Social2Search Ads
Posted: May 5, 2016
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Ranking: | 7,025 |
|---|---|
| Threat Level: | 2/10 |
| Infected PCs: | 501,387 |
| First Seen: | May 5, 2016 |
|---|---|
| Last Seen: | February 28, 2025 |
| OS(es) Affected: | Windows |
Social2Search is a deceptive ad-based extension that may be attached to Google Chrome, Mozilla Firefox and Internet Explorer. Social2Search has been created by the same developers who stand behind another questionable adware named Wajam. Social2Search promises to optimize your searches by including results that your friends share on the social platforms. In fact, however, this suspicious application shows sponsored links that will take you to affiliated third-party domains. As every other ad-oriented plugin, Social2Search may generate revenues for its developers by redirecting the PC user to partners. The owners of these promoted sites are willing to pay referral commissions in exchange for the increased popularity, which Social2Search provides. Unfortunately, the process may not be beneficial to the unsuspecting person, who may face various problems. First of all, you should know that very often the computer users may not download Social2Search intentionally from its official page. Social2Search may sneak in while you install third-party freeware, which may contain no harmful codes whatsoever. If you perform the process via the 'Advanced' menu, you should be able to prevent the loading of all additional components that you don't want in your system. If you use the 'Quick' guide or don't read details, Social2Search may attach towards all of your Web clients. This questionable application may inject different commercial materials. As you go to your favorite sites, you may detect abnormally high quantities of pop-ups, banners, interstitial ads or even videos that launch automatically. The marketing elements may be coupons or some special offers. Surprisingly, some of them may seem accurate to your desires because the adware may access your surfing history. Social2Search also may fill search engines with numerous sponsored links. It may not be a good idea to click on these ads because some of the affiliated domains may be fraudulent or threatening. Instead, you should use a dedicated anti-malware solution to eliminate the adware efficiently.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%SYSTEMDRIVE%\Sandbox\jean\DefaultBox\drive\C\Program Files\MmVmYTh\NmI1MTA4NjZ.exe
File name: NmI1MTA4NjZ.exeSize: 1.85 MB (1850296 bytes)
MD5: 210ec7058fd0935ebbe04fa9c827f36a
Detection count: 5,602
File type: Executable File
Mime Type: unknown/exe
Path: %SYSTEMDRIVE%\Sandbox\jean\DefaultBox\drive\C\Program Files\MmVmYTh\NmI1MTA4NjZ.exe
Group: Malware file
Last Updated: September 15, 2022
%PROGRAMFILES%\otiwnjkyzdi4ow\ztuym2fiy2nmzdq2mtz.exe
File name: ztuym2fiy2nmzdq2mtz.exeSize: 419.09 KB (419096 bytes)
MD5: 2e63aa7b477cbeb908b060d74fe951a1
Detection count: 4,473
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\otiwnjkyzdi4ow
Group: Malware file
Last Updated: April 4, 2020
%WINDIR%\system32\drivers\yza1nja4mtfjnmrho
File name: yza1nja4mtfjnmrhoSize: 313.56 KB (313560 bytes)
MD5: 9c1a30e718409b8c96b967f274a689c0
Detection count: 89
Path: %WINDIR%\system32\drivers\yza1nja4mtfjnmrho
Group: Malware file
Last Updated: July 23, 2022
C:\Program Files\baa2f84f87196d85f305f8909683ba59\fd19cca32755b0a369e1e36d0cd6a149.exe
File name: fd19cca32755b0a369e1e36d0cd6a149.exeSize: 2.73 MB (2732544 bytes)
MD5: 983867180e048720b2d5bffd32f9b85f
Detection count: 73
File type: Executable File
Mime Type: unknown/exe
Path: C:\Program Files\baa2f84f87196d85f305f8909683ba59\fd19cca32755b0a369e1e36d0cd6a149.exe
Group: Malware file
Last Updated: September 26, 2021
%PROGRAMFILES%\7be2ffaef2e91b262162e8ac91e56fb6\68b20a99a97d4cd539cac9db32df97d5.exe
File name: 68b20a99a97d4cd539cac9db32df97d5.exeSize: 341.5 KB (341504 bytes)
