Exterminate It! Antimalware

malpedia

Known threats:698,172 Last Update:April 28, 11:39

Testimonials

Just a quick word to say thanks. After trying unsuccessfully to remove some stubborn trojans with various other tools, Exterminate It has done the trick!

Nice work!

Nicola

SearchAwesome

How to Remove SearchAwesome from Your Computer

To completely purge SearchAwesome from your computer, you need to delete the Windows registry keys and registry values associated with SearchAwesome. These registry keys and values are respectively listed in the Registry Keys and Registry Values sections on this page.

For instructions on deleting the SearchAwesome registry keys and registry values, see the following section How to Remove SearchAwesome from the Windows Registry.

How to Remove SearchAwesome from the Windows Registry^

The Windows registry stores important system information such as system preferences, user settings and installed programs details as well as the information about the applications that are automatically run at start-up. Because of this, spyware, malware and adware often store references to their own files in your Windows registry so that they can automatically launch every time you start up your computer.

To effectively remove SearchAwesome from your Windows registry, you must delete all the registry keys and values associated with SearchAwesome, which are listed in the Registry Keys and Registry Values sections on this page.

IMPORTANT: Because the registry is a core component of your Windows system, it is strongly recommended that you back up the registry before you begin deleting keys and values. For information about backing up the Windows registry, refer to the Registry Editor online help.

To remove the SearchAwesome registry keys and values:

  1. On the Windows Start menu, click Run.
  2. In the Open box, type regedit and click OK.
    The Registry Editor window opens. This window consists of two panes. The left pane displays folders that represent the registry keys arranged in hierarchical order. The right one lists the registry values of the currently selected registry key.
  3. To delete each registry key listed in the Registry Keys section, do the following:
    • Locate the key in the left pane of the Registry Editor window by sequentially expanding the folders according to the path indicated in the Registry Keys section. For example, if the path of a registry key is
      HKEY_LOCAL_MACHINE\software\FolderA\FolderB\KeyName1
      sequentially expand the HKEY_LOCAL_MACHINE, software, FolderA and FolderB folders.
    • Select the key name indicated at the end of the path (KeyName1 in the example above).
    • Right-click the key name and select Delete on the menu.
    • Click Yes in the Confirm Key Delete dialog box.
  4. To delete each registry value listed in the Registry Values section, do the following:
    • Display the value in the right pane of the Registry Editor window by sequentially expanding the folders in the left pane according to the path indicated in the Registry Values section and selecting the specified key name. For example, if the path of a registry value is
      HKEY_LOCAL_MACHINE\software\FolderA\FolderB\KeyName2,valueC=
      sequentially expand the HKEY_LOCAL_MACHINE, software, FolderA and FolderB folders and select the KeyName2 key to display the valueC value in the right pane.
    • In the right pane, select the value name indicated after a comma at the end of the path (valueC in the example above).
    • Right-click the value name and select Delete on the menu.
    • Click Yes in the Confirm Value Delete dialog box.
Registry Keys
HKEY_LOCAL_MACHINE\SOFTWARE\SrcAAAesom Browser Enhancer
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\SrcAAAesom Browser Enhancer
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\951442082cce56429b16808b176e3048
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\807a4492119f6f2336e5295bc9961a0c
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\e69814b5178198282e747a4cba671e23
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\9f0099f0b39bf1a49c511383fc4248df
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\bbdaa42394b9dba036c8f690be05719b
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\886f99ef9288cda63f80746a4a6c4456
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\c4cb281391271d31ab131205bdad4552
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\3ce73d3ecff7a2ab2da701e49e2239f4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\0bc30ceedb5194aa8bed34710c2b7065
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\697998bcaa3a8a0270a493fd119da660
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\a3d4f4d7a1414bdfc76131fb827ef1eb
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\8b9697c98e8e40530b0b65f48983daa7
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\a4c53541d340434736ebca0527b65f16
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\8300f731203822b45d946b774536fa51
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\c63714abeb5185daef6a0dfcc6220e5c
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\5308d5c66b2912cbcb8c4ffe39504ab1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\906a412d30678a65c81dac9a7cc5d815
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\19919bed60c7c645ae674c0c0188350a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\eeac32c4b9d5d5e253ed9a5ce3d21aef
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\581ad944adde4d65d63109823b8077b8
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\4b5300904e3abc525d84a44d7e3a4981
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\0316dbe83a961c8e8778151b4a337cee
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\c34edd69c7d42c71efba00730743cdfc
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\9f9b75c6bed475e686505317bae7e504
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\1bde8d9cfcd1c7d9af231979cd3184d1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ee6877f87f813a26b8a3d8b590e2bf77
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\d2d43c514be8f6cac465bcfc95eb17f9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\8c17714783b310424014bc548adeb995
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\d72c1bb29fea491e51ddd162271204ea
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\1e3e3cbb19d44b3426a6b3b72d6c6eb0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\6e4f258364d8123ead9cc412c40d1498
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\8ba4c8ef3fe3a9ddba834f96f621267d
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\d4048ffaa642fa257e2b08e0395a52ff
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\4e9b181e7098f557a6d605000a12f1ec
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\a21ebb2837037086b9e39ad74a777aea
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\c272b18925bb87e2a9fdf332672abcf0
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\6000f8d0524b69f5f4383c3288ab8521
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\f57d2e1f908b37b58ee37e025a05c861
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\6ee77aaf3d42949f5b838cdcd007829f
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\0581d3a95fda69f794aa0a77b47850d1
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\1f8ec5279d83f3ef2000a46220e445aa
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\6969db64346b39548928470bef536e9a

