Threat Explorer

The Threat Explorer is a comprehensive resource consumers can turn to for daily, accurate, up-to-date information on the latest threats, risks and vulnerabilities.

Adware.PortalScan

Adware.PortalScan

Updated:
February 13, 2007
Risk Impact:
High
File Names:
mwsvm.exe slmss.exe.
Systems Affected:
Windows

Behavior


Adware.PortalScan is an adware program that connects to various portal sites.

Symptoms


Your Symantec program detects Adware.PortalScan.
Excessive pop-up advertisments.

Behavior


Most likely transmitted from Web sites.

Antivirus Protection Dates

  • Initial Rapid Release version October 02, 2014 revision 022
  • Latest Rapid Release version February 01, 2015 revision 020
  • Initial Daily Certified version November 03, 2003
  • Latest Daily Certified version January 26, 2015 revision 023
  • Initial Weekly Certified release date November 05, 2003
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

When Adware.PortalScan runs, it performs the following actions:
  1. Checks for pop-up killer software packages and disables them.

  2. Adds the value:

    "absr" = "[PATH TO FILE NAME]"

    to the registry subkey:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

    so that the adware runs when Windows starts.

  3. May add the value:

    "slmss" = "[PATH TO FILE NAME]"

    to the registry subkey:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

    so that the adware runs when Windows starts.

  4. May add some of the following registry subkeys:

    HKEY_LOCAL_MACHINE%\SOFTWARE\slmss
    HKEY_LOCAL_MACHINE%\SOFTWARE\absr
    HKEY_CLASSES_ROOT%\CLSID\{3E7145B1-EA07-42CE-9299-11DF39FF54BD}
    HKEY_CLASSES_ROOT%\CLSID\{34EF5B1C-52CB-400b-8B7C-F787018B3826}
    HKEY_CLASSES_ROOT%\Interface\{E9D8697E-BEA9-4170-84F3-509AD2A11951}
    HKEY_CLASSES_ROOT%\TypeLib\{3CD9D85E-1FF2-4BF7-A113-6669B8D1E676}
    HKEY_CLASSES_ROOT%\URLLauncher.URLLauncherControl
    HKEY_CLASSES_ROOT%\URLLauncher.URLLauncherControl.1
    HKEY_CLASSES_ROOT%\AdRotator.Application

  5. Uses Microsoft's AdRotator package to survey predefined, legitimate, portal Web sites, and then opens them within pop-up windows.

    Notes:
    • The software does not drop files and does not install itself.
    • Some Backdoor Trojan programs also use the registry key value, "absr." Adware.PortalScan is not a backdoor Trojan, although its download capability is similar.



The following instructions pertain to all Symantec antivirus products that support Security Risk detection.
  1. Update the definitions.
  2. Run a full system scan and delete all the files detected as Adware.PortalScan.
  3. Delete the value that was added to the registry.
For specific details on each of these steps, read the following instructions.

1. Updating the definitions
To obtain the most recent definitions, start your Symantec program and run LiveUpdate.


2. Scanning for and deleting the infected files
  1. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
  2. Run a full system scan.
  3. If any files are detected as with Adware.PortalScan, click Delete.

    Note: If your Symantec antivirus product reports that it cannot delete a detected file, write down the path and file name. Then use Windows Explorer to locate and delete the file.


3. Deleting the value from the registry

WARNING: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry ," for instructions.

Click Start, and then click Run. (The Run dialog box appears.)
  1. Type regedit

    Then click OK. (The Registry Editor opens.)

  2. Delete the following registry subkeys if they are present:

    HKEY_LOCAL_MACHINE%\SOFTWARE\slmss
    HKEY_LOCAL_MACHINE%\SOFTWARE\absr
    HKEY_CLASSES_ROOT%\CLSID\{3E7145B1-EA07-42CE-9299-11DF39FF54BD}
    HKEY_CLASSES_ROOT%\CLSID\{34EF5B1C-52CB-400b-8B7C-F787018B3826}
    HKEY_CLASSES_ROOT%\Interface\{E9D8697E-BEA9-4170-84F3-509AD2A11951}
    HKEY_CLASSES_ROOT%\TypeLib\{3CD9D85E-1FF2-4BF7-A113-6669B8D1E676}
    HKEY_CLASSES_ROOT%\URLLauncher.URLLauncherControl
    HKEY_CLASSES_ROOT%\URLLauncher.URLLauncherControl.1
    HKEY_CLASSES_ROOT%\AdRotator.Application

  3. Navigate to the key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

  4. In the right pane, delete the following values, if present:

    "absr" = "[PATH TO FILE NAME]"

    and

    "slmss" = "[PATH TO FILE NAME]"

  5. Exit the Registry Editor