CoolWebSearch

B

Bob

I have two ids (wife - user, me - admin) on my home
computer. When I power on the system, logon to my wife's
id, MS AntiSpyWare indicates that CoolWeb Search is
trying to install. I click remove and AntiSpyware
indicates that the softeware was removed. I run a full
scan and it indicates no spyware found. If I logon to my
id, then I do not encounter the CoolWebSearch problem. I
also execute a full system scan with Spy Sweeper and it
finds no references. I also ran a sweep from SpyKiller
and although it identified software that I thought was
legitimate as SpyWare, it did not identify CoolWebSearch.

Any ideas as to the problem and how to resolve the
nuisance.? I also run Zone Alarm Security Suite and
Norton Systemworks, on XP SP2 with lattest updates.

Bob
 
J

Jim Byrd

Hi Bob - Sounds like this might be a variant of some malware called
CoolWebSearch (if CWShredder doesn't fix it, then see AdAware, SpyBot, and
HijackThis, below, in that order). You can read about CWSearch here: The
CoolWebSearch Chronicles
http://cwshredder.net/cwshredder/cwschronicles.html


A good general "malware" removal site FAQ's with pretty good step-by-step
instructions is available for review here:
http://www.spywarenation.com/modules.php?name=FAQ


Read all of the following carefully first, then do the following in order:


#########IMPORTANT#########
Before you try to remove spyware using any of the programs below, download
both a copy of LSPFIX here:
http://www.cexx.org/lspfix.htm

AND a copy of Winsockfix for W95, W98, and ME
http://www.tacktech.com/pub/winsockfix/WinsockFix.zip
Directions here: http://www.tacktech.com/display.cfm?ttid=257

or here for Win2k/XP
http://files.webattack.com/localdl834/WinsockxpFix.exe
Info and download here: http://www.spychecker.com/program/winsockxpfix.html
Directions here: http://www.iup.edu/house/resnet/winfix.shtm

The process of removing certain malware may kill your internet connection.
If this should occur, these programs, LSPFIX and WINSOCKFIX, will enable you
to regain your connection.

NOTE: It is reported that in XP SP2, the Run command

netsh winsock reset

will fix this problem without the need for these programs. (You can also try
this if you're on XP SP1. There has also been one, as yet unconfirmed,
report that this also works there.) Also, one MS technician suggested the
following sequence:

netsh int reset all
ipconfig /flushdns

See also: http://windowsxp.mvps.org/winsock.htm for additional XPSP2
info/approaches using the netsh command.

An alternative approach with necessary .reg files which will often work even
when the above doesn't is defined here, courtesy of Bob Cerelli:
http://www.onecomputerguy.com/ie_tips.htm#winsock_fix Recommended.

Remember - you need to do this ahead of time.
#########IMPORTANT#########



#########IMPORTANT#########
Show hidden files and run all of the following removal tools from Safe mode
or a "Clean Boot" when possible, logged on as an Administrator. BEFORE
running these tools, be sure to clear all Temp files and your Temporary
Internet Files (TIF)(including offline content.) Reboot and test if the
malware is fixed after using each tool.

HOW TO Enable Hidden Files
http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2002092715262339

Clean Boot - General Win2k/XP procedure, but see below for links for other
OS's (This for Win2k w/msconfig - you can obtain msconfig for Win2k here:
http://www.3feetunder.com/files/win2K_msconfig_setup.exe ):

1. StartRun enter msconfig.

2. On the General tab, click Selective Startup, and then clear the 'Process
System.ini File', 'Process Win.ini File', and 'Load Startup Items' check
boxes. Leave the 'boot.ini' boxes however they are currently set.

3. In the Services tab, check the "Hide All Microsoft Services" checkbox,
and then click the "Disable All" button. If you use a third party firewall
then re-check (enable) it. For example, if you use Zone Alarm, re-check the
True Vector Internet Monitor service (and you may also want to re-check
(enable) the zlclient on the Startup tab.) Equivalent services exist for
other third party firewalls. An alternative to this for XP users is to
enable at this time the XP native firewall (Internet Connection Firewall -
ICF). Be sure to turn it back off when you re-enable your non-MS services
and Startup tab programs and restore your normal msconfig configuration
after cleaning your machine.

