The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015
01/01/1970

Adware.CWSMSConfd

Type:  Adware
Discovered:  01.01.1970
Updated:  13.02.2007
Affected systems:  Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP
AV Vendor:  Symantec

Description:


When Adware.CWSMSConfd is executed, it performs the following actions:
  • Creates the following files:
    • msconfd.dll (the library - detected as Adware.CWSMSConfd)
    • %Windir%\Favorites\*.url (adult-oriented links)
    • %UserProfile%\Favorites\*.url (adult-oriented links)

      Notes:
    • %Userprofile% is a variable that refers to the current user's profile folder. By default, this is C:\Documents and Settings\<Current User> (Windows NT/2000/XP).
    • %Windir% is a variable that refers to the Windows installation folder. By default, this is C:\Windows (Windows 95/98/Me/XP)or C:\Winnt (Windows NT/2000).

  • On computers running Windows 95/98/Me, it adds the value:

    "Desktop" = "rundll32.exe msconfd, Restore ControlPanel"

    to the registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

    so that the Adware runs every time Windows starts.

  • On computers running Windows NT/2000/XP, it adds the value:

    "AppInit_DLL" = "msconfd.dll"

    to the registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows

    so that the Adware runs every time Windows starts.

  • Sets the values:

    "Start Page" = "[URL on the domain webcoolsearch.com]"
    "Search Page" = "[URL on the domain webcoolsearch.com]"
    "Search Bar" = "[URL on the domain webcoolsearch.com]"

    in the registry key:

    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main

    to that the Internet Explorer start page and search pages are redirected to the domain webcoolsearch.com.

  • Modifies the value:

    "SearchURL" = "[URL on the domain webcoolsearch.com]"

    in the registry key:

    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer

    so that any URLs typed into the Internet Explorer address field are redirected to the domain webcoolsearch.com.

    Removal instructions from Symantec Security Response Team


    The following instructions pertain to all Symantec antivirus products that support Security Risk detection.

  • Update the definitions.
  • Restart the computer in Safe mode.
  • Run a full system scan.
  • Delete the value that was added to the registry.
  • Delete the Web sites added to the Internet Explorer Favorites menu.
  • Reset the Internet Explorer home page.
  • Reset the Internet Explorer search page.
    For specific details on each of these steps, read the following instructions.

    1. To update the definitions
    To obtain the most recent definitions, start your Symantec program and run LiveUpdate.


    2. To restart the computer in Safe mode for Windows 9x (95/98/Me) and Safe mode Command Prompt only for Windows NT (2000/XP)
    Shut down the computer and turn off the power. Wait for at least 30 seconds, and then restart the computer in Safe mode. For instructions, read the document, "How to start the computer in Safe Mode."


    3. To run a full system scan
  • Restart your computer in Normal mode.
  • Start your Symantec antivirus program, and then run a full system scan.
  • If any files are detected as Adware.CWSMSConfd and depending on which software version you are using, you may see one or more of the following options:

    Note: This applies only to versions of Norton AntiVirus that support Security Risk detection. If you are running a version of Symantec AntiVirus Corporate Edition that supports Security Risk detection, and Security Risk detection has been enabled, you will only see a message box that gives the results of the scan. If you have questions in this situation, contact your network administrator.
    • Exclude (Not recommended): If you click this button, it will set the threat so that it is no longer detectable. That is, the antivirus program will keep the security risk on your computer and will no longer detect it to remove from your computer.
    • Ignore or Skip: This option tells the scanner to ignore the threat for this scan only. It will be detected again the next time that you run a scan.
    • Cancel: This option is new to Norton Antivirus 2005. It is used when Norton Antivirus 2005 has determined that it cannot delete a security risk. This Cancel option tells the scanner to ignore the threat for this scan only, and thus, the threat will be detected again the next time that you run a scan.

      To actually delete the security risk:
      • Click its file name (under the Filename column).
      • In the Item Information box that displays, write down the full path and file name.
      • Then use Windows Explorer to locate and delete the file.
    • Delete: This option will attempt to delete the detected files. In some cases, the scanner will not be able to do this.
      • If you see a message, "Delete Failed" (or similar message), manually delete the file.
      • Click the file name of the threat that is under the Filename column.
      • In the Item Information box that displays, write down the full path and file name.
      • Then use Windows Explorer to locate and delete the file.


