Trends CWShredder finds CWS.hiddendll and can remove it in safe mode boot.
I have searched the web for info. There are a lot of writing about it, and a
lot of people have posted Hijackthis-logs... but I have not found any
serious description of the virus (malware?).
More specifically, adware/spyware. This CWS variant replaces the
machine's About:Blank then changes the Internet Explorer startup page
(and others) to About:Blank. Additionally, a file is set to run when
the computer is booted up that reinstalls it each time. It appears
there's also a BHO, and a file that keeps checking to be sure all the
other files are there wouldn't surprise me. If it keeps coming back,
then chances are very high that it isn't being completely removed, as
opposed to reinfection.
If you're looking for a description of other files and reg entries
installed, normally this can be gleaned from what is removed in the
answers on the web forums. This seems to be fairly complete, at least
for Windows 98SE:
http://www.thetechguide.com/forum/index.php?showtopic=17006
If you're having further problems as indicated in your subject, it
could be CWShredder missed something, or deleted something you need to
replace with a fresh file copy. There are other fix instructions in
those replies, like using LSPFix and AboutBuster and other fix
programs. If you have Windows XP, another post might be better, but
they are usually equally complete. Just do a Google search for
"CWS.hiddendll XP" (without the quotation marks).
Does it come from mail, websites, other?
Yes.
Like other spyware, CWS has been shown to be loaded by websites, free
programs, P2P downloads pretending to be something else, and even
other spyware. Email attachments don't seem to be a large vector, but
of course spamvertised websites might contain anything, and often
spyware of all kinds. It all depends on the choices of the person
trying to spread the spyware.
If the computer user basically practices safe hex [no P2P executables,
free programs, or spamvertised websites], eliminating most of those
possibilities, then these can be assumed to have sneaked in from a web
page via Internet Explorer, either simply because javascript is
enabled, or because an unpatched exploit was used to load the file on
the site visitor. Occasionally the user will have purposely opened a
hole, like enabling executables to run in an I-frame, something that
is sometimes needed for web games, but can be very dangerous for
general surfing.
Carol