4. Click OK and then reboot.

For additional information about how to clean boot your operating system,
click the following article numbers to view the articles in the Microsoft
Knowledge Base:
310353 How to Perform a Clean Boot in Windows XP
http://support.microsoft.com/kb/310353
281770 How to Perform Clean-Boot Troubleshooting for Windows 2000
http://support.microsoft.com/kb/281770/EN-US/
267288 How to Perform a Clean Boot in Windows Millennium Edition
http://support.microsoft.com/kb/267288/EN-US/
192926 How to Perform Clean-Boot Troubleshooting for Windows 98
http://support.microsoft.com/kb/192926/EN-US/
243039 How to Perform a Clean Boot in Windows 95
http://support.microsoft.com/kb/243039/EN-US/
#########IMPORTANT#########


Sometimes the tools below will find files which they are unable to delete
because they are in use. A program called Copylock, here,
http://noeld.com/programs.asp?cat=misc#CopyLock can aid in the process of
"replacing, moving, renaming or deleting one or many files which are
currently in use (e.g. system files like comctl32.dll, or virus/trojan
files.)" Another is Killbox, here:
http://www.downloads.subratam.org/KillBox.zip
A third which is a bit different but often useful is Delete Invalid File,
here: http://www.purgeie.com/delinv.htm which handles invalid/UNC
file/folder name deleting, rather than the in use problem.




Download and run Stinger.exe, here:
http://download.nai.com/products/mcafee-avert/stinger.exe or from the link
on this page: http://vil.nai.com/vil/stinger/ ME/XP users be sure to read:
http://vil.nai.com/vil/SystemHelpDocs/DisableSysRestore.htm


Download sysclean.com , from Trend Micro, here:
http://www.trendmicro.com/download/dcs.asp along with the latest pattern
file, here: http://www.trendmicro.com/download/pattern.asp. Be sure to read
the "How-to" info here:
http://www.trendmicro.com/ftp/products/tsc/readme.txt

(You might also want to get Art's updater, SYS-UP.Zip, here for future
updating of these: http://home.epix.net/~artnpeg/). The updater files plus a
short tutorial on using them and SysClean are also available in one package
here: http://www.ik-cs.com/Programs/virtools/SYSCLEAN UTILITY.exe (If you
download and use the updater from the beginning, it will automatically
handle downloading and unziping the other files.)

NOTE: You can get a somewhat more current interim pattern file, the
Controlled Pattern Release, here and manually unzip it to your SysClean
folder: http://www.trendmicro.com/download/pattern-cpr-disclaimer.asp
(Sorry, but the Updater won't get this one for you.) Look for the lptxxx.zip
file after you agree to the terms.

Place them in a dedicated folder after appropriate unzipping.
Show hidden and system files (HowTo here:
http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2002092715262339)


If you're using WindowsME or WindowsXP, SysClean (and the other cleaning
tools below) may find infections within Restore Points which it will be
unable to clean. You may choose to disable Restore if you're on XP or ME
(directions here:
http://vil.nai.com/vil/SystemHelpDocs/DisableSysRestore.htm) which will
eliminate ALL previous Restore Points, or alternatively, you can wait until
cleaning is completed and then use the procedure within the *********'s
below to delete all older, possibly infected Restore Points and save a new,
clean one. This approach is in the sprit of "keep what you've got" so that
you can recover to an at least operating albeit infected system if you
inadvertently delete something vital, and is the approach I recommend that
you take.

Then boot to Safe mode or a Clean Boot as above (HowTo here:
http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2001052409420406)

Read tscreadme.txt carefully, then do a complete scan of your system
and clean or delete anything it finds. Reboot and re-run SysClean and
continue this procedure until you get a clean scan or nothing further can be
cleaned/removed. Now reboot to normal mode and re-run the scan again.

This scan may take a long time, as Sysclean is VERY extensive and thorough.
For example, one user reported that Sysclean found 69 hits that an
immediately prior Norton AV v. 11.0.2.4 run had missed.


Download and run the free or trial version of A2 Personal, here:
http://www.emsisoft.com/en/ Run from a Clean Boot or Safe Mode with Show
Hidden Files enabled as above.


Download, UPDATE before running, and run:
http://cwshredder.net/bin/CWSInstall.exe from this page:
http://www.intermute.com/spysubtract/cwshredder_download.html (The new v.2+
which will automatically install in C:\Program
Files\InterMute\SpySubtract\CWShredder.exe and put a shortcut on the
Desktop. UPDATE and run the program from this install location or the
shortcut after installation. This recommendation for CWShredder is NOT
automatically a recommendation for the other programs adverstised by
Intermute in conjunction with this install.) or from here:
http://www.aumha.org/downloads/cwshredder.exe (v.2+ standalone) or here:
http://www.softpedia.com/public/scripts/downloadhero/10-17-150/ (v.2+) to
remove the parasite. Try to run from Safe mode or a Clean Boot and be sure
to close ALL other programs to the extent possible, expecially ALL
instances of IE and OE.