MD5: adf33abf586bd69bbd60a03161482d5a
Detection count: 37
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\7be2ffaef2e91b262162e8ac91e56fb6
Group: Malware file
Last Updated: June 8, 2020
%PROGRAMFILES%\3ba3282704c301081e188f7e7f956ccf\ef0efd9a024078244c9e31939d5c4846.exe
File name: ef0efd9a024078244c9e31939d5c4846.exeSize: 736.25 KB (736256 bytes)
MD5: 879823f0a9fa05459f47384b771f779c
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\3ba3282704c301081e188f7e7f956ccf
Group: Malware file
Last Updated: April 18, 2020
C:\Program Files (x86)\Panda Security\Panda Security Protection\OggettiSmarriti\a12d9e740549a26fe9eea5cb052c55eb.exe
File name: a12d9e740549a26fe9eea5cb052c55eb.exeSize: 1.58 MB (1582080 bytes)
MD5: deb85c14a6f441591b4b4e39247ee9fb
Detection count: 30
File type: Executable File
Mime Type: unknown/exe
Path: C:\Program Files (x86)\Panda Security\Panda Security Protection\OggettiSmarriti\a12d9e740549a26fe9eea5cb052c55eb.exe
Group: Malware file
Last Updated: December 11, 2022
%PROGRAMFILES%\86ac3b8ed81815160ba6c8d5798df68c\668d80fbed3a9244e6953ceb861cda08.exe
File name: 668d80fbed3a9244e6953ceb861cda08.exeSize: 1.57 MB (1578496 bytes)
MD5: a73d9b71a260267ff2ec3dc7fb1e523e
Detection count: 23
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\86ac3b8ed81815160ba6c8d5798df68c
Group: Malware file
Last Updated: September 23, 2017
%PROGRAMFILES%\f758e0a110bdd10dfc179e34c0892527\125d3533f75d50131b00f9f699d0efbe.exe
File name: 125d3533f75d50131b00f9f699d0efbe.exeSize: 3.56 MB (3569664 bytes)
MD5: 17e4dd371ed8b1fd9b627381fed38f2e
Detection count: 23
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\f758e0a110bdd10dfc179e34c0892527
Group: Malware file
Last Updated: June 16, 2019
%PROGRAMFILES%\67633843c3fceb9e455fb548c7bc8a18\e2ac56d47e4ce3cbcf4300114b31ab58.exe
File name: e2ac56d47e4ce3cbcf4300114b31ab58.exeSize: 1.85 MB (1857536 bytes)
MD5: 165c37faaea832f1c90e16af1fa95f70
Detection count: 21
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\67633843c3fceb9e455fb548c7bc8a18
Group: Malware file
Last Updated: February 8, 2020
%PROGRAMFILES%\9c1b8cc56b2ad0cb31083eb9223fe51f\b7701bc79ce4f1f81c9db63ff110219e.exe
File name: b7701bc79ce4f1f81c9db63ff110219e.exeSize: 1.06 MB (1060352 bytes)
MD5: ea391021952ecc7ce73446b9a3724776
Detection count: 16
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\9c1b8cc56b2ad0cb31083eb9223fe51f
Group: Malware file
Last Updated: September 23, 2017
%PROGRAMFILES%\39e16b87b4b25db46ecd2511a91233b8\c6392fab173c40835e01a31a80ae4836.exe
File name: c6392fab173c40835e01a31a80ae4836.exeSize: 1.91 MB (1916928 bytes)
MD5: 1d1487d8d660e925971a081b36c890da
Detection count: 16
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\39e16b87b4b25db46ecd2511a91233b8
Group: Malware file
Last Updated: September 23, 2017
%PROGRAMFILES%\3b09f902c7e198d47a718922b02a4280\4d6ab93f695b26b39f283f5572e7292e.exe
File name: 4d6ab93f695b26b39f283f5572e7292e.exeSize: 1.5 MB (1505280 bytes)
MD5: ecd8aad0af72a53550a86190447598d6
Detection count: 16
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\3b09f902c7e198d47a718922b02a4280
Group: Malware file
Last Updated: September 23, 2017
%PROGRAMFILES%\87f980459eb1b8348290e580e3dbdaa8\636c7e7bef0c72fdd38d9d94a63783d0.exe
File name: 636c7e7bef0c72fdd38d9d94a63783d0.exeSize: 671.74 KB (671744 bytes)
MD5: 44ad2ae9cefa41532f0497e3db87d10d
Detection count: 16
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\87f980459eb1b8348290e580e3dbdaa8
Group: Malware file
Last Updated: September 23, 2017
%PROGRAMFILES%\7c0b79748863f13ba87dc7257c607e6f\a4c0530ce675ef1f7f4cef0dbe38a5bd.exe
File name: a4c0530ce675ef1f7f4cef0dbe38a5bd.exeSize: 913.4 KB (913408 bytes)
MD5: 5be49974b7a34817bb364b3304adef35
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\7c0b79748863f13ba87dc7257c607e6f
Group: Malware file
Last Updated: September 23, 2017
%PROGRAMFILES%\d044fcbcfe5ea4f33fdff4eedf2a8fa2\dc3825f603457f6755bba9db5e752f0f.exe
