redwolfe_98

Members
  • Content Count

    47
  • Joined

  • Last visited

Community Reputation

0 Neutral

About redwolfe_98

  • Rank
    Advanced Member

Profile Information

  • Location
    South Carolina, USA
  1. [quote name='visitor' post='117835' date='Mar 9 2010, 01:38 PM']You can download 8.1 from here: [url="http://download.lavasoft.com/public/81/Ad-AwareInstallation.exe"]http://download.lavasoft.com/public/81/Ad-...nstallation.exe[/url] Before installing, I'd use Revo Free Uninstaller (revouninstaller.com) to do a clean uninstall of any prior version.[/quote] thanks visitor.. which version of ad-aware do you use, build 8.2 or build 8.1? i am just wondering if you tried using build 8.2 and if it worked for you, or not..
  2. does anyone use the latest version of ad-aware? i am wanting to know if it is usable, or if it is not usable because it is too problematic.. if the latest version of ad-aware is unusable, due to its being too problematic, is there any "old" version of the program that is considered to be usable? the last time that i tried using "ad-aware", it had some bugs and so i uninstalled it.. however, i like "ad-aware", and i have been waiting to see some new version come out that was not problematic, so that i could use it, but all i see in the forum are posts saying that the program is unusable..
  3. i don't run ad-aware in realtime so it doesn't load at startup, on my computer, but i have noticed that, when opening the program, it takes some time for the definitions to be loaded.. it doesn't bother me..
  4. i am noticing the same thing, where the date, for the definition-file, that is showing on the webpage, does not match the definition-file, itself.. besides that, the blog says that there is a new definition-file update, today (02/24/09), but it is not available for downloading: when i try to download the definition-file, the one that is downloaded is dated 2/23/09, not 2/24/09..
  5. with the latest ad-aware updates, dated april 09 2008, "ad-aware" is now flagging "www.awaps.net" in my HOSTS file.. "www.awaps.net" is blocked in all of the major HOSTS files that i know of (winhelp2002, bluetack, cameleon, bill lowe, hpHosts).. searching the internet for "awaps.net", i saw that there is some malware ("mydoom") that adds "awaps.net" to the HOSTS file, in some way, which is probably the reason that ad-aware is flagging it, but i don't think that "ad-aware" should be flagging it when it is properly blocked in the HOSTS file; i have thousands of malicious domains blocked in my HOSTS file, but ad-aware doesn't flag those.. here is what "ad-aware" showed when i did a scan: Name:Redirected hostfile entry Category:Misc Object Type:Hosts file Size:- Location:127.0.0.1 www.awaps.net\127.0.0.1 Last Activity: Relevance:Moderate TAC index:4 Comment:NULL Description:Entry in your hostsfile that redirects a particular IP adress to a different host. Commonly used by Hijackers. If the entry in your hostsfile is intended (such as by use of a hostsfile list), add this listing to your ignorelist. If not, selecting this item will remove the entry from your hostsfile.
  6. i notice that ad-aware 2007 won't run if its service is disabled.. since the service would not be running when the computer is in "safe mode", does that mean that you cannot run a scan with ad-aware 2007 while in safe mode? if that is the case, i think that is another issue that lavasoft should look in to.. two problems that i have with ad-aware 2007, one is that if i have it set to scan for tracking cookies it seems to delete all of my cookies, automatically.. the other issue is that when i run the updater, it always says that i need to download the same program-update, some logging thing.. incidentally, when i tried to uninstall ad-aware 2007, the uninstall didn't work.. i had to manually uninstall it, which isn't that much of a problem for me, but still it would be nice if the uninstaller actually worked.. i don't fault lavasoft for this problem.. i know of some other programs that also will not properly uinistall and i think the problem is that microsoft has given the vendors some bogus information about how to work with "windows installer"..
  7. if you want to uninstall ad-aware se, just delete all the lavasoft files and remove any lavasoft regkeys that you can find to remove..