There's a good tutorial about CWS and using CWShredder here:
http://www.bleepingcomputer.com/forums/index.php?showtutorial=47#domain See
also: http://cwshredder.net/cwshredder/cwschronicles.html

BE SURE that you get v.1.59.0.1 or later or the new v.2! Note that
CWShredder may make deletions/changes to your HOSTS file (sometimes as false
positives) if you use your HOSTS file as a DNS cache rather than just for ad
blocking, and that after cleanup you may need to restore it with a fresh
copy of any local DNS and/or blocking entries or disable it before running
CWShredder.


You will need to show Hidden files first and then at the end clear the
malware garbage from your System Restore backups after you've cleaned up.
It's best to perform CWShredder (and most other malware fixers too) from
Safe mode and then reboot. AFTER cleaning things up, then you can disable
and then re-enable System Restore. See ******** below.

The following links give instructions on how to do these various functions:


HOW TO Restart in Safe Mode
http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2001052409420406

HOW TO Enable Hidden Files
http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2002092715262339

HOW TO Disable/Flush System Restore (do this at the end AFTER cleaning or
use the suggested procedure for XP at the ******'s)
http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2001111912274039
(WinXP)
http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2001012513122239
(WinME)
or http://vil.nai.com/vil/SystemHelpDocs/DisableSysRestore.htm (Both)



Then download and run:
http://www.kellys-korner-xp.com/regs_edits/iegentabs.reg to restore your
tabs and remove any restrictions that the parasite has put in place.

Now download and run:
http://www.kellys-korner-xp.com/regs_edits/RestoreSearch2.REG to restore
your search functions if they've been affected (as they probably will have
been).


Be sure that you also download and install hotfix Q816093, here:

http://support.microsoft.com/?kbid=816093

which blocks the exploit upon which this parasite family depends.


Lastly, there are extensive, detailed instructions for manual removal of CWS
variants here: http://www.pestpatrol.com/PestInfo/c/cws.asp You may want
to check these to be sure everything's been cleaned up. A common and
particularly difficult one to remove is the "persistent BHO" version. To
handle this one, go here and do the procedure detailed there:
http://www.silentrunners.org/sr_cwsremoval.html IMPORTANT - Before you
start, be sure to clear all TIF and Temp files/folders and log on as an
Administrator. You might also want to look at the procedure here:
http://www.securiteam.com/securityreviews/5RP0L0UD5U.html


However, this also indicates that you may have acquired some other malware
along the way. If you go to this page at Jim Eshelman's site, here:
http://aumha.org/a/noads.htm and wait a little bit (be patient), an analysis
of a number of possible parasites on your machine will be made to help you
identify and remove them. NOTE: You will need to disable Ad Blocking in Zone
Alarm 3.x or later, if present or any other Ad Blocking software which
interferes with Java Scripting for this scan to work. You should get a
message between the two lines of **** giving the results of the scan.

Get Ad-Aware SE Personal Edition, here:
http://www.lavasoftusa.com/support/download/. UPDATE, set it up in
accordance with this: http://forum.aumha.org/viewtopic.php?t=5877 or the
directions immediately below and run this regularly to get rid of most
"spyware/hijackware" on your machine. If it has to fix things, be sure to
re-boot and rerun AdAware again and repeat this cycle until you get a clean
scan. The reason is that it may have to remove things which are currently
"in use" before it can then clean up others. Configure Ad-aware for a
customized scan, and let it remove any bad files found..... Also download
the VX2 plug-in from that same Lavasoftusa site and after running the
AdAware scan, run this plug-in.

<Begin Setup Directions>
Then, courtesy of NonSuch at Lockergnome, open Ad-aware then click the gear
wheel at the top and check these options to configure Ad-aware for a
customized scan:

General> activate these: "Automatically save log-file" and "Automatically
quarantine objects prior to removal"

Scanning > activate these: "Scan within archives", "Scan active processes",
"Scan registry", "Deep scan registry," "Scan my IE Favorites for banned
sites," and "Scan my Hosts file"

Tweaks > Scanning Engine> activate this: "Unload recognized processes during
scanning."

Tweaks > Cleaning Engine: activate these: "Automatically try to unregister
objects prior to deletion" and "Let Windows remove files in use after
reboot."

