Threat Explorer

The Threat Explorer is a comprehensive resource consumers can turn to for daily, accurate, up-to-date information on the latest threats, risks and vulnerabilities.

Spyware.HackerWacker

Spyware.HackerWacker

Updated:
13 February 2007
Publisher:
Streiff Information Services
Risk Impact:
High
File Names:
Freewack.exe hwpe2.exe
Systems Affected:
Windows

Behavior


Spyware.HackerWacker is a spyware program that logs keystrokes, internet activity, file activity, computer activity, can send emails or direct network notifications.

Symptoms


Your Symantec program detects this threat as Spyware.HackerWacker.

Behavior


Spyware.HackerWacker must be manually installed.

Antivirus Protection Dates

  • Initial Rapid Release version 02 October 2014 revision 022
  • Latest Rapid Release version 22 September 2016 revision 024
  • Initial Daily Certified version 20 July 2004
  • Latest Daily Certified version 22 September 2016 revision 025
  • Initial Weekly Certified release date 21 July 2004
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

When Spyware.HackerWacker is executed, it performs the following actions:
  1. Creates the following files:

    • %ProgramFiles%\FreeWack\Freewack.exe
    • %ProgramFiles%\HWPE\Administrator_winlog.sis
    • %ProgramFiles%\HWPE\Hwpe.hlp
    • %ProgramFiles%\HWPE\UNWISE.EXE
    • %ProgramFiles%\HWPE\errlog.txt
    • %ProgramFiles%\HWPE\hwpe.cnt
    • %ProgramFiles%\HWPE\hwpe2.exe
    • %ProgramFiles%\HWPE\install.log
    • %ProgramFiles%\HWPE\intruder.$$$
    • %ProgramFiles%\HWPE\m.ini
    • %ProgramFiles%\HWPE\manual.pdf
    • %ProgramFiles%\HWPE\readme.htm
    • %ProgramFiles%\HWPE\userlist.$$$
    • C:\Documents and Settings\All USers\Start Menu\Programs\HackerWacker Personal Edition\HWPE Online Help.lnk
    • C:\Documents and Settings\All USers\Start Menu\Programs\HackerWacker Personal Edition\HWPE Program.lnk
    • C:\Documents and Settings\All USers\Start Menu\Programs\HackerWacker Personal Edition\HackerWacker Support.lnk
    • C:\Documents and Settings\All USers\Start Menu\Programs\HackerWacker Personal Edition\HackerWacker Web Site.lnk
    • C:\Documents and Settings\All USers\Start Menu\Programs\HackerWacker Personal Edition\PURCHASE HWPE.lnk
    • C:\Documents and Settings\All USers\Start Menu\Programs\HackerWacker Personal Edition\Printer Formatted Manual.lnk
    • C:\Documents and Settings\All USers\Start Menu\Programs\HackerWacker Personal Edition\README - Important Info.lnk
    • C:\Documents and Settings\All USers\Start Menu\Programs\HackerWacker Personal Edition\UnInstall HWPE.lnk

      Note: %ProgramFiles% is a variable that refers to the program files folder. By default, this is C:\Program Files.

  2. Adds the values:

    "HWPE" = "C:\Program Files\HWPE\hwpe2"
    "HWFreeWack" = "C:\Program Files\FreeWack\freewack.exe"

    to the registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

    so that the it runs when you start Windows.

  3. Adds the value:

    "DisableTaskMgr" = "1"

    to the registry key:

    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System

    so that Task Manager is disabled.

  4. Adds the value:

    "DisableRegistryTools" = "1"

    to the registry key:

    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System

    so that the registry Editor is disabled.

