PDA

View Full Version : Ethernet Connection Problem



BTU1234
2008-11-23, 17:03
Howdy,

I've been using an ethernet connection. After the last time I ran Spybot and Fixed Problems, my Ethernet connection IMMEDIATELY and completely quit working.

I can, however, use the wireless connection.

What gives? How can I get my Ethernet connection back?

Thanks,

BTU1234

md usa spybot fan
2008-11-23, 19:40
BTU1234:

What problems did you fix during the "Fix selected problems" and have you attempted to do a "Recovery" of any those fixed items?

If you post the Fixes.yymmdd-hhmm.txt log from the running of Spybot just prior to encountering the problem, perhaps someone may be able to better help you.

There are two methods to copy and post that information:
Method 1:
Go into Spybot > Mode > Advanced mode > Tools > View Reports > View Previous reports. Look for the appropriate Fixes.yymmdd-hhmm.txt log file. Open it. To copy it to the Clipboard, right click on the listing and select Select All > Right click again and select Copy. Paste (Ctrl+V) the contents of the Clipboard into a new post in this thread.
Method 2
The Fixes.yymmdd-hhmm.log files are stored in the following folders:
Windows 95 or 98:
C:\Windows\Application Data\Spybot - Search & Destroy\Logs
Windows ME:
C:\Windows\All Users\Application Data\Spybot - Search & Destroy\Logs
Windows NT, 2000 or XP:
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Logs
Windows Vista:
C:\ProgramData\Spybot - Search & Destroy
Using Windows Explorer, navigate to the correct Fixes.yymmdd-hhmm.txt log. Double click on it and it should open with Notepad. To copy it to the Clipboard, right click on the listing and select Select All > Right click again and select Copy. Paste (Ctrl+V) the contents of the Clipboard into a new post in this thread.
Note: By default here are two Checks.yymmdd-hhmm logs produced during a scan. The second Checks.yymmdd-hhmm has the details of what the scan found. A Fixes.yymmdd-hhmm log is produced if you fix or attempt to fix something.

BTU1234
2008-11-24, 01:34
Hi There,

Thanks a million for responding.

I took a look at Recovery. The only thing there is 111 entries for eXactAdvertising.BargainsBuddy.

Getting rid of that shouldn't cause any problem.

But I'm new to Spybot and I'm not very good with computers. My guess is that this is a registry thing.

Thanks for the great suggestion about the reports. I think I understand what you're saying.

I'll paste the last report from yesterday below. Please let me know if you see anything. If you don't, I can always go backwards one report and we'll see what we get.

I'll also paste far below the current report I got when I clicked on View Report. I'll just call it CURRENT REPORT, since there's no date on it.

I hope to hear from you soon.

Thanks again. I really appreciate the help.


--- Report generated: 2008-11-22 18:35 ---

Hint of the Day: Click the bar at the right of this to see more information! ()


eXact Advertising.BargainsBuddy: [SBI $B79D40A5] Class ID (Registry key, fixed)
HKEY_CLASSES_ROOT\CLSID\{136E344A-9B05-11D4-A9CD-0050DA1EDBCA}

eXact Advertising.BargainsBuddy: [SBI $AA529107] Class ID (Registry key, fixed)
HKEY_CLASSES_ROOT\CLSID\{136E344C-9B05-11D4-A9CD-0050DA1EDBCA}

eXact Advertising.BargainsBuddy: [SBI $8C02E3E1] Class ID (Registry key, fixed)
HKEY_CLASSES_ROOT\CLSID\{136E344E-9B05-11D4-A9CD-0050DA1EDBCA}

eXact Advertising.BargainsBuddy: [SBI $5DBF2D2F] Class ID (Registry key, fixed)
HKEY_CLASSES_ROOT\CLSID\{3AEDDDD6-165B-11D5-B2E1-0050DA1EDCBD}

eXact Advertising.BargainsBuddy: [SBI $58241343] Class ID (Registry key, fixed)
HKEY_CLASSES_ROOT\CLSID\{4347C525-93F3-11D4-B2E1-00A0CC5B0D29}

eXact Advertising.BargainsBuddy: [SBI $3CBA7874] Class ID (Registry key, fixed)
HKEY_CLASSES_ROOT\CLSID\{88F046D1-9F82-11D4-B2E2-000102746343}