  8. esmo, if you meant that you were installing ad-aware 2007 and the installation failed, installing "windows script 5.6" might allow you to install the new ad-aware 2007, if you want to install it.. here is a link for "windows script 5.6": http://www.microsoft.com/downloads/details...EB-95A22B832CAA here is a link to ad-aware 2007's "FAQ's", addressing the issue and which mentions that "windows script 5.6 is needed, apparently both for installing and for uninstalling the program: http://www.lavasoftusa.com/support/faq_aaw2007.php#16 p.s. the "problem" likely is not with the "windows installer", as the FAQ says, but rather that "windows script 5.6" has not been installed.. if you want to install the "old" ad-aware se 1.06r1, the link at "filehippo" that says "ad-aware 1.6" is the same program, only it uses the "old" installer as opposed to the new installer that lavasoft started using in february, '07, which is less problematic than the february '07 installer.. here is the link for it: http://www.filehippo.com/download_ad-aware/?142
  9. i have heard that MS's "defender" can interfere with updating various antimalware programs when it is running in realtime.. as for the programs that you are using, or were using, i guess you will just have to use some "trial and error" to see what works for you.. there have been various problems with various versions of zone alarm, in the past.. zone alarm could have been causing problems or it might not have been (causing problems).. you could look in the zone alarm forums to see if others are having problems with the version of zone alarm that you were using.. i haven't heard anyone say that avg's antivirus program was problematic, so i don't think it would have been causing a problem, if you were using avg's antivirus program.. you should double-check to make sure that files that are flagged as being malware actually are malware before allowing them to be removed..
  10. hello loffie.. i want to give you a quick reply.. there are different ways that you could manage to get "zlob" removed from your computer.. i am not an "expert" at helping people to remove malware from their computer, but i can try to help.. first, there is another lavasoft forum for help with removing malware, called "hijackthis logs".. here is a link for it: http://www.lavasoftsupport.com/index.php?showforum=36 there are also other forums where you can get "expert" help in removing malware.. some of them are: http://www.dslreports.com/forum/cleanup http://www.bleepingcomputer.com/forums/forum22.html http://www.techsupportforum.com/security-c...kthis-log-help/ one tool that i think would probably be helpful in removing "zlob" would be "smitfraudfix".. here is a link for it: http://siri.geekstogo.com/SmitfraudFix.php another option that you could try would be to install the "superantispyware" program and do a scan with it and let it clean the malware that it finds.. many people say that it is very good at removing malware.. there is a free version and a pay version.. i would suggest that you install the free version which is what most people use.. here is a link for it: http://www.superantispyware.com/download.html i would try both of those programs and then doing another "hijackthis" scan and posting the new hijackthis log in one of the forums that i listed, where "experts" can help you.. incidentally, "calamityjane" is one of the best "experts" in helping people in cleaning malware from their computers and she helps people in the "lavasoft"/"hijackthis logs" forum, among other places, so you could go there for help..
  11. here is a thread that i found where w/95bumblebee is mentioned.. it looks like it is a false-positive where panda's "activescan" is flagged by avira's "antivir".. i don't know about the problems with ad-aware 2007.. you could uninstall it and switch back to the old ad-aware build 1.06r.. that is the one that i use.. here is a download for the "old" ad-aware build 1.06r: http://www.filehippo.com/download_ad-aware/?142 i know, it says build 1.06, but it is build 1.06r.. if you need help with cleaning malware from your computer, one place where you can get help is in another one of lavasoft's forums, called "hijackthis logs".. here is a link for it: http://www.lavasoftsupport.com/index.php?showforum=36
  12. hello.. i am seeing the same thing, except that, in your scan-log, ad-aware flagged the same activex-killbit twice, though, the second time, it is given a value of "pst".. the regkey, the "activex-killbit" that i am referring to is "HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\activex compatibility\{9a578c98-3c2f-4630-890b-fc04196ef420}", where it is flagged as having a "pst" value, in your scan-log.. i don't know what that is about, the "pst" value thing, but you could look into it.. in my scan, the activex-killbit is only flagged once, and it is not showing anything about a "pst" value, unlike your scan-log.. i am also seeing the same "HKEY_CURRENT_USER\software\microsoft\internet explorer\menuext" regkey's being flagged, the same as in your scan-log.. i believe that these are "false-positives", except that i question the "pst" value thing, in your scan-log.. i posted about this issue in the lavasoft "false postives" forum: http://www.lavasoftsupport.com/index.php?showtopic=11208 ------------------------------------------------------------------------------- here is what my ad-aware scan-log looks like: Memory scan result: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» New critical objects: 0 Objects found so far: 0 Started registry scan »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Adware.CDN Object Recognized! Type : Regkey Data : TAC Rating : 8 Category : Malware Comment : Rootkey : HKEY_LOCAL_MACHINE Object : software\microsoft\internet explorer\activex compatibility\{9a578c98-3c2f-4630-890b-fc04196ef420} Registry Scan result: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» New critical objects: 1 Objects found so far: 1 Started deep registry scan »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Deep registry scan result: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» New critical objects: 0 Objects found so far: 1 Started Tracking Cookie scan »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Tracking cookie scan result: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» New critical objects: 6 Objects found so far: 1 Deep scanning and examining files (C:) »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Disk Scan Result for C:\ »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» New critical objects: 0 Objects found so far: 1 Scanning Hosts file...... Hosts file location:"C:\WINDOWS\system32\drivers\etc\hosts". »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Hosts file scan result: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» 14974 entries scanned. New critical objects:0 Objects found so far: 1 Performing conditional scans... »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Adware.CDN Object Recognized! Type : Regkey Data : TAC Rating : 8 Category : Malware Comment : Rootkey : HKEY_CURRENT_USER Object : software\microsoft\internet explorer\menuext Conditional scan result: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» New critical objects: 1 Objects found so far: 2 8:13:37 PM Scan Complete Summary Of This Scan »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Total scanning time:00:04:18.890 Objects scanned:154663 Objects identified:9 Objects ignored:7 New critical objects:0
  13. i am running win xpsp2 with IE 6.. here is a log file that i tried to generate from running a scan with ad-aware.. note that 6 of the "ignored" items are "real" cookies, in "C:\Documents and Settings\user-xyz\Cookies", which ad-aware only recently started flagging.. the other ignored item is from my having my "homepage" locked, in IE: Ad-Aware SE Build 1.06r1 Logfile Created on:Monday, July 23, 2007 8:09:18 PM Created with Ad-Aware SE Personal, free for private use. Using definitions file:SE1R182 23.07.2007 »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» References detected during the scan: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Adware.CDN(TAC index:8):2 total references »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Definition File: ========================= Definitions File Loaded: Reference Number : SE1R182 23.07.2007 Internal build : 223 File location : C:\Program Files\Lavasoft\Ad-Aware SE Personal\defs.ref File size : 1366063 Bytes Total size : 4614595 Bytes Signature data size : 4572009 Bytes Reference data size : 42074 Bytes Signatures total : 117029 CSI Fingerprints total : 8686 CSI data size : 550522 Bytes Target categories : 15 Target families : 1158 Memory + processor status: ========================== Number of processors : 1 Processor architecture : Intel Pentium IV Memory available:52 % Total physical memory:523264 kb Available physical memory:270336 kb Total page file size:1279640 kb Available on page file:1028764 kb Total virtual memory:2097024 kb Available virtual memory:2030348 kb OS:Microsoft Windows XP Home Edition Service Pack 2 (Build 2600) Ad-Aware SE Settings =========================== Set : Search for low-risk threats Set : Safe mode (always request confirmation) Set : Scan active processes Set : Scan registry Set : Deep-scan registry Set : Scan my IE Favorites for banned URLs Set : Scan within archives Set : Scan my Hosts file Extended Ad-Aware SE Settings =========================== Set : Unload recognized processes & modules during scan Set : Scan registry for all users instead of current user only Set : Always try to unload modules before deletion Set : During removal, unload Explorer and IE if necessary Set : Let Windows remove files in use at next reboot Set : Delete quarantined objects after restoring Set : Include basic Ad-Aware settings in log file Set : Include additional Ad-Aware settings in log file Set : Include reference summary in log file Set : Include alternate data stream details in log file Set : Show detail tooltips in results lists 7-23-2007 8:09:18 PM - Scan started. (Full System Scan) Listing running processes »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» #:1 [smss.exe] FilePath : \SystemRoot\System32\ ProcessID : 464 ThreadCreationTime : 7-23-2007 8:12:56 PM BasePriority : Normal #:2 [csrss.exe] FilePath : \??\C:\WINDOWS\system32\ ProcessID : 520 ThreadCreationTime : 7-23-2007 8:12:57 PM BasePriority : Normal #:3 [winlogon.exe] FilePath : \??\C:\WINDOWS\system32\ ProcessID : 548 ThreadCreationTime : 7-23-2007 8:13:01 PM BasePriority : High #:4 [services.exe] FilePath : C:\WINDOWS\system32\ ProcessID : 592 ThreadCreationTime : 7-23-2007 8:13:01 PM BasePriority : Normal FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158) ProductVersion : 5.1.2600.2180 ProductName : Microsoft® Windows® Operating System CompanyName : Microsoft Corporation FileDescription : Services and Controller app InternalName : services.exe LegalCopyright : © Microsoft Corporation. All rights reserved. OriginalFilename : services.exe #:5 [lsass.exe] FilePath : C:\WINDOWS\system32\ ProcessID : 604 ThreadCreationTime : 7-23-2007 8:13:01 PM BasePriority : Normal FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158) ProductVersion : 5.1.2600.2180 ProductName : Microsoft® Windows® Operating System CompanyName : Microsoft Corporation FileDescription : LSA Shell (Export Version) InternalName : lsass.exe LegalCopyright : © Microsoft Corporation. All rights reserved. OriginalFilename : lsass.exe #:6 [svchost.exe] FilePath : C:\WINDOWS\system32\ ProcessID : 756 ThreadCreationTime : 7-23-2007 8:13:02 PM BasePriority : Normal FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158) ProductVersion : 5.1.2600.2180 ProductName : Microsoft® Windows® Operating System CompanyName : Microsoft Corporation FileDescription : Generic Host Process for Win32 Services InternalName : svchost.exe LegalCopyright : © Microsoft Corporation. All rights reserved. OriginalFilename : svchost.exe #:7 [svchost.exe] FilePath : C:\WINDOWS\system32\ ProcessID : 836 ThreadCreationTime : 7-23-2007 8:13:02 PM BasePriority : Normal FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158) ProductVersion : 5.1.2600.2180 ProductName : Microsoft® Windows® Operating System CompanyName : Microsoft Corporation FileDescription : Generic Host Process for Win32 Services InternalName : svchost.exe LegalCopyright : © Microsoft Corporation. All rights reserved. OriginalFilename : svchost.exe #:8 [svchost.exe] FilePath : C:\WINDOWS\System32\ ProcessID : 904 ThreadCreationTime : 7-23-2007 8:13:02 PM BasePriority : Normal FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158) ProductVersion : 5.1.2600.2180 ProductName : Microsoft® Windows® Operating System CompanyName : Microsoft Corporation FileDescription : Generic Host Process for Win32 Services InternalName : svchost.exe LegalCopyright : © Microsoft Corporation. All rights reserved. OriginalFilename : svchost.exe #:9 [svchost.exe] FilePath : C:\WINDOWS\System32\ ProcessID : 948 ThreadCreationTime : 7-23-2007 8:13:03 PM BasePriority : Normal FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158) ProductVersion : 5.1.2600.2180 ProductName : Microsoft® Windows® Operating System CompanyName : Microsoft Corporation FileDescription : Generic Host Process for Win32 Services InternalName : svchost.exe LegalCopyright : © Microsoft Corporation. All rights reserved. OriginalFilename : svchost.exe #:10 [avguard.exe] FilePath : C:\Program Files\AntiVir PersonalEdition Premium\ ProcessID : 1048 ThreadCreationTime : 7-23-2007 8:13:03 PM BasePriority : Normal FileVersion : 7.00.00.52 ProductVersion : 7.00.00.00 ProductName : AntiVir Workstation CompanyName : Avira GmbH FileDescription : Antivirus On-Access Service InternalName : AVGuard LegalCopyright : Copyright © 2007 Avira GmbH. All rights reserved. LegalTrademarks : AntiVir® is a registered trademark of Avira GmbH, Germany. OriginalFilename : avguard.exe #:11 [explorer.exe] FilePath : C:\WINDOWS\ ProcessID : 1392 ThreadCreationTime : 7-23-2007 8:13:10 PM BasePriority : Normal FileVersion : 6.00.2900.2180 (xpsp_sp2_rtm.040803-2158) ProductVersion : 6.00.2900.2180 ProductName : Microsoft® Windows® Operating System CompanyName : Microsoft Corporation FileDescription : Windows Explorer InternalName : explorer LegalCopyright : © Microsoft Corporation. All rights reserved. OriginalFilename : EXPLORER.EXE #:12 [bocore.exe] FilePath : C:\Program Files\Comodo\CBOClean\ ProcessID : 1596 ThreadCreationTime : 7-23-2007 8:13:21 PM BasePriority : Normal FileVersion : 4.24.001 ProductVersion : 4.24 ProductName : COMODO BOClean - Anti-Malware CompanyName : COMODO FileDescription : COMODO BOClean - Anti-Malware InternalName : BOCore LegalCopyright : Copyright © 2007 COMODO ®. All rights reserved OriginalFilename : BOCore.exe #:13 [persfw.exe] FilePath : C:\Program Files\Kerio\Personal Firewall\ ProcessID : 1636 ThreadCreationTime : 7-23-2007 8:13:22 PM BasePriority : Normal FileVersion : 2, 1, 5, 0 ProductVersion : 2, 1, 5, 0 ProductName : Kerio Personal Firewall CompanyName : Kerio Technologies FileDescription : Kerio Personal Firewall Engine InternalName : PERSFW LegalCopyright : Copyright © 2002 OriginalFilename : PERSFW.exe #:14 [wdfmgr.exe] FilePath : C:\WINDOWS\system32\ ProcessID : 1696 ThreadCreationTime : 7-23-2007 8:13:24 PM BasePriority : Normal FileVersion : 5.2.3790.1230 built by: DNSRV(bld4act) ProductVersion : 5.2.3790.1230 ProductName : Microsoft® Windows® Operating System CompanyName : Microsoft Corporation FileDescription : Windows User Mode Driver Manager InternalName : WdfMgr LegalCopyright : © Microsoft Corporation. All rights reserved. OriginalFilename : WdfMgr.exe #:15 [uphclean.exe] FilePath : C:\Program Files\UPHClean\ ProcessID : 1724 ThreadCreationTime : 7-23-2007 8:13:25 PM BasePriority : Normal FileVersion : 1.6.30.0 ProductVersion : 1.6.30.0 ProductName : User Profile Hive Cleanup Service CompanyName : Microsoft Corporation FileDescription : User Profile Hive Cleanup Service InternalName : uphclean.exe LegalCopyright : Copyright © Microsoft Corp. 2003 - 2005 OriginalFilename : uphclean.exe #:16 [avgnt.exe] FilePath : C:\Program Files\AntiVir PersonalEdition Premium\ ProcessID : 1736 ThreadCreationTime : 7-23-2007 8:13:25 PM BasePriority : Normal FileVersion : 7.00.04.05 ProductVersion : 7.00.04.05 ProductName : AntiVir Workstation CompanyName : Avira GmbH FileDescription : Antivirus System Tray Tool LegalCopyright : Copyright © 2007 Avira GmbH. All rights reserved. LegalTrademarks : AntiVir® is a registered trademark of Avira GmbH, Germany. OriginalFilename : avgnt.exe #:17 [alg.exe] FilePath : C:\WINDOWS\System32\ ProcessID : 308 ThreadCreationTime : 7-23-2007 8:13:47 PM BasePriority : Normal FileVersion : 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158) ProductVersion : 5.1.2600.2180 ProductName : Microsoft® Windows® Operating System CompanyName : Microsoft Corporation FileDescription : Application Layer Gateway Service InternalName : ALG.exe LegalCopyright : © Microsoft Corporation. All rights reserved. OriginalFilename : ALG.exe #:18 [ad-aware.exe] FilePath : C:\Program Files\Lavasoft\Ad-Aware