  5. Adds the values:

    "HWPLoadWins" =  "1"
    "HWPRunStealth" =  "0"
    "HWPkk1" =  "NONE"
    "HWPkk2" =  "F12"
    "HWPPlayAny" =  "0"
    "HWPSoundPlay" =  "none"

    to the registry subkey:

    HKEY_LOCAL_MACHINE\SOFTWARE\HWPE\Preferences

  6. Adds the values:

    "HWPNotify" =  "0"
    "HWPSMTP" =  ""
    "HWPSPort" =  ""
    "HWPNotifyTime" =  ""
    "HWPemail" =  ""
    "HWPCC" =  ""
    "HWPMailKill" =  "0"
    "SendOnlyFiltered" =  "0"
    "AutoDesc" =  ""
    "AutoSMTP" =  ""
    "AutoPOP" =  ""
    "AutoSMTPPORT" =  ""
    "AutoEmail" =  ""
    "AutoUser" =  ""
    "AutoPassword" =  ""

    to the registry subkey:

    HKEY_LOCAL_MACHINE\SOFTWARE\HWPE\Notify

  7. Adds the values:

    "HWPWinLogAll" =  "1"
    "HWPLogURLS" =  "1"
    "HWPLogKeys" =  "1"
    "HWPLogShell" =  "0"
    "HWPFilterKeys" =  "1"

    to the registry subkey:

    HKEY_LOCAL_MACHINE\SOFTWARE\HWPE\Logging

  8. Adds the values:

    "HWINIP" =  ""
    "HWINPort" =  ""
    "OnlyHWIN" =  "0"
    "EnableRemote" =  "0"

    to the registry subkey:

    HKEY_LOCAL_MACHINE\SOFTWARE\HWPE\HWIN

  9. Adds the value:

    "HWPLogAllDet" =  "1"

    to the registry subkey:

    HKEY_LOCAL_MACHINE\SOFTWARE\HWPE\Filter

  10. Adds the values:

    "HWPWordUp" =  "41"
    "HWPDisTasks" =  "0"
    "HWPDisReg" =  "0"
    "HWPUpdateSec" =  "2"
    "HWPDisSplash" =  "0"

    to the registry subkey:

    HKEY_LOCAL_MACHINE\SOFTWARE\HWPE\Configure

  11. Adds the values:

    "HWPCaptureAll" =  "0"
    "HWPCaptureLast" =  "1"
    "HWPLastPic" =  ""
    "ImageQuality" =  "80"
    "GreyScale" =  "1"

    to the registry subkey:

    HKEY_LOCAL_MACHINE\SOFTWARE\HWPE\Capture

  12. Adds the values:

    "HWPSetPath" =  "C:\Program Files\HWPE"
    "HWPLogPath" =  "C:\Program Files\HWPE"
    "HWPDupAll" =  "0"

    to the registry subkey:

    HKEY_LOCAL_MACHINE\SOFTWARE\HWPE\Advanced

  13. Adds the value:

    "HackerWacker Personal Edition 2.5.30.01"

    to the registry subkey:

    HKEY_LOCAL_MACHINE\SOFTWARE\Micosoft\Windows\CurrentVersion\Uninstall

  14. Installs the following files:

    • C:\WINDOWS\system32\AXLIB.ocx
    • C:\WINDOWS\system32\DWSHK32.OCX
    • C:\WINDOWS\system32\DWSPY32.DLL
    • C:\WINDOWS\system32\ENCRYPTION.DEP
    • C:\WINDOWS\system32\ENCRYPTION.OCX
    • C:\WINDOWS\system32\Energy Software Licensing.ocx
    • C:\WINDOWS\system32\Flp32a30.ocx
    • C:\WINDOWS\system32\ipdaem40.ocx
    • C:\WINDOWS\system32\ipport40.ocx
    • C:\WINDOWS\system32\MSSTKPRP.DLL
    • C:\WINDOWS\system32\pop40.ocx
    • C:\WINDOWS\system32\RichTx32.ocx
    • C:\WINDOWS\system32\smtp40.ocx
    • C:\WINDOWS\system32\TabCtl32.ocx
    • C:\WINDOWS\system32\THBCC30.dll
    • C:\WINDOWS\system32\THBReg20.dll
    • C:\WINDOWS\system32\THBRes25.dll
    • C:\WINDOWS\system32\xwebpic10.ocx


      requiring the following registry subkeys:

      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A15FF25-FF4F-11D4-8617-0000C0711200}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{16597B96-9BB1-11D3-9DCA-0080C86E7E02}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33337110-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33337120-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33337230-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33337240-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3B7C8860-D78F-101B-B9B5-04021C009402}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3C4A0B0A-D1ED-67FF-5507-9DB3F98A813F}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3DBBD945-F247-11CD-9F2A-524153480000}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3DBBD949-F247-11CD-9F2A-524153480000}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{584B6591-8E5F-11CE-8F97-00AA0036005A}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{60157465-78CB-11D4-AAD4-EADAF6E7CC79}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{62538F63-9D1D-11d3-9358-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{62538F64-9D1D-11d3-9358-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{62538F65-9D1D-11d3-9358-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{62538F67-9D1D-11d3-9358-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{660687B0-1A89-11D2-8813-0000C0E5948C}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{660687B2-1A89-11D2-8813-0000C0E5948C}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{78E5A540-1850-11CF-9D53-00AA003C9CB6}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7DA06D40-54A0-11CF-A521-0080C77A7786}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7EBDAAE0-8120-11CF-899F-00AA00688B10}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7EBDAAE1-8120-11CF-899F-00AA00688B10}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7EBDAAE2-8120-11CF-899F-00AA00688B10}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9A5ED012-B192-11d3-9382-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9A5ED015-B192-11d3-9382-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9A5ED016-B192-11d3-9382-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9A5ED017-B192-11d3-9382-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9A5ED018-B192-11d3-9382-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9EAA6B02-4808-11d4-9466-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A9ACA0E9-5E3D-11D4-A02B-0080C86E7E02}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{AFC634B0-4B8B-11CF-8989-00AA00688B10}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B617B991-A767-4F05-99BA-AC6FCABB102E}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{BD0A8DE1-CC9A-11CE-8FDA-00AA0036005A}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{BDC217C5-ED16-11CD-956C-0000C04E4C0A}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C4105451-D5F7-11CE-8FF4-00AA0036005A}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C4105453-D5F7-11CE-8FF4-00AA0036005A}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CADB8903-A56F-11D3-936A-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CADB8904-A56F-11D3-936A-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E3A43ED1-D47A-11CE-8FF0-00AA0036005A}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{0A15FF21-FF4F-11D4-8617-0000C0711200}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{0A15FF23-FF4F-11D4-8617-0000C0711200}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1D37DE21-9C6C-101C-B41C-6E74AC177608}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1D37DE22-9C6C-101C-B41C-6E74AC177608}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{2334D2B1-713E-11CF-8AE5-00AA00C00905}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{2334D2B3-713E-11CF-8AE5-00AA00C00905}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{243920DA-9259-4357-ADEF-DC1956E2F82E}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{2A4FCCB0-DFF1-11CF-8E74-00A0C90F26F8}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{33337111-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{33337112-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{33337121-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{33337122-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{33337231-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{33337232-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{33337241-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{33337242-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3B7C8862-D78F-101B-B9B5-04021C009402}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3DBBD946-F247-11CD-9F2A-524153480000}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3DBBD947-F247-11CD-9F2A-524153480000}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{60157461-78CB-11D4-AAD4-EADAF6E7CC79}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{60157463-78CB-11D4-AAD4-EADAF6E7CC79}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{62538F61-9D1D-11D3-9358-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{62538F62-9D1D-11D3-9358-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{62538F66-9D1D-11D3-9358-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{62538F68-9D1D-11D3-9358-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{63A0DCB1-1CDA-11D2-8813-0000C0E5948C}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{660687AF-1A89-11D2-8813-0000C0E5948C}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{660687B1-1A89-11D2-8813-0000C0E5948C}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{69310C25-4993-11D1-8905-0020AF131A57}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{69310C27-4993-11D1-8905-0020AF131A57}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{859321D0-3FD1-11CF-8981-00AA00688B10}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{885C2513-0CFB-4B85-AACA-1DDFFC71A4C9}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9A5ED011-B192-11D3-9382-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9A5ED013-B192-11D3-9382-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9A5ED014-B192-11D3-9382-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9EAA6B01-4808-11D4-9466-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{BDC217C7-ED16-11CD-956C-0000C04E4C0A}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{CE3E2DA3-1A56-11D2-8813-0000C0E5948C}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{D57A964A-7D75-4EA6-A2D9-27F944C505BF}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E9A5593C-CAB0-11D1-8C0B-0000F8754DA1}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{ED117630-4090-11CF-8981-00AA00688B10}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{EF56DAE4-60A0-403F-9689-3B3BE921544C}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{0A15FF20-FF4F-11D4-8617-0000C0711200}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{1D37DE23-9C6C-101C-B41C-6E74AC177608}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{33337113-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{33337123-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{33337233-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{33337243-F789-11CE-86F8-0020AFD8C6DB}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{3B7C8863-D78F-101B-B9B5-04021C009402}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{3DBBD948-F247-11CD-9F2A-524153480000}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{443375DF-5CCD-11D4-A025-0080C86E7E02}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{60157460-78CB-11D4-AAD4-EADAF6E7CC79}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{62538F60-9D1D-11D3-9358-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{8DDE6232-1BB0-11D0-81C3-0080C7A2EF7D}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{9A5ED010-B192-11D3-9382-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{9EAA6B00-4808-11D4-9466-0000B4BDB148}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{ADCA5D35-9107-11D3-9D9A-0080C86E7E02}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{BDC217C8-ED16-11CD-956C-0000C04E4C0A}
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AXLIB.AXGrabURL
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DWSHK.WinHook.4
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DWSPY.DwspyCtrl.1
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Encryption.encEncryption
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Energy_Software_Licensing.eneSoftware
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IPDaemon.IPDaemon
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IPDaemon.IPDaemon1
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IPPort.IPPort
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IPPort.IPPort1
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IPWorks.IPDaemon
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IPWorks.IPPort
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IPWorks.POP
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IPWorks.SMTP
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\LpLib.fpCombo
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\LpLib.fpCombo.1
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\LpLib.fpList
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\LpLib.fpList.1
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\POP.POP
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\POP.POP.1
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\RICHTEXT.RichtextCtrl
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\RICHTEXT.RichtextCtrl.1
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SMTP.SMTP
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SMTP.SMTP.1
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TabDlg.SSTab
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TabDlg.SSTab.1
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBCoolCapPropPage1
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBCoolCapPropPage1.30
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBCoolCapPropPage3
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBCoolCapPropPage3.30
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBCoolCapPropPage4
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBCoolCapPropPage4.1
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBCoolCapPropPage5
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBCoolCapPropPage5.1
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBCoolCaption
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBCoolCaption.30
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBCoolCaptionPropPage2
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBCoolCaptionPropPage2.30
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBRegistry
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBRegistry.20
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBResize
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBResize.25
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBResizePropPage1
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBResizePropPage1.25
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBResizePropPage2
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBResizePropPage2.25
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBResizePropPage3
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBResizePropPage3.25
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBResizeSpecial
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\THBCom.THBResizeSpecial.25
      HKEY_LOCAL_MACHINE\SOFTWARE\Classes\xwebpic10.xwebpic


The following instructions pertain to all Symantec antivirus products that support Security Risk detection.
  1. Update the definitions.
  2. Restart the computer in Safe mode.
  3. Run a full system scan.
  4. Delete the values that were added to the registry.
  5. Re-enable registry access
For specific details on each of these steps, read the following instructions.

1. To update the definitions
To obtain the most recent definitions, start your Symantec program and run LiveUpdate.

2. To restart the computer in Safe mode
Shut down the computer and turn off the power. Wait for at least 30 seconds, and then restart the computer in Safe mode or VGA mode. For instructions, read the document, "How to start the computer in Safe Mode ."

3. To run the scan
  1. Start your Symantec antivirus program, and then run a full system scan.
  2. If any files are detected as Spyware.HackerWacker and depending on which software version you are using, you may see one or more of the following options:


    Note: This applies only to versions of Norton AntiVirus that support Security Risk detection. If you are running a version of Symantec AntiVirus Corporate Edition that supports Security Risk detection, and Security Risk detection has been enabled, you will only see a message box that gives the results of the scan. If you have questions in this situation, contact your network administrator.
    • Exclude (Not recommended): If you click this button, it will set the threat so that it is no longer detectable. That is, the antivirus program will keep the security risk on your computer and will no longer detect it to remove from your computer.

    • Ignore or Skip: This option tells the scanner to ignore the threat for this scan only. It will be detected again the next time that you run a scan.

    • Cancel: This option is new to Norton Antivirus 2005. It is used when Norton Antivirus 2005 has determined that it cannot delete a security risk. This Cancel option tells the scanner to ignore the threat for this scan only, and thus, the threat will be detected again the next time that you run a scan.

      To actually delete the security risk:
      • Click its file name (under the Filename column).
      • In the Item Information box that displays, write down the full path and file name.
      • Then use Windows Explorer to locate and delete the file.

        If Windows reports that it cannot delete the file, this indicates that the file is in use. In this situation, complete the rest of the instructions on this page, restart the computer in Safe mode, and then delete the file using Windows Explorer.

    • Delete: This option will attempt to delete the detected files. In some cases, the scanner will not be able to do this.
      • If you see a message, "Delete Failed" (or similar message), manually delete the file.
      • Click the file name of the threat that is under the Filename column.
      • In the Item Information box that displays, write down the full path and file name.
      • Then use Windows Explorer to locate and delete the file.

        If Windows reports that it cannot delete the file, this indicates that the file is in use. In this situation, complete the rest of the instructions on this page, restart the computer in Safe mode, and then delete the file using Windows Explorer.

4. To delete the value from the registry

Spyware.HackerWacker makes changes to the Windows registry that may prevent you from running the registry editor. Security Response has developed a tool to reset these values to the default settings.

This tool is the easiest way to fix this. Once you have run the tool , return to this page and continue with the removal.

If you cannot obtain the tool, refer to the "Additional Information" section for information on manually reversing the changes.


Important:
Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry ," for instructions.
  1. Click Start > Run.
  2. Type regedit

    Then click OK.

  3. Navigate to the key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

  4. In the right pane, delete the values:

    "HWPE" = "C:\Program Files\HWPE\hwpe2"
    "HWFreeWack" = "C:\Program Files\FreeWack\freewack.exe"

  5. Navigate to the key:

    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System

  6. In the right pane, delete the value:

    "DisableTaskMgr" = "1"

  7. Navigate to the key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Micosoft\Windows\CurrentVersion\Uninstall

  8. In the right pane, delete the value:

    "HackerWacker Personal Edition 2.5.30.01"

  9. Delete the following registry key if present:

    HKEY_LOCAL_MACHINE\SOFTWARE\HWPE

  10. Exit the Registry Editor.

  11. Restart the computer.


5. To re-enable registry access

If registry access has been disabled, perform the following:
  1. Click Start > Run.
  2. Type:

    Notepad

    and then click OK.

  3. Type, or copy and paste, the following text into the text file:

    REGEDIT4
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
    "DisableRegistryTools"=dword:00000000
    [HKEY_CURRENT_USER\Software\Microsoft\WindowsNT\CurrentVersion\Policies\System]
    "DisableRegistryTools"=dword:00000000

  4. Save the file as C:\Repair.reg.

  5. Click Start > Run.

  6. Type:

    regedit -s C:\repair.reg

    and then click OK.

  7. Follow the step4 in the Removal Instructions: Delete the values that were added to the registry.