eXact Advertising.BargainsBuddy: [SBI $7623F7EF] Root class (Registry key, fixed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\core.IkenaCore

eXact Advertising.BargainsBuddy: [SBI $7623F7EF] Root class (Registry key, fixed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\core.IkenaCore.1

eXact Advertising.BargainsBuddy: [SBI $7623F7EF] Class ID (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4347C525-93F3-11D4-B2E1-00A0CC5B0D29}

eXact Advertising.BargainsBuddy: [SBI $7623F7EF] Root class (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\core.IkenaCore.1

eXact Advertising.BargainsBuddy: [SBI $7623F7EF] Root class (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\core.IkenaCore

eXact Advertising.BargainsBuddy: [SBI $65F6F84A] Root class (Registry key, fixed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Core.IkenaMessage

eXact Advertising.BargainsBuddy: [SBI $65F6F84A] Root class (Registry key, fixed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Core.IkenaMessage.1

eXact Advertising.BargainsBuddy: [SBI $65F6F84A] Class ID (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{136E344A-9B05-11D4-A9CD-0050DA1EDBCA}

eXact Advertising.BargainsBuddy: [SBI $65F6F84A] Root class (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Core.IkenaMessage.1

eXact Advertising.BargainsBuddy: [SBI $65F6F84A] Root class (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Core.IkenaMessage

eXact Advertising.BargainsBuddy: [SBI $AC754F3D] Root class (Registry key, fixed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Core.IkenaXMLAttribute

eXact Advertising.BargainsBuddy: [SBI $AC754F3D] Root class (Registry key, fixed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Core.IkenaXMLAttribute.1

eXact Advertising.BargainsBuddy: [SBI $AC754F3D] Class ID (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{136E344E-9B05-11D4-A9CD-0050DA1EDBCA}

eXact Advertising.BargainsBuddy: [SBI $AC754F3D] Root class (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Core.IkenaXMLAttribute.1

eXact Advertising.BargainsBuddy: [SBI $AC754F3D] Root class (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Core.IkenaXMLAttribute

eXact Advertising.BargainsBuddy: [SBI $FD20631B] Root class (Registry key, fixed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Core.IkenaXMLElement

eXact Advertising.BargainsBuddy: [SBI $FD20631B] Root class (Registry key, fixed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Core.IkenaXMLElement.1

eXact Advertising.BargainsBuddy: [SBI $FD20631B] Class ID (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{136E344C-9B05-11D4-A9CD-0050DA1EDBCA}

eXact Advertising.BargainsBuddy: [SBI $FD20631B] Root class (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Core.IkenaXMLElement.1

eXact Advertising.BargainsBuddy: [SBI $FD20631B] Root class (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Core.IkenaXMLElement

eXact Advertising.BargainsBuddy: [SBI $7D07A101] Root class (Registry key, fixed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IM.IkenaIM

eXact Advertising.BargainsBuddy: [SBI $7D07A101] Root class (Registry key, fixed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IM.IkenaIM.1

eXact Advertising.BargainsBuddy: [SBI $7D07A101] Class ID (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{88F046D1-9F82-11D4-B2E2-000102746343}

eXact Advertising.BargainsBuddy: [SBI $7D07A101] Root class (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IM.IkenaIM.1

eXact Advertising.BargainsBuddy: [SBI $7D07A101] Root class (Registry key, fixing failed)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IM.IkenaIM

eXact Advertising.BargainsBuddy: [SBI $B4175C39] Type library (Registry key, fixed)
HKEY_CLASSES_ROOT\TypeLib\{277893A0-9F84-11D4-B2E2-000102746343}

eXact Advertising.BargainsBuddy: [SBI $B4175C39] Type library (Registry key, fixed)
HKEY_CLASSES_ROOT\TypeLib\{277893A0-9F84-11D4-B2E2-000102746343}

eXact Advertising.BargainsBuddy: [SBI $2C4337FD] Type library (Registry key, fixed)
HKEY_CLASSES_ROOT\TypeLib\{3AEDDDC9-165B-11D5-B2E1-0050DA1EDCBD}

eXact Advertising.BargainsBuddy: [SBI $2C4337FD] Type library (Registry key, fixed)
HKEY_CLASSES_ROOT\TypeLib\{3AEDDDC9-165B-11D5-B2E1-0050DA1EDCBD}

eXact Advertising.BargainsBuddy: [SBI $A10160FB] Type library (Registry key, fixed)
HKEY_CLASSES_ROOT\TypeLib\{62E4BD0E-9161-11D4-B2E1-00A0CC5B0D29}

eXact Advertising.BargainsBuddy: [SBI $A10160FB] Type library (Registry key, fixed)
HKEY_CLASSES_ROOT\TypeLib\{62E4BD0E-9161-11D4-B2E1-00A0CC5B0D29}