Click "Proceed" to save your settings, then click "Start." Make sure
"Activate in-depth scan" is ticked green, then scan your system. When the
scan is finished, the screen will tell you if anything has been found, click
"Next." The bad files will be listed. Right click the pane and click "Select
all objects" - This will put a check mark in the box at the side, click
"Next" again and click "OK" at the prompt "# objects will be removed.
Continue?"
<End Setup Directions>

Courtesy of http://www.nondisputandum.com/html/anti_spyware.html: HINT: If
Ad Aware is automatically shut-down by a malicious software, first run
AWCloak.exe, http://www.lavasoftnews.com/downloads/AAWCloak.exe, before
opening Ad Aware. When AAWCloak is open, click "Activate Cloak". Then open
Ad Aware and scan your system.


Another excellent program for this purpose is SpyBot Search and Destroy
available here: http://security.kolla.de/ SpyBot Support Forum here:
http://www.net-integration.net/cgi-bin/forums/ikonboard.cgi. Tutorial
here: http://www.safer-networking.org/en/index.html I recommend using both
normally. Be sure and use the Default (NOT Advanced or Beta) Mode in
Settings.

After UPDATING and fixing ONLY RED things with SpyBot S&D, be sure to
re-boot and rerun SpyBot again and repeat this cycle until you get a clean
"no red" scan. The reason is that SpyBot sometimes has to remove things
which are currently "in use" before it can then clean up others. Note that
sometimes you need to make a judgement call about what these programs report
as spyware. See here, for example: http://www.imilly.com/alexa.htm
Note that sometimes you need to make a judgement call about what these
programs report as spyware. See here, for example:
http://www.imilly.com/alexa.htm

Both of these programs should normally be UPDATED and run after doing any
other fix such as CWShredder and, as a minimum, normally at least once a
week.


When done, go to Start|Run and enter one line at a time (or much easier,
open a DOS box and copy the following in its entirety and then paste it into
the box):

regsvr32 hlink.dll
regsvr32 /i browseui.dll
regsvr32 /i shdocvw.dll
regsvr32 /i mshtml.dll
regsvr32 mshtmled.dll
regsvr32 actxprxy.dll
regsvr32 /i urlmon.dll
regsvr32 scrrun.dll
regsvr32 comcat.dll
regsvr32 Oleaut32.dll
regsvr32 /i Shell32.dll
regsvr32 Msoeacct.dll
regsvr32 "C:\Program Files\Outlook Express\Msoe.dll"
regsvr32 msjava.dll
regsvr32 jscript.dll
regsvr32 Olepro32.dll
regsvr32 Hlink.dll
regsvr32 Asctrls.ocx
regsvr32 Inetcpl.cpl /i
regsvr32 Dxtrans.dll
regsvr32 Dxtmsft.dll
regsvr32 Imgutil.dll
regsvr32 Msxml.dll
regsvr32 Msjava.dll
regsvr32 Jscript.dll
regsvr32 Softpub.dll
regsvr32 Wintrust.dll
regsvr32 Initpki.dll
regsvr32 Dssenh.dll
regsvr32 Rsaenh.dll
regsvr32 Gpkcsp.dll
regsvr32 Slbcsp.dll
regsvr32 Cryptdlg.dll
regsvr32 Msjet40.dll
regsvr32 pdm32.dll
regsvr32 Msjtor40.dll
regsvr32 Dao360.dll
regsvr32 Sccbase.dll


with a Return after each .dll. You'll get a message about successful
completion of the re-registration process after each one, then enter the
next (with the DOS box they'll be continuous except for the last one).

If you use Win98x and get an error on Shell32.dll, ignore it. Only the ME,
Win2k and XP versions of windows have shell32 as an object that needs
registering. (For these earlier operating systems, run "regsvr32
shdoc401.dll " instead of "regsvr32 Shell32.dll".) Depending on your
system, you may also get "not found" error messages on some or all of the
last five - if so, ignore them.

Re-start your computer when you've finished.



If they don't fix it then start here:

Download HijackThis, free, here:
http://209.133.47.200/~merijn/files/HijackThis.exe (Always download a new
fresh copy of HijackThis [and CWShredder also] - It's UPDATED frequently.)
You may also get it here if that link is blocked:
http://www.majorgeeks.com/downloadget.php?id=3155&file=3&evp=3304750663b552982a8baee6434cfc13
or here: http://www.bleepingcomputer.com/files/spyware/hijackthis.zip

There are good "How-to-Use" tutorials here:
http://computercops.biz/HijackThis.html
and here: http://aumha.org/a/hjttutor.htm
and here: http://www.bleepingcomputer.com/forums/tutorial42.html

In Windows Explorer, click on Tools|Folder Options|View and check "Show
hidden files and folders" and uncheck "Hide protected operating system
files". (You may want to restore these when you're all finished with
HijackThis.)

