The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015
01/01/1970

Adware.CWSIEFeats

Type:  Adware
Discovered:  01.01.1970
Updated:  13.02.2007
Affected systems:  Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP
AV Vendor:  Symantec

Description:


When Adware.CWSIEFeats is executed, it performs the following actions:
  • Creates or downloads the following files:
    • [directory]\feat2.dll (detected as Adware.CWSIEFeats)
    • %UserProfile%\Local Setting\Temp\2.tmp (a downloader that attempts to download a file from awmdabest.com and is detected as Downloader.Trojan)
    • %System%\s.bat (a batch file dropped by 2.tmp that runs in a continuous loop in an attempt to delete 2.tmp. This causes the CMD.exe process to be active)
    • %System%\mfceh.exe (downloaded by feat2.dll after it is registered and detected as Adware.CWSIEFeats)

      Notes:
    • %System% is a variable that refers to the System folder. By default this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
    • %Userprofile% is a variable that refers to the current user's profile folder. By default, this is C:\Documents and Settings\<Current User> (Windows NT/2000/XP).

  • Creates the following files:

    • addlv.dll
    • addmu32.dll
    • addrm32.dll

  • Creates an .html file, which replaces the about:blank file, under one of the following names:
    • %Windir%\mshp.dll
    • %Windir%kbxun.dl

      Note:
    • %Windir% is a variable that refers to the Windows installation folder. By default, this is C:\Windows (Windows 95/98/Me/XP)or C:\Winnt (Windows NT/2000).

  • Creates a blacklist file under one of the following names:
    • %Windir%\bl.dat
    • %Windir%\mjjrr.dat

  • Creates a file containing keywords for targeted advertising under one of the following names:
    • %Windir%\keywords.dat
    • %Windir%\jqfzv.dat
    • %Windir%\rsicgq.log

  • The file feat2.dll downloads one of the following files and registers it as a service:
    • %Windir%\netrr.exe
    • %System%\systk.ex

  • The file 2.tmp downloads one of the following files, which is detected as Dialer.WSV:
    • %System%\tibs3.exe
    • %System%\sbar.exe

  • The files feat2.dll, netrr.exe, and mfceh.exe create the following registry keys when they are registered so they are run whenever Internet Explorer is started:

    HKEY_CLASSES_ROOT\CLSID\{E7EFBCA0-EAB9-E4C5-50C3-79622A93478A}
    HKEY_CLASSES_ROOT\CLSID\{676575DD-4D46-911D-8037-9B10D6EE8BB5}
    HKEY_CLASSES_ROOT\CLSID\{A5B6EDE1-CC5A-B569-AB04-69AC5C0B7B59}
    HKEY_CLASSES_ROOT\CLSID\{7A7FFD7B-4E13-D1D1-FA76-0910B513E4DE}
    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E7EFBCA0-EAB9-E4C5-50C3-79622A93478A}
    HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\URLSearchHooks\{E7EFBCA0-EAB9-E4C5-50C3-79622A93478A}
    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\HSA
    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\SW
    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\SE
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Enum\Root\Legacy_[]*008*0010%AF*00E5*0003*0017*001A*00A4*00B6*00C0*00A8
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\[random ASCII characters]

  • Adds the value:

    "[adware file name]" = "%Windir%\system32\[adware file name]"

    to the registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

    so that the Adware runs every time Windows starts.

    Note: "[adware file name]" may be the value "mfceh.exe".

  • Modifies or creates the following values:

    "Use Search Asst" = "no"
    "Default_Page_URL" = "about:blank"
    "StartPage" = "about:blank"
    "Defaut_Search_URL" = "res://%Windir%\mshp.dll/sp.html#37049"
    "Search Page" = "res://%Windir%\mshp.dll/sp.html#37049"
    "Search Bar" = "res://%Windir%\mshp.dll/sp.html#37049"

    in the registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main

    to modify the Internet Explorer start page and search pages.

  • Modifies or creates the values:

    "Use Search Asst" = "no"
    "Start Page" = "about:blank"
    "Search Page" = "res://%Windir%\mshp.dll/sp.html#37049"
    "Search Bar" = "res://%Windir%\mshp.dll/sp.html#37049"

    in the registry key:

    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main

    to modify the Internet Explorer start page and search pages.

  • Modifies or creates the value:

    "SearchAssistant" = "res://%Windir%\mshp.dll/sp.html#37049"

    in the registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Search

    to modify the Internet Explorer search pages.

    Removal instructions from Symantec Security Response Team


    The following instructions pertain to all Symantec antivirus products that support Security Risk detection.

  • Update the definitions.
  • Run a full system scan.
  • Delete the values added to the registry.
  • Reset the Internet Explorer home page.
  • Reset the Internet Explorer Search page.
    For specific details on each of these steps, read the following instructions.

    1. To update the definitions
    To obtain the most recent definitions, start your Symantec program and run LiveUpdate.

    2. To run a full system scan
  • Start your Symantec antivirus program, and then run a full system scan.
  • If any files are detected as Adware.CWSIEFeats and depending on which software version you are using, you may see one or more of the following options:

    Note: This applies only to versions of Norton AntiVirus that support Security Risk detection. If you are running a version of Symantec AntiVirus Corporate Edition that supports Security Risk detection, and Security Risk detection has been enabled, you will only see a message box that gives the results of the scan. If you have questions in this situation, contact your network administrator.
    • Exclude (Not recommended): If you click this button, it will set the threat so that it is no longer detectable. That is, the antivirus program will keep the security risk on your computer and will no longer detect it to remove from your computer.

    • Ignore or Skip: This option tells the scanner to ignore the threat for this scan only. It will be detected again the next time that you run a scan.

    • Cancel: This option is new to Norton Antivirus 2005. It is used when Norton Antivirus 2005 has determined that it cannot delete a security risk. This Cancel option tells the scanner to ignore the threat for this scan only, and thus, the threat will be detected again the next time that you run a scan.

      To actually delete the security risk:
      • Click its file name (under the Filename column).
      • In the Item Information box that displays, write down the full path and file name.
      • Then use Windows Explorer to locate and delete the file.

        If Windows reports that it cannot delete the file, this indicates that the file is in use. In this situation, complete the rest of the instructions on this page, restart the computer in Safe mode, and then delete the file using Windows Explorer.

    • Delete: This option will attempt to delete the detected files. In some cases, the scanner will not be able to do this.
      • If you see a message, "Delete Failed" (or similar message), manually delete the file.
      • Click the file name of the threat that is under the Filename column.
      • In the Item Information box that displays, write down the full path and file name.
      • Then use Windows Explorer to locate and delete the file.

        If Windows reports that it cannot delete the file, this indicates that the file is in use. In this situation, complete the rest of the instructions on this page, restart the computer in Safe mode, and then delete the file using Windows Explorer.


    3. To delete the values added to the registry
    Important: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry," for instructions.

  • Click Start > Run.
  • Type regedit

    Then click OK.

  • Navigate to the key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

  • In the right pane, delete the value:

    "[adware file name]" = "%Windir%\system32\[adware file name]"

    Note: "[adware file name]" may be "mfceh.exe".

  • Navigate to and delete the following registry keys:

    HKEY_CLASSES_ROOT\CLSID\{E7EFBCA0-EAB9-E4C5-50C3-79622A93478A}
    HKEY_CLASSES_ROOT\CLSID\{676575DD-4D46-911D-8037-9B10D6EE8BB5}
    HKEY_CLASSES_ROOT\CLSID\{A5B6EDE1-CC5A-B569-AB04-69AC5C0B7B59}
    HKEY_CLASSES_ROOT\CLSID\{7A7FFD7B-4E13-D1D1-FA76-0910B513E4DE}
    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E7EFBCA0-EAB9-E4C5-50C3-79622A93478A}
    HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\URLSearchHooks\{E7EFBCA0-EAB9-E4C5-50C3-79622A93478A}
    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\HSA
    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\SW
    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\SE
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Enum\Root\Legacy_[]*008*0010%AF*00E5*0003*0017*001A*00A4*00B6*00C0*00A8
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\[random ASCII characters]
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Search Bar
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Use Search Asst
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\Search Bar
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\Use Search Asst

  • Exit the Registry Editor.

    4. To reset the Internet Explorer home page
  • Start Microsoft Internet Explorer.
  • Connect to the Internet, and then go to the page that you want to set as your home page.
  • Click Tools > Internet Options.
  • In the Home page section of the General tab, click Use Current > OK.
    For additional information, or if this procedure does not work, read the Microsoft Knowledge Base article, "Home Page Setting Changes Unexpectedly, or You Cannot Change Your Home Page Setting, Article ID 320159."

      5. To reset the Internet Explorer Search page
      Follow the instructions for your version of Windows.

      Windows 98/Me/2000
    • Start Microsoft Internet Explorer.
    • Click the Search button on the toolbar.
    • In the Search pane, click Customize.
    • Click Reset.
    • Click Autosearch Settings.
    • Select a search site from the drop-down list, and then click OK.
    • Click OK.
      Windows XP
      Because Windows XP is set by default to use animated characters in the search, how you do this can vary. Read all the instructions before you start.
    • Start Microsoft Internet Explorer.
    • Click the Search button on the toolbar.
    • Do one of the following:
      • If the pane that opens looks similar to this picture:





        click the word Customize. Then skip to step h.

      • If the pane that opens has the words "Search Companion" at the top, and the center looks similar to this picture:





        click the Change preferences link as shown above. Proceed with step d.

    • Click the Change Internet search behavior link.
    • Under "Internet Search Behavior," click With Classic Internet Search.
    • Click OK. Then close Internet Explorer. (Close the program for the change to take effect.)
    • Start Internet Explorer. When the search pane opens, it should now look similar to this:





      Click the word Customize, and then proceed with the next step.

    • In the Search pane, click Customize.
    • Click Reset.
    • Click Autosearch Settings.
    • Select a search site from the drop-down list, and then click OK.
    • Click OK.
    • Do one of the following:
      • If you were using (or want to continue using) the "Classic Internet Search" panel, stop here (or proceed with the next section).
      • If you want to go back to the "Search Companion" search (it usually has an animated character at the button), proceed with step n.

    • Click the word Customize again.
    • In the "Customize Search Settings" window, click Use Search Companion > OK.
    • Close Internet Explorer. The next time you open it, it will again use the Search Companion.


    • Security Advisories Database

      Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

      A remote attacker can execute arbitrary code on the target system.

      07/21/2015

      SQL Injection Vulnerability in Piwigo

      SQL inection vulnerability has been discovered in Piwigo.

      02/05/2015

      Cross-site Scripting Vulnerability in DotNetNuke

      A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

      02/05/2015

      Cross-site Scripting Vulnerability in Hitachi Command Suite

      A cross-site scripting vulnerability was found in Hitachi Command Suite.

      02/02/2015

      Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

      An attacker can perform a denial of service attack.

      01/30/2015

      Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

      An attacker can perform a denial of service attack.

      01/30/2015

      Denial of service vulnerability in MalwareBytes Anti-Exploit &quot;mbae.sys&quot;

      An attacker can perform a denial of service attack.

      01/30/2015

      Denial of service vulnerability in Linux Kernel splice

      An attacker can perform a denial of service attack.

      01/29/2015

      Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

      An attacker can perform a denial of service attack.

      01/20/2015