--- Spybot - Search & Destroy version: 1.6.0 (build: 20080707) ---

2008-07-07 blindman.exe (1.0.0.8)
2008-07-07 SDFiles.exe (1.6.0.4)
2008-07-07 SDMain.exe (1.0.0.6)
2008-07-07 SDShred.exe (1.0.2.3)
2008-07-07 SDUpdate.exe (1.6.0.8)
2008-07-07 SDWinSec.exe (1.0.0.12)
2008-07-07 SpybotSD.exe (1.6.0.30)
2008-09-16 TeaTimer.exe (1.6.3.25)
2008-11-21 unins000.exe (51.49.0.0)
2008-07-07 Update.exe (1.6.0.7)
2008-10-22 advcheck.dll (1.6.2.13)
2007-04-02 aports.dll (2.1.0.0)
2008-06-14 DelZip179.dll (1.79.11.1)
2008-09-15 SDHelper.dll (1.6.2.14)
2008-06-19 sqlite3.dll
2008-10-22 Tools.dll (2.1.6.8)
2008-11-04 Includes\Adware.sbi (*)
2008-11-18 Includes\AdwareC.sbi (*)
2008-06-03 Includes\Cookies.sbi (*)
2008-09-02 Includes\Dialer.sbi (*)
2008-09-09 Includes\DialerC.sbi (*)
2008-07-23 Includes\HeavyDuty.sbi (*)
2008-11-18 Includes\Hijackers.sbi (*)
2008-11-18 Includes\HijackersC.sbi (*)
2008-09-09 Includes\Keyloggers.sbi (*)
2008-11-18 Includes\KeyloggersC.sbi (*)
2004-11-29 Includes\LSP.sbi (*)
2008-11-18 Includes\Malware.sbi (*)
2008-11-18 Includes\MalwareC.sbi (*)
2008-11-03 Includes\PUPS.sbi (*)
2008-11-11 Includes\PUPSC.sbi (*)
2007-11-07 Includes\Revision.sbi (*)
2008-06-18 Includes\Security.sbi (*)
2008-10-23 Includes\SecurityC.sbi (*)
2008-06-03 Includes\Spybots.sbi (*)
2008-06-03 Includes\SpybotsC.sbi (*)
2008-11-04 Includes\Spyware.sbi (*)
2008-11-11 Includes\SpywareC.sbi (*)
2008-06-03 Includes\Tracks.uti
2008-11-04 Includes\Trojans.sbi (*)
2008-11-18 Includes\TrojansC.sbi (*)
2008-03-04 Plugins\Chai.dll
2008-03-05 Plugins\Fennel.dll
2008-02-26 Plugins\Mate.dll
2007-12-24 Plugins\TCPIPAddress.dll