    4. To delete the value that was added to the registry
    Important: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry," for instructions.
  • Click Start > Run.
  • Type regedit

    Then click OK.
  • In Windows 9x (95/98/Me) Navigate to the key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
  • In the right pane, delete the value:

    "Desktop" = "rundll32.exe msconfd, Restore ControlPanel"
  • In Windows NT (2000/XP) Navigate to the key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
  • In the right pane, delete the value:

    "AppInit_DLLs" = "msconfd.dll"

    5. To delete the Web sites added to the Internet Explorer Favorites menu
  • Start Microsoft Internet Explorer
  • Click Favorites > Organize Favorites
  • Delete the Favorites added by the threat

    6. To reset the Internet Explorer home page
  • Start Microsoft Internet Explorer.
  • Connect to the Internet, and then go to the page that you want to set as your home page.
  • Click Tools > Internet Options.
  • In the Home page section of the General tab, click Use Current > OK.
    For additional information, or if this procedure does not work, read the Microsoft Knowledge Base article, "Home Page Setting Changes Unexpectedly, or You Cannot Change Your Home Page Setting, Article ID 320159."

      7. To reset the Internet Explorer Search page
      Follow the instructions for your version of Windows.

      Windows 98/Me/2000
    • Start Microsoft Internet Explorer.
    • Click the Search button on the toolbar.
    • In the Search pane, click Customize.
    • Click Reset.
    • Click Autosearch Settings.
    • Select a search site from the drop-down list, and then click OK.
    • Click OK.
      Windows XP
      Because Windows XP is set by default to use animated characters in the search, how you do this can vary. Read all the instructions before you start.
    • Start Microsoft Internet Explorer.
    • Click the Search button on the toolbar.
    • Do one of the following:
      • If the pane that opens looks similar to this picture:





        click the word Customize. Then skip to step h.

      • If the pane that opens has the words "Search Companion" at the top, and the center looks similar to this picture:





        click the Change preferences link as shown above. Proceed with step d.

    • Click the Change Internet search behavior link.
    • Under "Internet Search Behavior," click With Classic Internet Search.
    • Click OK. Then close Internet Explorer. (Close the program for the change to take effect.)
    • Start Internet Explorer. When the search pane opens, it should now look similar to this:





      Click the word Customize, and then proceed with the next step.

    • In the Search pane, click Customize.
    • Click Reset.
    • Click Autosearch Settings.
    • Select a search site from the drop-down list, and then click OK.
    • Click OK.
    • Do one of the following:
      • If you were using (or want to continue using) the "Classic Internet Search" panel, stop here (or proceed with the next section).
      • If you want to go back to the "Search Companion" search (it usually has an animated character at the button), proceed with step n.
    • Click the word Customize again.
    • In the "Customize Search Settings" window, click Use Search Companion > OK.
    • Close Internet Explorer. The next time you open it, it will again use the Search Companion.


    • Security Advisories Database

      Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

      A remote attacker can execute arbitrary code on the target system.

      07/21/2015

      SQL Injection Vulnerability in Piwigo

      SQL inection vulnerability has been discovered in Piwigo.

      02/05/2015

      Cross-site Scripting Vulnerability in DotNetNuke

      A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

      02/05/2015

      Cross-site Scripting Vulnerability in Hitachi Command Suite

      A cross-site scripting vulnerability was found in Hitachi Command Suite.

      02/02/2015

      Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

      An attacker can perform a denial of service attack.

      01/30/2015

      Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

      An attacker can perform a denial of service attack.

      01/30/2015

      Denial of service vulnerability in MalwareBytes Anti-Exploit &quot;mbae.sys&quot;

      An attacker can perform a denial of service attack.

      01/30/2015

      Denial of service vulnerability in Linux Kernel splice

      An attacker can perform a denial of service attack.

      01/29/2015

      Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

      An attacker can perform a denial of service attack.

      01/20/2015