A remote administration utility that bypasses normal security mechanisms to secretly control a program, computer or network.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
To remove the installed adwares, uninstall the following programs from the Windows 'Add/Remove Programs' menu:
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
Backdoor:W32/Knockex.A is a backdoor program dropped as part of the payload of a Nullsoft installer (NSIS) program detected as Trojan-Dropper:W32/Knockex.A.
The Nullsoft installer contains the following sub-installers:
These installers will themselves install multiple installers, which in turn install malware, adware and spyware programs. Among the installed programs is Backdoor:W32/Knockex.A.
As of this writing, the first installer dropped by Trojan-Dropper:W32/Knockex.A, OfferApp-2529.exe, downloads and executes a backdoor with rootkit capabilities. The backdoor is detected either as Backdoor:W32/Knockex.A or Trojan.Generic.KDV.171682.
Upon execution, the backdoor program drops the following files:
The backdoor program uses the following launch points:
At the same time the OfferApp-2529.exe file is downloading and executing the backdoor, the second installer file, OfferApp-2526.exe, is executing the following installers:
When the installers listed are executed, their payloads are installed as separate, independent programs.
myclearsearch-setup.exe The myclearsearch-setup.exe file drops the following components:
The myclearsearch-setup.exe file then creates the following service launch point:
And also creates the following registry keys:
During installation, the program will also modify the start page for the Internet Explorer web browser:
inet.exe
When OfferApp-2526.exe is executed, it instructs the inet.exe file installer to download a file from a remote site and install it to the path "C:\Program". During this process, the installer creates the following service launch point:
It will also create a (functional) uninstallation setting:
Brand.exe
Brand.exe is an installer that downloads its own components from a remote site. At the time of writing, the file downloads the following components:
It creates the following service launch point:
And also creates the following registry keys: