The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015
01/01/1970

Adware.CWSMSConfd.B

Type:  Adware
Discovered:  01.01.1970
Updated:  13.02.2007
Affected systems:  Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP
AV Vendor:  Symantec

Description:


When Adware.CWSMSConfd.B is executed, it performs the following actions:
  • Creates the following files:
    • %System%\ctrlpan.dll (the library—detected as Adware.CWSMSConfd.B)
    • %Windir%\hh.htt (a stylesheet that opens an adult-orientated Web page)
    • %Windir%\Favorites\*.url (Windows 9x adult-oriented links)
    • %UserProfile%\Favorites\*.url (Windows NT adult-oriented links)
    • %Windir%\Favorites\Links\*.url (Windows 9x adult-oriented links)
    • %UserProfile%\Favorites\Links\*.url (Windows NT adult-oriented links)

      Notes:
      • %Userprofile% is a variable that refers to the current user's profile folder. By default, this is C:\Documents and Settings\<Current User> (Windows NT/2000/XP).
      • %Windir% is a variable that refers to the Windows installation folder. By default, this is C:\Windows (Windows 95/98/Me/XP)or C:\Winnt (Windows NT/2000).
      • %System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).

  • Adds the values:

    "User Stylesheet" = "%Windir%\hh.htt"
    "Use My Stylesheet" = "1"

    to the registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Styles

    so that the Adware triggers an adult-orientated pop-up window to appear when Internet Explorer is started.

  • On computers running Windows 95/98/Me, it adds the value:

    "Desktop" = "rundll32.exe ctrlpan, Restore ControlPanel"

    to the registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

    so that the Adware runs every time Windows starts.

  • On computers running Windows NT/2000/XP, it adds the value:

    "AppInit_DLL" = "ctrlpan.dll"

    to the registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows

    so that the Adware runs every time Windows starts.

  • Sets the values:

    "Start Page" = "[URL on the domain webcoolsearch.com]"
    "Search Page" = "[URL on the domain webcoolsearch.com]"
    "Search Bar" = "[URL on the domain webcoolsearch.com]"

    in the registry key:

    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main

    so that the Internet Explorer start page and search pages are redirected to the domain, webcoolsearch.com.

  • Modifies the value:

    "SearchURL" = "[URL on the domain webcoolsearch.com]"

    in the registry key:

    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer

    so that any URLs typed in the Internet Explorer address field are redirected to the domain, webcoolsearch.com.

  • Adds the following line to the hosts file to redirect the URL auto.search.msn.com to the IP address 205.177.124.66:

    205.177.124.66 auto.search.msn.com

    Removal instructions from Symantec Security Response Team


    The following instructions pertain to all Symantec antivirus products that support Security Risk detection.

    • Update the definitions.
    • Restart the computer in Safe mode.
    • Run a full system scan.
    • Delete the value that was added to the registry.
    • Reset the Internet Explorer home page.
    • Reset the Internet Explorer search page.
    • Delete the Web sites added to the Internet Explorer Favorites menu.
    • Edit the hosts file.
      For specific details on each of these steps, read the following instructions.

      1. To update the definitions
      To obtain the most recent definitions, start your Symantec program and run LiveUpdate.


      2. To restart the computer in Safe mode for Windows 9x (95/98/Me) and Safe mode Command Prompt only for Windows NT (2000/XP)
      Shut down the computer and turn off the power. Wait for at least 30 seconds, and then restart the computer in Safe mode. For instructions, read the document, "How to start the computer in Safe Mode."

      3. To run the scan
    • Restart your computer in Normal mode.
    • Start your Symantec antivirus program, and then run a full system scan.
    • If any files are detected as Adware.CWSMSConfd.B and depending on which software version you are using, you may see one or more of the following options:

      Note: This applies only to versions of Norton AntiVirus that support Security Risk detection. If you are running a version of Symantec AntiVirus Corporate Edition that supports Security Risk detection, and Security Risk detection has been enabled, you will only see a message box that gives the results of the scan. If you have questions in this situation, contact your network administrator.
      • Exclude (Not recommended): If you click this button, it will set the threat so that it is no longer detectable. That is, the antivirus program will keep the security risk on your computer and will no longer detect it to remove from your computer.

      • Ignore or Skip: This option tells the scanner to ignore the threat for this scan only. It will be detected again the next time that you run a scan.

      • Cancel: This option is new to Norton Antivirus 2005. It is used when Norton Antivirus 2005 has determined that it cannot delete a security risk. This Cancel option tells the scanner to ignore the threat for this scan only, and thus, the threat will be detected again the next time that you run a scan.

        To actually delete the security risk:
        • Click its file name (under the Filename column).
        • In the Item Information box that displays, write down the full path and file name.
        • Then use Windows Explorer to locate and delete the file.

      • Delete: This option will attempt to delete the detected files. In some cases, the scanner will not be able to do this.
        • If you see a message, "Delete Failed" (or similar message), manually delete the file.
        • Click the file name of the threat that is under the Filename column.
        • In the Item Information box that displays, write down the full path and file name.
        • Then use Windows Explorer to locate and delete the file.

      4. To delete the value from the registry
      Important: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry," for instructions.
    • Click Start > Run.
    • Type regedit

      Then click OK.

    • In Windows 9x (95/98/Me), navigate to the key:

      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

    • In the right pane, delete the value:

      "Desktop" = "rundll32.exe ctrlpan, Restore ControlPanel"

    • In Windows NT (2000/XP), navigate to the key:

      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows

    • In the right pane, delete the value:

      "AppInit_DLLs" = "ctrlpan.dll"

    • Navigate to the key:

      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Styles

    • In the right pane, delete the value:

      "User Stylesheet" = "%Windir%\hh.htt"
      "Use My Stylesheet" = "1"

      5. To reset the Internet Explorer home page
    • Start Microsoft Internet Explorer.
    • Connect to the Internet, and then go to the page that you want to set as your home page.
    • Click Tools > Internet Options.
    • In the Home page section of the General tab, click Use Current > OK.
      For additional information, or if this procedure does not work, read the Microsoft Knowledge Base article, "Home Page Setting Changes Unexpectedly, or You Cannot Change Your Home Page Setting, Article ID 320159."

        6. To reset the Internet Explorer Search page
        Follow the instructions for your version of Windows.

        Windows 98/Me/2000
      • Start Microsoft Internet Explorer.
      • Click the Search button on the toolbar.
      • In the Search pane, click Customize.
      • Click Reset.
      • Click Autosearch Settings.
      • Select a search site from the drop-down list, and then click OK.
      • Click OK.
        Windows XP
        Because Windows XP is set by default to use animated characters in the search, how you do this can vary. Read all the instructions before you start.
      • Start Microsoft Internet Explorer.
      • Click the Search button on the toolbar.
      • Do one of the following:
        • If the pane that opens looks similar to this picture:





          click the word Customize. Then skip to step h.

        • If the pane that opens has the words "Search Companion" at the top, and the center looks similar to this picture:





          click the Change preferences link as shown above. Proceed with step d.

      • Click the Change Internet search behavior link.
      • Under "Internet Search Behavior," click With Classic Internet Search.
      • Click OK. Then close Internet Explorer. (Close the program for the change to take effect.)
      • Start Internet Explorer. When the search pane opens, it should now look similar to this:





        Click the word Customize, and then proceed with the next step.

      • In the Search pane, click Customize.
      • Click Reset.
      • Click Autosearch Settings.
      • Select a search site from the drop-down list, and then click OK.
      • Click OK.
      • Do one of the following:
        • If you were using (or want to continue using) the "Classic Internet Search" panel, stop here (or proceed with the next section).
        • If you want to go back to the "Search Companion" search (it usually has an animated character at the button), proceed with step n.

      • Click the word Customize again.
      • In the "Customize Search Settings" window, click Use Search Companion > OK.
      • Close Internet Explorer. The next time you open it, it will again use the Search Companion.

        7. To delete the Web sites added to the Internet Explorer Favorites menu
        • Start Microsoft Internet Explorer.
        • Click Favorites > Organize Favorites.
        • Delete the Favorites that the threat added.

        8. To edit the hosts file
        Follow the instructions for your operating system:
        • Windows 95/98/Me/NT/2000
        • Click Start, point to Find or Search, and then click Files or Folders.
        • Make sure that "Look in" is set to (C:) and that "Include subfolders" is checked.
        • In the "Named" or "Search for..." box, type:

          hosts

        • Click Find Now or Search Now.
        • For each Hosts file that you find, right-click the file, and then click Open With.
        • Deselect the Always use this program to open this program check box.
        • Scroll through the list of programs and double-click Notepad.
        • When the file opens, delete the line:
          "205.177.124.66 auto.search.msn.com"
        • Close Notepad and save your changes when prompted.

        • Windows XP
        • Click Start > Search.
        • Click All files and folders.
        • In the "All or part of the file name" box, type:

          hosts

        • Verify that "Look in" is set to "Local Hard Drives" or to (C:).
        • Click More advanced options.
        • Check Search system folders.
        • Check Search subfolders.
        • Click Search.
        • Click Find Now or Search Now.
        • For each Hosts file that you find, right-click the file, and then click Open With.
        • Deselect the Always use this program to open this program check box.
        • Scroll through the list of programs and double-click Notepad.
        • When the file opens, delete the line:
          "205.177.124.66 auto.search.msn.com"
        • Close Notepad and save your changes when prompted.



      • Security Advisories Database

        Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

        A remote attacker can execute arbitrary code on the target system.

        07/21/2015

        SQL Injection Vulnerability in Piwigo

        SQL inection vulnerability has been discovered in Piwigo.

        02/05/2015

        Cross-site Scripting Vulnerability in DotNetNuke

        A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

        02/05/2015

        Cross-site Scripting Vulnerability in Hitachi Command Suite

        A cross-site scripting vulnerability was found in Hitachi Command Suite.

        02/02/2015

        Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

        An attacker can perform a denial of service attack.

        01/30/2015

        Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

        An attacker can perform a denial of service attack.

        01/30/2015

        Denial of service vulnerability in MalwareBytes Anti-Exploit &quot;mbae.sys&quot;

        An attacker can perform a denial of service attack.

        01/30/2015

        Denial of service vulnerability in Linux Kernel splice

        An attacker can perform a denial of service attack.

        01/29/2015

        Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

        An attacker can perform a denial of service attack.

        01/20/2015