Isschmon Spyware Profile

Isschmon is a multifaceted spyware program.  It was first discovered in September 16 of 2006.

It has Dialer, Downloader, and Browser Hijacking capabilities.  It can dial expensive long distance numbers, download updates or other files onto your computer, and it can redirect your browser and reset its home page.

If you are infected with this spyware, you should remove it with ZookaWare PC Cleaner immediately.

Also Known As:
Adware.Agent.ak, Trojan.Adclicker (PC Tools),
not-a-virus.AdWare.Win32.Agent.ak,
Generic Downloader.t (McAfee),
WORM_AUTORUN.AQQ (Trend Micro)

Spyware Type: Dialer, Browser Hijacker, Trojan Downloader

Associated Files:
%windir%system32ntdll.dll
%windir%system32kernel32.dll
%windir%system32advapi32.dll
%windir%system32rpcrt4.dll
%windir%system32mfc42.dll
%windir%system32msvcrt.dll
%windir%system32gdi32.dll
%windir%system32user32.dll
%windir%system32shell32.dll
%windir%system32shlwapi.dll
%windir%system32vsmvhk.dll
%windir%winsxsx86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9
%windir%system32oleaut32.dll
%windir%system32ole32.dll
%windir%system32wsock32.dll
%windir%system32ws2_32.dll
%windir%system32ws2help.dll
%windir%system32pstorec.dll
%windir%system32atl.dll
%windir%system32wship6.dll
%windir%system32secur32.dll
kernel32.dll
advapi32.dll
mfc42.dll
msvcrt.dll
shell32.dll
user32.dll
ole32.dll
%windir%system32lsmgr.dll
Copies:  (random name).exe to diskcheck.exe
Copies:  (random name).exe to system32/explore.exe
%systemdrive%autorun.inf – ( 121 Bytes )
Md5 :47ef3d279a499ea47dfb0c46e18b4629
%systemdrive%autorun.inf – ( 84 Bytes )
Md5 :8059049d6144b41bb20a8fb3fa4a6027
%workingdir%[RandomName].exe – ( 213017 Bytes )
Md5 :04e7f3c1136e6f696c8586898f1c437b
%workingdir%2dca677e.exe – ( 213009 Bytes )
Md5 :3fd7f6966eb3e7ebf70f421ba9e5e7b5
%workingdir%[RandomName].exe – ( 208896 Bytes )
Md5 :2dd5188c442ef3e199c07a90fcf2c6d8
%workingdir%[RandomName].exe – ( 212992 Bytes )
Md5 :39779148babf38da7038af376b681b9c
%workingdir%3c8990b7.exe – ( 213015 Bytes )
Md5 :b00201c7905664f2c68c2ae0d91f3e18
%workingdir%[RandomName].exe – ( 121347 Bytes )
Md5 :520858d864bf2237c5ed45c9a658f79f
%workingdir%[RandomName].exe – ( 213011 Bytes )
Md5 :54213b90b64b7b018eb063d559d0d497
%workingdir%5a8abbc5.exe – ( 213013 Bytes )
Md5 :902998e4e7b2299946592d595f2ad12e
%workingdir%71f1001b.exe – ( 213022 Bytes )
Md5 :360eb33a8e101fd98c43029d4492895f
%workingdir%[RandomName].exe – ( 213008 Bytes )
Md5 :8ae0cf18919a3eca4d89db25ba16d73c
%workingdir%9d30ad99.exe – ( 213011 Bytes )