SE Personal\ ProcessID : 956 ThreadCreationTime : 7-24-2007 12:08:21 AM BasePriority : Normal FileVersion : 6.2.0.236 ProductVersion : SE 106 ProductName : Lavasoft Ad-Aware SE CompanyName : Lavasoft Sweden FileDescription : Ad-Aware SE Core application InternalName : Ad-Aware.exe LegalCopyright : Copyright © Lavasoft AB Sweden OriginalFilename : Ad-Aware.exe Comments : All Rights Reserved Memory scan result: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» New critical objects: 0 Objects found so far: 0 Started registry scan »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Adware.CDN Object Recognized! Type : Regkey Data : TAC Rating : 8 Category : Malware Comment : Rootkey : HKEY_LOCAL_MACHINE Object : software\microsoft\internet explorer\activex compatibility\{9a578c98-3c2f-4630-890b-fc04196ef420} Registry Scan result: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» New critical objects: 1 Objects found so far: 1 Started deep registry scan »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Deep registry scan result: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» New critical objects: 0 Objects found so far: 1 Started Tracking Cookie scan »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Tracking cookie scan result: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» New critical objects: 6 Objects found so far: 1 Deep scanning and examining files (C:) »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Disk Scan Result for C:\ »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» New critical objects: 0 Objects found so far: 1 Scanning Hosts file...... Hosts file location:"C:\WINDOWS\system32\drivers\etc\hosts". »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Hosts file scan result: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» 14974 entries scanned. New critical objects:0 Objects found so far: 1 Performing conditional scans... »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Adware.CDN Object Recognized! Type : Regkey Data : TAC Rating : 8 Category : Malware Comment : Rootkey : HKEY_CURRENT_USER Object : software\microsoft\internet explorer\menuext Conditional scan result: »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» New critical objects: 1 Objects found so far: 2 8:13:37 PM Scan Complete Summary Of This Scan »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»» Total scanning time:00:04:18.890 Objects scanned:154663 Objects identified:9 Objects ignored:7 New critical objects:0 ---------------------------------------------------------------------------------- here is a link to a thread where some others are also seeing ad-aware's flagging some "CDN" items on their computers: http://www.dslreports.com/forum/r18729078-...-AdAware-update here is a link to another thread where someone is seeing this same thing, with ad-aware's flagging some items as "CDN": http://www.lavasoftsupport.com/index.php?showtopic=11198
  14. hello.. after today's updates (7/23/07), ad-aware is flagging two alleged "CDN" items on my computer, both of which are regkeys.. one of the items is an activex-killbit.. the other one is for "adshield's" "context menu items".. here are the two items, from ad-aware's scan log: HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\activex compatibility\{9a578c98-3c2f-4630-890b-fc04196ef420} HKEY_CURRENT_USER\software\microsoft\internet explorer\menuext ---------------------------------------------------------------------------------------- here is what the "menuext" regkey looks like: [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt] [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\&Maintain Block List...] @="C:\\PROGRA~1\\AllStar\\AdShield\\maintain.htm" "Flags"=dword:00000000 "Contexts"=dword:000000ff [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Add to &Block List...] @="C:\\PROGRA~1\\AllStar\\AdShield\\suppress.htm" "Flags"=dword:00000000 "Contexts"=dword:000000ff [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Add to &Exclude List...] @="C:\\PROGRA~1\\AllStar\\AdShield\\restrict.htm" "Flags"=dword:00000000 "Contexts"=dword:000000ff [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\AdShield Option &Settings...] @="C:\\PROGRA~1\\AllStar\\AdShield\\settings.htm" "Flags"=dword:00000000 "Contexts"=dword:000000ff