Adware

Software that is designed to launch advertisements, frequently pop-up ads, on a user’s computer and/or to redirect search results to promotional Web sites. Adware programs are often built into freeware or shareware programs, where the adware creates an indirect ‘charge’ for using the free program. Sometimes a trojan can silently download an adware program from a Web site and install it onto a user’s machine.

Hacker tools, or Browser Hijackers, can also download an adware program by exploiting a web browser’s vulnerability. Browser Hijackers may tamper with the browser settings, redirect incorrect or incomplete URLs to unwanted Web sites, or change the default home page. They can also re-direct a user’s searches to “pay-to-view” (often pornographic) Web sites.

Typically, many adware programs do not leave any marks of their presence in the system: they are not listed on Start | Programs; they add no icons to the system tray; and they don’t show up on the task list. In addition, adware programs seldom provide an uninstallation procedure, and attempts at manually removing them frequently result in failure of the original carrier program.

Be Aware of the Following Adware Threats:

SmartBrowser, ESDIexplorr, DivX.Pro, ShopAtHomeSelect, Teleasp.

How Did My PC Get Infected with SearchAwesome?^

The following are the most likely reasons why your computer got infected with SearchAwesome:

  • Your operating system and Web browser's security settings are too lax.
  • You are not following safe Internet surfing and PC practices.

Downloading and Installing Freeware or Shareware

Small-charge or free software applications may come bundled with spyware, adware, or programs like SearchAwesome. Sometimes adware is attached to free software to enable the developers to cover the overhead involved in created the software. Spyware frequently piggybacks on free software into your computer to damage it and steal valuable private information.

Using Peer-to-Peer Software

The use of peer-to-peer (P2P) programs or other applications using a shared network exposes your system to the risk of unwittingly downloading infected files, including malicious programs like SearchAwesome.

Visiting Questionable Web Sites

When you visit sites with dubious or objectionable content, trojans-including SearchAwesome, spyware and adware, may well be automatically downloaded and installed onto your computer.

Detecting SearchAwesome^

The following symptoms signal that your computer is very likely to be infected with SearchAwesome:

PC is working very slowly

SearchAwesome can seriously slow down your computer. If your PC takes a lot longer than normal to restart or your Internet connection is extremely slow, your computer may well be infected with SearchAwesome.

New desktop shortcuts have appeared or the home page has changed

SearchAwesome can tamper with your Internet settings or redirect your default home page to unwanted web sites. SearchAwesome may even add new shortcuts to your PC desktop.

Annoying popups keep appearing on your PC

SearchAwesome may swamp your computer with pestering popup ads, even when you're not connected to the Internet, while secretly tracking your browsing habits and gathering your personal information.

E-mails that you didn't write are being sent from your mailbox

SearchAwesome may gain complete control of your mailbox to generate and send e-mail with virus attachments, e-mail hoaxes, spam and other types of unsolicited e-mail to other people.