • Redirects to Seekdns.com when you try to use a search engine or other website. This remains true even if Seekdns.com only acts in the form of a filter that changes your search results, instead of being the final destination of a browser redirect attack.
  • Changed homepage or new page settings that make Seekdns.com display by default.
  • Browser settings that refuse to return to normal, either by reversing changes that you make or by refusing to allow you to make changes in the first place.

What You Should Really Be Seeking – the Cure to Seekdns.com

Browser hijackers for Seekdns.com can attack Chrome, Firefox and other web browsers with few problems, and appropriate removal methods should never involve removing your web browser. However, suitable anti-malware software can find and delete Trojans that cause browser redirects to Seekdns.com, as long as you use a competent program that's equipped with any required database updates.

Keeping your PC from being attacked by Seekdns.com is even easier than removing an infection that's related to Seekdns.com. SpywareRemove.com malware experts recommend that you avoid the malicious sites noted earlier, as well as executable files from suspicious sources (such as certain P2P networks and questionable software websites). Strong security settings for your browser can also prevent Seekdns.com and other sites from installing browser hijackers without your permission, and keeping scripts disabled by default will greatly reduce the vulnerabilities that are present in your browser.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%AppData%SeekDNScouponsmerchants2.xml File name: %AppData%SeekDNScouponsmerchants2.xml
Mime Type: unknown/xml
%AppData%SeekDNScouponsmerchants.xml File name: %AppData%SeekDNScouponsmerchants.xml
Mime Type: unknown/xml
%AppData%SeekDNScouponscategories.xml File name: %AppData%SeekDNScouponscategories.xml
Mime Type: unknown/xml
%Temp%SeekDNS-manifest.xml File name: %Temp%SeekDNS-manifest.xml
Mime Type: unknown/xml
%AppData%SeekDNSversion.xml File name: %AppData%SeekDNSversion.xml
Mime Type: unknown/xml
%AppData%SeekDNSlog.txt File name: %AppData%SeekDNSlog.txt
Mime Type: unknown/txt
%AppData%SeekDNSguid.dat File name: %AppData%SeekDNSguid.dat
File type: Data file
Mime Type: unknown/dat
%AppData%SeekDNSdtx.ini File name: %AppData%SeekDNSdtx.ini
Mime Type: unknown/ini
%AppData%SeekDNSuninstallStatIE.dat File name: %AppData%SeekDNSuninstallStatIE.dat
File type: Data file
Mime Type: unknown/dat
%AppData%SeekDNSuninstallIE.dat File name: %AppData%SeekDNSuninstallIE.dat
File type: Data file
Mime Type: unknown/dat
%AppData%SeekDNSstats.dat File name: %AppData%SeekDNSstats.dat
File type: Data file
Mime Type: unknown/dat
%AppData%SeekDNSstat.log File name: %AppData%SeekDNSstat.log
Mime Type: unknown/log
%AppData%SeekDNSpreferences.dat File name: %AppData%SeekDNSpreferences.dat
File type: Data file
Mime Type: unknown/dat

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{99079a25-328f-4bd4-be04-00955acaa0a7} "QueryExplorer QueryExplorer Toolbar"HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{A40DC6C5-79D0-4ca8-A185-8FF989AF1115}ProgID "QueryExplorerIEHelper.UrlHelper.1"HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{A40DC6C5-79D0-4ca8-A185-8FF989AF1115} "UrlHelper Class"HKEY_LOCAL_MACHINESOFTWAREClassesQueryExplorerIEHelper.DNSGuardCurVerHKEY_LOCAL_MACHINESOFTWAREClassesQueryExplorerIEHelper.DNSGuardCLSIDHKEY_LOCAL_MACHINESOFTWAREClassesQueryExplorerIEHelper.DNSGuardHKEY_LOCAL_MACHINESOFTWAREClassesCLSID{99079a25-328f-4bd4-be04-00955acaa0a7}InprocServer32 "C:PROGRA~1WINDOW~4ToolBarQueryExplorerdtx.dll"HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{99079a25-328f-4bd4-be04-00955acaa0a7} "QueryExplorer Toolbar"HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{A40DC6C5-79D0-4ca8-A185-8FF989AF1115}VersionIndependentProgID "QueryExplorerIEHelper.UrlHelper"HKEY_LOCAL_MACHINESOFTWAREClassesQueryExplorerIEHelper.DNSGuard.1HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerToolbar "QueryExplorer Toolbar"
Loading...