File name: dc3825f603457f6755bba9db5e752f0f.exeSize: 636.41 KB (636416 bytes)
MD5: d4fe8578a83e3e4082f544c92a4d8b37
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\d044fcbcfe5ea4f33fdff4eedf2a8fa2
Group: Malware file
Last Updated: September 23, 2017
%PROGRAMFILES%\e8e529bc584c9baed3e1afad65b0f649\da8940d6476d1b77a02b7030c621bc0e.exe
File name: da8940d6476d1b77a02b7030c621bc0e.exeSize: 1.78 MB (1780736 bytes)
MD5: d87a7c2bed2e1579091c791989f11b95
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\e8e529bc584c9baed3e1afad65b0f649
Group: Malware file
Last Updated: September 23, 2017
%TEMP%\s2s.exe
File name: s2s.exeSize: 6.61 MB (6611456 bytes)
MD5: 36cbe3c24f109e82de3a876ae51f624c
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%
Group: Malware file
Last Updated: August 9, 2017
%PROGRAMFILES%\b7d53f1eca9e0a9792d001e4b7e90928\c945625726294798a561a7ca44fd51eb.exe
File name: c945625726294798a561a7ca44fd51eb.exeSize: 993.79 KB (993792 bytes)
MD5: e98844feb5377196c2c1a3bad186552d
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Path: %PROGRAMFILES%\b7d53f1eca9e0a9792d001e4b7e90928
Group: Malware file
Last Updated: September 23, 2017
More files
Registry Modifications
File name without pathhttp_www.technologietrudeau.com_0.localstoragehttp_www.technologietrudeau.com_0.localstorage-journalhttp_www.technologieyvonlheureux.com_0.localstoragehttp_www.technologieyvonlheureux.com_0.localstorage-journaltechnologiecartier[1].xmltechnologiemounac[1].xmlwww.technologietrudeau[1].xmlwww.technologieyvonlheureux[1].xmlHKEY..\..\..\..{RegistryKeys}SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\technologiecartier.comSOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\technologiemounac.comSOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\technologietrudeau.comSOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\technologieyvonlheureux.comSOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.technologietrudeau.comSOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.technologieyvonlheureux.comSOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\technologiecartier.comSOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\technologiemounac.comSOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\technologietrudeau.comSOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\technologieyvonlheureux.comSOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.technologietrudeau.comSOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.technologieyvonlheureux.comSoftware\Microsoft\Internet Explorer\DOMStorage\technologiecartier.comSoftware\Microsoft\Internet Explorer\DOMStorage\technologiemounac.comSOFTWARE\Microsoft\Internet Explorer\DOMStorage\technologietrudeau.comSoftware\Microsoft\Internet Explorer\DOMStorage\technologieyvonlheureux.comSOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.technologietrudeau.comSoftware\Microsoft\Internet Explorer\DOMStorage\www.technologieyvonlheureux.comSOFTWARE\Microsoft\Internet Explorer\LowRegistry\DOMStorage\technologieyvonlheureux.comSOFTWARE\Microsoft\Internet Explorer\LowRegistry\DOMStorage\www.technologieyvonlheureux.comSOFTWARE\Soci2Sear Browser EnhancerSOFTWARE\Socia2S Browser EnhancerSOFTWARE\Socia2Se Browser EnhancerSOFTWARE\Socia2Sea Browser EnhancerSOFTWARE\Socia2SearSOFTWARE\Socia2SearcSOFTWARE\Socia2SearchSOFTWARE\Social2SSOFTWARE\Social2S Browser EnhancerSOFTWARE\Social2SeSOFTWARE\Social2SeaSOFTWARE\Social2Sear Browser EnhancerSOFTWARE\Wow6432Node\Soci2Sear Browser EnhancerSOFTWARE\Wow6432Node\Socia2S Browser EnhancerSOFTWARE\WOW6432Node\Socia2Se Browser EnhancerSOFTWARE\WOW6432Node\Socia2Sea Browser EnhancerSOFTWARE\WOW6432Node\Socia2SearSOFTWARE\Wow6432Node\Socia2SearcSOFTWARE\Wow6432Node\Socia2SearchSOFTWARE\Wow6432Node\Social2SSOFTWARE\Wow6432Node\Social2S Browser EnhancerSOFTWARE\Wow6432Node\Social2SeSOFTWARE\Wow6432Node\Social2SeaSOFTWARE\Wow6432Node\Social2Sear Browser Enhancer
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.