The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015
01/01/1970

Adware.Cydoor

Type:  Adware
Discovered:  01.01.1970
Updated:  13.02.2007
Affected systems:  Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP
AV Vendor:  Symantec

Description:


Adware.Cydoor is an adware program that displays advertisements. When Adware.Cydoor is executed, it performs the following actions:
  • May create some of the following files:

    • %System%\Cd_clint.dll
    • %System%\Cd_load.exe
    • %System%\cd_htm.dll

      Note: %System% is a variable. The adware component locates the System folder and copies itself to that location. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).

  • May create some of the following registry keys:
      HKEY_USERS\.DEFAULT\Software\Cydoor
      HKEY_USERS\.DEFAULT\Software\Cydoor Services
      HKEY_CURRENT_USER\Software\Cydoor
      HKEY_CURRENT_USER\Software\Cydoor Services
      HKEY_LOCAL_MACHINE\Software\Cydoor
      HKEY_LOCAL_MACHINE\Software\Cydoor Services
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdSupport_291
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdSupport_202
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdSupport_336


    Other programs usually install Adware.Cydoor. It does not add a registry value to launch itself at startup. Instead, it allows the program that installed it to launch it as the program itself is started. Then, the program uses Adware.Cydoor to download and display advertisements.

    The Cd_load.exe file is only installed when the program that installed Adware.Cydoor does not require an Internet connection to function. This file is only used to check for the active Internet connections. The file, Cd_clint.dll, contains all the functionality.

    When Adware.Cydoor is launched after installation, it will contact the server www.rgs[?].net (in which [?] is a number between 1 – 4) on port 80. However, it is not limited to this server. This adware can receive a list of other servers from this initial server and connect to them instead. These servers are advertisement servers, and it is from these servers that cydoor retrieves the advertisements.

    Removal instructions from Symantec Security Response Team


    Note: Removing this adware component from the system will likely cause the program that installed it to not function as intended. The uninstaller generally identifies the programs that will not work after uninstallation.

    Before you begin: This is a general removal procedure. It does not include steps to try to remove the adware using the Windows Add/Remove programs applet. Information on how to do this may be available from the publisher of this adware, Cydoor Desktop Media. For Cydoor's instructions on how to remove this adware, go to http://www.cydoor.com/Cydoor/. Click the Support link and scroll through the FAQ's to the "How do I remove your software" section. You can also contact Cydoor Support using the form at the bottom of their FAQ page.


    The following instructions pertain to all Symantec antivirus products that support Security Risk detection.

  • Update the definitions.
  • Restart the computer in Safe mode
  • Run a full system scan and delete all the files detected as Adware.Cydoor.
  • Delete the value that was added to the registry.
    For specific details on each of these steps, read the following instructions.
      1. Updating the definitions
      To obtain the most recent definitions, start your Symantec program and run LiveUpdate.

      2. Restarting the computer in Safe mode
      Shut down the computer and turn off the power. Wait for at least 30 seconds, and then restart the computer in Safe mode or VGA mode. For instructions, read the document, "How to start the computer in Safe Mode."
        3. Scanning for and deleting the files
      • Start your Symantec antivirus program and run a full system scan.
      • If any files are detected as Adware.Cydoor, click Delete.

        Note: If your Symantec antivirus product reports that it cannot delete a detected file, note the path and file name. Then use Windows Explorer to locate and delete the file.

        4. Deleting the keys from the registry

        WARNING: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry," for instructions.

      • Click Start, and then click Run. (The Run dialog box appears.)
      • Type regedit

        Then click OK. (The Registry Editor opens.)

      • Navigate to and delete the keys (if they exist):

        HKEY_USERS\.DEFAULT\Software\Cydoor Services
        HKEY_USERS\.DEFAULT\Software\Cydoor
        HKEY_CURRENT_USER\Software\Cydoor
        HKEY_CURRENT_USER\Software\Cydoor Services
        HKEY_LOCAL_MACHINE\Software\Cydoor
        HKEY_LOCAL_MACHINE\Software\Cydoor Services
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdSupport_291
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdSupport_202
        HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdSupport_336

      • Exit the Registry Editor.


      • Security Advisories Database

        Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

        A remote attacker can execute arbitrary code on the target system.

        07/21/2015

        SQL Injection Vulnerability in Piwigo

        SQL inection vulnerability has been discovered in Piwigo.

        02/05/2015

        Cross-site Scripting Vulnerability in DotNetNuke

        A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

        02/05/2015

        Cross-site Scripting Vulnerability in Hitachi Command Suite

        A cross-site scripting vulnerability was found in Hitachi Command Suite.

        02/02/2015

        Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

        An attacker can perform a denial of service attack.

        01/30/2015

        Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

        An attacker can perform a denial of service attack.

        01/30/2015

        Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

        An attacker can perform a denial of service attack.

        01/30/2015

        Denial of service vulnerability in Linux Kernel splice

        An attacker can perform a denial of service attack.

        01/29/2015

        Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

        An attacker can perform a denial of service attack.

        01/20/2015