Place HijackThis.exe or unzip HijackThis.zip into its own dedicated folder
at the root level such as C:\HijackThis (NOT in a Temp folder or on your
Desktop), reboot to Safe mode, start HT (have ONLY HT running - IE MUST be
closed) then press Scan. Click on SaveLog when it's finished which will
create hijackthis.log. Now click the Config button, then Misc Tools and
click on Generate StartupList.log which will create Startuplist.txt

Then go to one of the following forums:

Spyware and Hijackware Removal Support, here:
http://forums.spywareinfo.com/

or Net-Integration here:
http://www.net-integration.net/cgi-...86d536d57b5f65b6e40c55365e;act=ST;f=27;t=6949

or Tom Coyote here: http://forums.tomcoyote.org/index.php?act=idx
or Jim Eshelman's site here: http://forum.aumha.org/
or Bleepingcomputer here: http://www.bleepingcomputer.com/
or Computer Cops here: http://www.computercops.biz/forums.html



Register if necessary, then sign in and READ THE DIRECTIONS at the beginning
of the particular site's HiJackThis forum, then copy and paste both files
into a message asking for assistance, Someone will answer with detailed
instructions for the removal of your parasite(s). Be sure you include at
the beginning of your post a description of "What specific
problem(s)/symptoms you're trying to solve" and "What steps you've already
taken."


*******
ONLY IF you've successfully eliminated the malware, you can now make a new,
clean Restore Point and delete any previously saved (possibly infected)
ones. The following suggested approach is courtesy of Gary Woodruff: For XP
you can run a Disk Cleanup cycle and then look in the More Options tab. The
System Restore option removes all but the latest Restore Point. If there
hasn't been one made since the system was cleaned you should manually create
one before dumping the old possibly infected ones.
*******


Once you get this cleaned up, you might want to consider installing Eric
Howes' IE-SpyAds, SpywareBlaster and SpywareGuard here to help prevent this
kind of thing from happening in the future:

IESpyads - https://netfiles.uiuc.edu/ehowes/www/resource.htm "IE-SPYAD adds
a long list of sites and domains associated with known advertisers,
marketers, and crapware pushers to the Restricted sites zone of Internet
Explorer. Once you merge this list of sites and domains into the Registry,
the web sites for these companies will not be able to use cookies, ActiveX
controls, Java applets, or scripting to compromise your privacy or your PC
while you surf the Net. Nor will they be able to use your browser to push
unwanted pop-ups, cookies, or auto-installing programs on your PC." Read
carefully.

http://www.javacoolsoftware.com/spywareblaster.html (Prevents malware Active
X installs) (BTW, SpyWareBlaster is not memory resident ... no CPU or memory
load - but keep it UPDATED) The latest version as of this writing will
prevent installation or prevent the malware from running if it is already
installed, and it provides information and fixit-links for a variety of
parasites.

http://www.javacoolsoftware.com/spywareguard.html (Monitors for attempts to
install malware) Keep it UPDATED. All three Very Highly Recommended

SpywareBlaster is probably the best preventive tool currently available,
expecially if supplemented by using the Immunize function in SpyBot S&D and
a good HOSTS file (see next). IMPORTANT NOTE: A good additional source of
preventive blocking for ActiveX components is the Blocking List available
here: http://www.spywareguide.com/blockfile.php While smaller than the
SpywareBlaster list, it contains some different malware CLSIDs and appears
to be updated with new threats more frequently. Recommended as a supplement
to SpywareBlaster. Read all of the instructions in the Expert package
download carefully. You might want to consider using:
http://www.changedetection.com/monitor.html to monitor and notify you of
changes/updates to this (or others, for that matter) list.


Next, install and keep updated a good HOSTS file. It can help you avoid
most adware/malware. See here: http://www.mvps.org/winhelp2002/hosts.htm
(Be sure it's named/renamed HOSTS - all caps, no extension) Additional
tutorials here:
http://www.bleepingcomputer.com/forums/index.php?s=14f3f9225081133297a8acdd11137c5b&showtutorial=51
(detailed) and here: http://www.spywarewarrior.com/viewtopic.php?t=410
(overview)


Finally, be sure that you have a good hardware or software firewall and an
AntiVirus installed, and bring your OS up-to-date with ALL Critical updates
from Windows Update.
 
B

Bill Sanderson

I've seen "out of the blue" CWS alerts at startup on several machines
recently, including my own here at home, when my wife logged into her own
profile. I couldn't dig into this at the time, but I'm going to later
today--I don't know what is happening--this machine is fully patched and
scanned daily--so I'm suspicious that this is a false positive of some sort.
 
E

Engel

CoolWebSearch
Information and removal instructions for the CoolWebSearch
program.
http://www.spywareguide.com/product_show.php?id=599

..doxdesk.com: database: CoolWebSearch
.... CoolWebSearch variants are united by their methods of
installation and their
target search engines, which are affiliates of
coolwebsearch.com. ...
http://www.doxdesk.com/parasite/CoolWebSearch.html

..Siena College -- CWShredder by Merijn
.... Coolwebsearch is the name for a long list of browser
hijackers. ... A new
variation of Coolwebsearch includes the CWS SmartKiller,
which prevents you ...
http://www.siena.edu/antivirus/spyware/cws.asp
..CoolWebSearch, spyware remover, cool web search
CoolWebSearch is the name given to a range of various
browser hijackers. The latest
versions of CoolWebSearch have grown increasingly
aggressive and manual ...
http://www.adwarereport.com/mt/archives/000051.html
Mar 25, 2005 -

..remove coolwebsearch
Offers a remove coolwebsearch step by step uninstall
guide. removing cool web
search safely from your computer removal guide.
http://www.spyware-removal.com/remove-coolwebsearch.html -



..CoolWebSearch Chronicles
.... detail the variants of the browser hijacker known as
CoolWebSearch (CWS).
CoolWebSearch is known to be one of the most difficult
spyware infections to ...
http://cwshredder.net/cwshredder/cwschronicles.html -- Mar
25, 2005 -


..CoolWebSearch is winning Trojan war | The Register
.... removes one of the nastiest browser hijackers on the
planet: CoolWebSearch,
.... The trojan often redirects users to sites affiliated
with CoolWebSearch, ...
http://www.theregister.co.uk/2004/06/29/cws_shredder/
Mar 25, 2005 -


..http://en.wikipedia.org/wiki/CoolWebSearch


..Symantec Security Response - Adware.CoolWebSearch
BEHAVIOR: Adware.CoolWebSearch is a program that redirects
your Internet Explorer
searches. SYMPTOMS: Your Symantec antivirus program
detects this threat as ...
http://securityresponse.symantec.com/avcenter/venc/data/adw
are.coolwebsearch.html -

..CastleCops - Weekly Spyware Alert: CoolWebSearch
Promoting education and health in online security and
privacy.
http://computercops.biz/article2820.html
 
R

Randy Knobloch

Bob said:
I have two ids (wife - user, me - admin) on my home
computer. When I power on the system, logon to my wife's
id, MS AntiSpyWare indicates that CoolWeb Search is
trying to install. I click remove and AntiSpyware
indicates that the softeware was removed. I run a full
scan and it indicates no spyware found. If I logon to my
id, then I do not encounter the CoolWebSearch problem. I
also execute a full system scan with Spy Sweeper and it
finds no references. I also ran a sweep from SpyKiller
and although it identified software that I thought was
legitimate as SpyWare, it did not identify CoolWebSearch.

Any ideas as to the problem and how to resolve the
nuisance.? I also run Zone Alarm Security Suite and
Norton Systemworks, on XP SP2 with lattest updates.

"SpyKiller" is a Rogue anti-spyware program!
<http://www.spywarewarrior.com/rogue_anti-spyware.htm>

Fully uninstall it via Add/Remove Programs in Control Panel,
reboot and see if the flags continue.

Silj

--
siljaline

MS - MVP Windows (IE/OE) & Security (AH-VSOP)
__________________________________________
Security Tools Updates
http://aumha.net/viewforum.php?f=31

(Reply to group, as return address
is invalid - that we may all benefit)
 
B

Bob

Hi Randy

I checked the WEB site that you provided and I definitely
agree with the comments. When I looked at the identified
spware functions in the SpyKiller list, they were all
programs that I believe are legitimate (some from
Microsoft, HP, Symantec, etc.). If I had been able to
execute the "CLEAN" function I probably would have lost a
mjor portion of my system.

Thanks

Bob
 
B

Bob

I am going through each of the replies and adding
comments as I perform a step.

I removed the SpyKiller and BESTPOPUP software. I had to
manually delete a folder that was left behind. I used
REGEDIT to delete all SpyKiller netries in the registry.
 
B

Bob

Afternoon

I was readi9ng the various documents on both WEB sites
and followed some of the instructions.

I deleted all the entries in the HOSTS file as each entry
pointed to 127.0.0.1. I should have rebooted after I made
this change but I did not.

I use the Search tool to scan my hard drives for:
OEMSYSPNP*.*, ActiveUpdate*.*, ActiveXupdate*.* and did
not find any files. I display all files incluing the
hidden system files as a default setting under my id.

I searched the Registry (regedit) and only found entries
in the search key for the various names.

I downloaded removeCWS_Killer.EXE and CWSShredder.exe and
executed both. First execution was under my id (admin). I
switched to my wife's id (user) and executed both
programs again. In both exections, the programs indicated
that they did not find any instance of CWS.

I restarted the system and MSA did not pop-up with the
CWS notice.

I powered off/on the system and MSA did not pop-up with
the CWS notice.

In all instances the pop-up occurred under my wife's id
only. The MSA pop-up for CWS never occurred under my id.

I connected to the Internet via IE and MSN browsers under
both ids and they did not have any problems.

I wonder if MSA is giving a false positive on the invalid
entries in the HOSTS file.

I printed all instructions and will keep them for future
reference. I am trying to determine how CWS was installed
on my system. I have a Linksys Firewall, Win XP SP2 with
auto update, ZoneAlarm Pro security suite (auto update,
all functions active except Virus protection), Norton
Systemworks for virus (live update, full scans run on Wed
and Sun), MSA (auto update, full scan every day), WebRoot
Spy Sweeper that I manualy run whenever I want and do an
update first.

Bob
Bob
 
R

Randy Knobloch

Bob said:
Hi Randy

I checked the WEB site that you provided and I definitely
agree with the comments. When I looked at the identified
spware functions in the SpyKiller list, they were all
programs that I believe are legitimate (some from
Microsoft, HP, Symantec, etc.). If I had been able to
execute the "CLEAN" function I probably would have lost a
mjor portion of my system.

Thanks

Thanks for posting back, glad you got rid of "it".
That URL makes for a good shopping guide for anti-spyware apps.
http://www.spywarewarrior.com/rogue_anti-spyware.htm

Regards,

Silj

--
siljaline

MS - MVP Windows (IE/OE) & Security, AH-VSOP
__________________________________________
Security Tools Updates
http://aumha.net/viewforum.php?f=31

(Reply to group, as return address
is invalid - that we may all benefit)
 
B

Bob

-----Original Message-----


Thanks for posting back, glad you got rid of "it".
That URL makes for a good shopping guide for anti- spyware apps.
http://www.spywarewarrior.com/rogue_anti-spyware.htm

Regards,

Silj

--
siljaline

MS - MVP Windows (IE/OE) & Security, AH-VSOP
__________________________________________
Security Tools Updates
http://aumha.net/viewforum.php?f=31

(Reply to group, as return address
is invalid - that we may all benefit)



.
Evening

I guess that I did not get rid of it as the MS ASW popped-
up with the CWS install option. I will continue to follow
the various instructions for removal.

I did check the HOSTS file and it has the comments only
(no IP to name relation). As a result, I guess that was
not the solution.
 
B

Bob

Evening

These programs are loaded at startup
1. ZoneAlarm Pro Security Suite - all options but
antivirus are on
2. Norton Antivirus
3. MS AntiSpyware
4. Linksys external Router

All are set for auto updates. I also check for updates
occasionally. If I see an update then I usually run a
full scan with the program that was just updated. I also
have Spy Sweeper from WebRoot installed. I execute it
manually and check for new definition files before I run
it.


An update with MS AWS still reporting that CWS is present
on my wife's id only.

I executed these software programs and none identified
any spy ware programs. They did identify some cookies
which I deleted.

1. SpyWare Eliminator
2. NoAdware
3. SpySubtract
4. Spy Sweeper

In all instances I did a full system scan as specified in
the program. If there was a separate CWS option, then I
ran it also.

MS AWS runs ever night at 5:00 pm. Windows Update runs
ever day at 4:00 pm. Norton OneButton Checkup and
Antivirus run every Wednesday and Sunday at 5:00 pm.

I restarted my system and logged onto my wife's id. MA
AWS CWS notice popped up. I decided to leave it displayed
while I ran Spy Subtract (plus CWS option). While Pop-up
displayed and SpySubtract executed, MS AWS began its
daily execution. While both were running (not sure how
long but at least 15 minutes), MS AWS popped up another
window labelled MS AWS Alert (not sure of title and
contentsd) with nothing identified. I let that window sit
there for approximately 15 minutes. The window had two
buttons: cmdMonitorLeft and cmdMonitorRight. I eventually
clicked on the cmdMonitorRight button (arbitrary
selection) and a window popped up about a URL (not
indentified)and I did not write down all the information.
I closed that window and returned to the ALERT window. I
clikced on the cmdMonitorLeft button and the Alert window
closed. I also noticed that the MS AWS CWS window closed.
There was no information that related the ALERT popup
window to the MS AWS CWS window. I was not expecting the
window to close and as a result I did not write down the
contents.

Both MS AWS, SpySubtract and Norton AV ran tonight and
did not identify that CWS was presnt on my system.

At this stage it would be nice to talk to someone at
Microsoft in order to determine what MS AWS is
identifying as the CWS problem.
 
D

D@annyBoy

try running a full scan in safe mode


Bob said:
Evening

These programs are loaded at startup
1. ZoneAlarm Pro Security Suite - all options but
antivirus are on
2. Norton Antivirus
3. MS AntiSpyware
4. Linksys external Router

All are set for auto updates. I also check for updates
occasionally. If I see an update then I usually run a
full scan with the program that was just updated. I also
have Spy Sweeper from WebRoot installed. I execute it
manually and check for new definition files before I run
it.


An update with MS AWS still reporting that CWS is present
on my wife's id only.

I executed these software programs and none identified
any spy ware programs. They did identify some cookies
which I deleted.

1. SpyWare Eliminator
2. NoAdware
3. SpySubtract
4. Spy Sweeper

In all instances I did a full system scan as specified in
the program. If there was a separate CWS option, then I
ran it also.

MS AWS runs ever night at 5:00 pm. Windows Update runs
ever day at 4:00 pm. Norton OneButton Checkup and
Antivirus run every Wednesday and Sunday at 5:00 pm.

I restarted my system and logged onto my wife's id. MA
AWS CWS notice popped up. I decided to leave it displayed
while I ran Spy Subtract (plus CWS option). While Pop-up
displayed and SpySubtract executed, MS AWS began its
daily execution. While both were running (not sure how
long but at least 15 minutes), MS AWS popped up another
window labelled MS AWS Alert (not sure of title and
contentsd) with nothing identified. I let that window sit
there for approximately 15 minutes. The window had two
buttons: cmdMonitorLeft and cmdMonitorRight. I eventually
clicked on the cmdMonitorRight button (arbitrary
selection) and a window popped up about a URL (not
indentified)and I did not write down all the information.
I closed that window and returned to the ALERT window. I
clikced on the cmdMonitorLeft button and the Alert window
closed. I also noticed that the MS AWS CWS window closed.
There was no information that related the ALERT popup
window to the MS AWS CWS window. I was not expecting the
window to close and as a result I did not write down the
contents.

Both MS AWS, SpySubtract and Norton AV ran tonight and
did not identify that CWS was presnt on my system.

At this stage it would be nice to talk to someone at
Microsoft in order to determine what MS AWS is
identifying as the CWS problem.
 
B

Bob

Evening again.

I just booted to Safe Mode and my id (has admin rights).
I executed these programs

1. CWS Shredder
2. Spy Subtract
3. MS AntiSpyWare

None of the programs indicated CWS shredder was present.

I switched to my wife's id and MS AWS did not pop up the
CWS Alert. While wating for the programs to load, I
noticed MS AWS pop up a window that indciated MS IE was
allowed to chnage. Window not present long enough for me
to note the entire window. I logged onto MSN via the MSN
browser and it looked correct. Is there a difference
between IE Browser and MSN Browser for the CWS problem?
 
G

Gazza

I have to agree with you Bill - exact same problems here.
Tried everything but wondered whether deleting the account
and creating another for the wifey might do the trick!

Might try that tonight.
 
B

Bill Sanderson

I don't think there are significant differences between IE and the MSN
browser as far as CWS is concerned.

Did a scan with Microsoft Antispyware indicate CoolWebSearch at any time, or
just the pop-up alerts?
 
G

Gazza

I had the same problem. Tried absolutely everything but
couldn't resolve it. What I did in the end was back up my
wife's documents, closed system restore and deleted the
account.

Re-booted, re-enabled system restore and created a new
account for her. Copied the docs back over and the problem
has gone away.

Viola!"
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top