Md5 :54213b90b64b7b018eb063d559d0d497
%workingdir%a6d0070a.exe – ( 213010 Bytes )
Md5 :62237dd7e06e41e4ab4a14a1fb82ca29
%workingdir%aa67f14a.exe – ( 213007 Bytes )
Md5 :8140196203078c8740b201a8abf78864
%workingdir%b9e13240.exe – ( 213014 Bytes )
Md5 :0533f84308046667ad467b705fe635e7
%workingdir%cbabd8d6.exe – ( 213017 Bytes )
Md5 :04e7f3c1136e6f696c8586898f1c437b
%workingdir%[RandomName].exe – ( 94208 Bytes )
Md5 :cd5f9fbaec8307a9e7f748e0de149a22
%workingdir%da16131b.exe – ( 213012 Bytes )
Md5 :3d0685251b247f8baa9935ddad70e992
%workingdir%ea4c9c5b.exe – ( 213008 Bytes )
Md5 :8ae0cf18919a3eca4d89db25ba16d73c
%systemdrive%diskcheck.exe – ( 94208 Bytes )
Md5 :cd5f9fbaec8307a9e7f748e0de149a22
%windir%system32explore.exe – ( 94208 Bytes )
Md5 :cd5f9fbaec8307a9e7f748e0de149a22
%windir%system32iesysicon.ico – ( 894 Bytes )
Md5 :bd37cc34518b92e673dbe3ed15ddc268
%windir%system32lsmgr.dll – ( 155648 Bytes )
Md5 :5de3c84eac48c365e1a9b7ef4ce9813b
HKEY_CLASSES_ROOTCLSID{B10343BD-1DC6-442f-9BA2-D44C708CEE83}
HKEY_CLASSES_ROOTCLSID{B10343BD-1DC6-442f-9BA2-D44C708CEE83}InprocServer32
HKEY_CLASSES_ROOTCLSID{B10343BD-1DC6-442f-9BA2-D44C708CEE83}ProgID
HKEY_CLASSES_ROOTCLSID{B10343BD-1DC6-442f-9BA2-D44C708CEE83}Programmable
HKEY_CLASSES_ROOTCLSID{B10343BD-1DC6-442f-9BA2-D44C708CEE83}TypeLib
HKEY_CLASSES_ROOTCLSID{B10343BD-1DC6-442f-9BA2-D44C708CEE83}VersionIndependentProgID
HKEY_CLASSES_ROOTCLSID{E85DEA9A-826B-4a47-963A-5287968D7C0E}
HKEY_CLASSES_ROOTCLSID{E85DEA9A-826B-4a47-963A-5287968D7C0E}InprocServer32
HKEY_CLASSES_ROOTCLSID{E85DEA9A-826B-4a47-963A-5287968D7C0E}ProgID
HKEY_CLASSES_ROOTCLSID{E85DEA9A-826B-4a47-963A-5287968D7C0E}Programmable
HKEY_CLASSES_ROOTCLSID{E85DEA9A-826B-4a47-963A-5287968D7C0E}TypeLib
HKEY_CLASSES_ROOTCLSID{E85DEA9A-826B-4a47-963A-5287968D7C0E}VersionIndependentProgID
HKEY_CLASSES_ROOTDriveshellopencommand
HKEY_CLASSES_ROOTInterface{1FC812F7-F0D0-4F97-86E3-948DEBA253AB}
HKEY_CLASSES_ROOTInterface{1FC812F7-F0D0-4F97-86E3-948DEBA253AB}ProxyStubClsid
HKEY_CLASSES_ROOTInterface{1FC812F7-F0D0-4F97-86E3-948DEBA253AB}ProxyStubClsid32
HKEY_CLASSES_ROOTInterface{1FC812F7-F0D0-4F97-86E3-948DEBA253AB}TypeLib
HKEY_CLASSES_ROOTInterface{B2FE3737-414D-4C3D-ABD3-59F519C0CDA6}
HKEY_CLASSES_ROOTInterface{B2FE3737-414D-4C3D-ABD3-59F519C0CDA6}ProxyStubClsid
HKEY_CLASSES_ROOTInterface{B2FE3737-414D-4C3D-ABD3-59F519C0CDA6}ProxyStubClsid32
HKEY_CLASSES_ROOTInterface{B2FE3737-414D-4C3D-ABD3-59F519C0CDA6}TypeLib
HKEY_CLASSES_ROOTlsmgr.mssgr
HKEY_CLASSES_ROOTlsmgr.mssgr.1
HKEY_CLASSES_ROOTmsissch.isschmon
HKEY_CLASSES_ROOTmsissch.isschmon.2
