Home Malware Programs Browser Hijackers Urlseek.vmn.net

Urlseek.vmn.net

Posted: September 22, 2011

Urlseek.vmn.net is a deceptive website and a part of malicious browser hijackers that change Internet browser settings and cause unwanted search redirections. Browser hijackers change search results in search engines such as Google, Yahoo!, Bing, etc. with Urlseek.vmn.net and other dubious websites, and then redirect to them. Browser hijackers related to Urlseek.vmn.net can control your web browsing activities and display annoying pop-up advertisements on your PC screen. They can also create strange new icons and desktop backgrounds on the affected machine and slow down PC performance. You should find a reputable anti-malware application in order to remove browser hijackers and stop redirects to Urlseek.vmn.net.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



C:\Windows\System32\drivers\etc\host\malicious domain of Urlseek.vmn.net File name: C:\Windows\System32\drivers\etc\host\malicious domain of Urlseek.vmn.net
Mime Type: unknown/net
%LocalAppData%\.dll of Urlseek.vmn.net File name: %LocalAppData%\.dll of Urlseek.vmn.net
Mime Type: unknown/net
%Temp%\[RANDOM CHARACTERS].exe of Urlseek.vmn.net File name: %Temp%\[RANDOM CHARACTERS].exe of Urlseek.vmn.net
Mime Type: unknown/net
%SystemRoot%\system32\drivers\etc\malicious domain of Urlseek.vmn.net File name: %SystemRoot%\system32\drivers\etc\malicious domain of Urlseek.vmn.net
Mime Type: unknown/net

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UACd.sysHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\4DW4R3HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\_VOIDd.sysHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\_VOIDHKEY_CURRENT_USER\\Software\Microsoft\Windows\CurrentVersion\Run "[RANDOM CHARACTERS].exe"
Loading...