HKEY_CLASSES_ROOTmsissch.isschmon.2CLSID
HKEY_CLASSES_ROOTmsissch.isschmonCLSID
HKEY_CLASSES_ROOTmsissch.isschmonCurVer
HKEY_CLASSES_ROOTmssconime.conimehlp
HKEY_CLASSES_ROOTmssconime.conimehlp.1
HKEY_CLASSES_ROOTmssconime.conimehlp.1CLSID
HKEY_CLASSES_ROOTmssconime.conimehlpCLSID
HKEY_CLASSES_ROOTmssconime.conimehlpCurVer
HKEY_CLASSES_ROOTTypeLib{AF5EE4B8-BFCE-47CE-AD2B-CB91ED9FEEFA}
HKEY_CLASSES_ROOTTypeLib{AF5EE4B8-BFCE-47CE-AD2B-CB91ED9FEEFA}1.0
HKEY_CLASSES_ROOTTypeLib{AF5EE4B8-BFCE-47CE-AD2B-CB91ED9FEEFA}1.0
HKEY_CLASSES_ROOTTypeLib{AF5EE4B8-BFCE-47CE-AD2B-CB91ED9FEEFA}1.0win32
HKEY_CLASSES_ROOTTypeLib{AF5EE4B8-BFCE-47CE-AD2B-CB91ED9FEEFA}1.0FLAGS
HKEY_CLASSES_ROOTTypeLib{AF5EE4B8-BFCE-47CE-AD2B-CB91ED9FEEFA}1.0HELPDIR
HKEY_CLASSES_ROOTTypeLib{E272567E-CDFF-4106-AD06-B7AA8CF704D9}
HKEY_CLASSES_ROOTTypeLib{E272567E-CDFF-4106-AD06-B7AA8CF704D9}1.0
HKEY_CLASSES_ROOTTypeLib{E272567E-CDFF-4106-AD06-B7AA8CF704D9}1.0
HKEY_CLASSES_ROOTTypeLib{E272567E-CDFF-4106-AD06-B7AA8CF704D9}1.0win32
HKEY_CLASSES_ROOTTypeLib{E272567E-CDFF-4106-AD06-B7AA8CF704D9}1.0FLAGS
HKEY_CLASSES_ROOTTypeLib{E272567E-CDFF-4106-AD06-B7AA8CF704D9}1.0HELPDIR
HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{EC564D32-0F1A-4367-8A9B-4A9F57688D03}Programmable
HKEY_LOCAL_MACHINESOFTWAREClassesTypeLib{3E704673-BE49-4C13-8E36-288326D14709}
HKEY_LOCAL_MACHINESOFTWAREClassesTypeLib{3E704673-BE49-4C13-8E36-288326D14709}1.0
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerExtensions{D1EDDE84-E67E-4ccd-B28E-73AD3B71A7C9}
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{B10343BD-1DC6-442F-9BA2-D44C708CEE83}
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{E85DEA9A-826B-4a47-963A-5287968D7C0E}
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{EC564D32-0F1A-4367-8A9B-4A9F57688D03}

Download Free Scan
ZookaWare runs on Windows Vista, 7, 8 and 10. It has no ads, popups or bundled software and fully uninstalls by clicking Start > All Programs > select ZookaWare and click Uninstall.

One Response

  1. Sandra Hilton says:

    It was the second month when my phone bill was huge. I’ve noticed that my homepage was another one but I thought that’s not a real problem. I was sure that my anti-virus protects me. I’ve called my internet provider and he told me that it might be some kind of virus. He asked my why I don’t try SpyZooka. I’ve listen to him and it found Trojan.Adclicker. I’ve downloaded the program and it removed it right away. A great job!

Leave a Reply

Your email address will not be published. Required fields are marked *

css.php