CURRENT REPORT


--- Spybot - Search & Destroy version: 1.6.0 (build: 20080707) ---

2008-07-07 blindman.exe (1.0.0.8)
2008-07-07 SDFiles.exe (1.6.0.4)
2008-07-07 SDMain.exe (1.0.0.6)
2008-07-07 SDShred.exe (1.0.2.3)
2008-07-07 SDUpdate.exe (1.6.0.8)
2008-07-07 SDWinSec.exe (1.0.0.12)
2008-07-07 SpybotSD.exe (1.6.0.30)
2008-09-16 TeaTimer.exe (1.6.3.25)
2008-11-21 unins000.exe (51.49.0.0)
2008-07-07 Update.exe (1.6.0.7)
2008-10-22 advcheck.dll (1.6.2.13)
2007-04-02 aports.dll (2.1.0.0)
2008-06-14 DelZip179.dll (1.79.11.1)
2008-09-15 SDHelper.dll (1.6.2.14)
2008-06-19 sqlite3.dll
2008-10-22 Tools.dll (2.1.6.8)
2008-11-04 Includes\Adware.sbi
2008-11-18 Includes\AdwareC.sbi
2008-06-03 Includes\Cookies.sbi
2008-09-02 Includes\Dialer.sbi
2008-09-09 Includes\DialerC.sbi
2008-07-23 Includes\HeavyDuty.sbi
2008-11-18 Includes\Hijackers.sbi
2008-11-18 Includes\HijackersC.sbi
2008-09-09 Includes\Keyloggers.sbi
2008-11-18 Includes\KeyloggersC.sbi
2004-11-29 Includes\LSP.sbi
2008-11-18 Includes\Malware.sbi
2008-11-18 Includes\MalwareC.sbi
2008-11-03 Includes\PUPS.sbi
2008-11-11 Includes\PUPSC.sbi
2007-11-07 Includes\Revision.sbi
2008-06-18 Includes\Security.sbi
2008-10-23 Includes\SecurityC.sbi
2008-06-03 Includes\Spybots.sbi
2008-06-03 Includes\SpybotsC.sbi
2008-11-04 Includes\Spyware.sbi
2008-11-11 Includes\SpywareC.sbi
2008-06-03 Includes\Tracks.uti
2008-11-04 Includes\Trojans.sbi
2008-11-18 Includes\TrojansC.sbi
2008-03-04 Plugins\Chai.dll
2008-03-05 Plugins\Fennel.dll
2008-02-26 Plugins\Mate.dll
2007-12-24 Plugins\TCPIPAddress.dll


--- System information ---
Windows Vista (Build: 6001) Service Pack 1 (6.0.6001)


--- Startup entries list ---
Located: HK_LM:Run,
command:
file:
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!

Located: HK_LM:Run, Acrobat Assistant 8.0
command: "C:\Program Files (x86)\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe"
file: C:\Program Files (x86)\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe
size: 623992
MD5: 4A0BBDF88636F2EF08420BDCD343D286

Located: HK_LM:Run, Adobe Reader Speed Launcher
command: "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Reader_sl.exe"
file: C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Reader_sl.exe
size: 34672
MD5: 69B16C7B7746BA5C642FC05B3561FC73

Located: HK_LM:Run, Adobe_ID0EYTHM
command: C:\PROGRA~2\COMMON~1\Adobe\ADOBEV~1\Server\bin\VERSIO~2.EXE
file: C:\PROGRA~2\COMMON~1\Adobe\ADOBEV~1\Server\bin\VERSIO~2.EXE
size: 1884160
MD5: C1873D880786B6B03AF781E23835D925

Located: HK_LM:Run, ISBMgr.exe
command: "C:\Program Files (x86)\Sony\ISB Utility\ISBMgr.exe"
file: C:\Program Files (x86)\Sony\ISB Utility\ISBMgr.exe
size: 317280
MD5: C61DFED19704FA252702727EFCFF97C3

Located: HK_LM:Run, SmartWiHelper
command: "C:\Program Files\Sony Corporation\SmartWi Connection Utility\SmartWiHelper.exe" /WindowsStartup
file: C:\Program Files\Sony Corporation\SmartWi Connection Utility\SmartWiHelper.exe
size: 77824
MD5: 9494AE1E84DCFFF12F02B496BEB0F390

Located: HK_LM:Run, SunJavaUpdateSched
command: "C:\Program Files (x86)\Java\jre1.6.0\bin\jusched.exe"
file: C:\Program Files (x86)\Java\jre1.6.0\bin\jusched.exe
size: 77824
MD5: AB74AA8DEFC1CA82759788A55B673629

Located: HK_LM:Run, VAIOMyMemCenter
command: "C:\Program Files\Sony\VAIO My Memory Center\VAIO MyMemCenter.exe" 1
file: C:\Program Files\Sony\VAIO My Memory Center\VAIO MyMemCenter.exe
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!

Located: HK_LM:Run, VAIORegistration
command: "C:\Program Files\Sony\First Experience\WelcomeLauncher.exe"
file: C:\Program Files\Sony\First Experience\WelcomeLauncher.exe
size: 16384
MD5: D27BF775C0A88DB6075E9DBAD80307DE

Located: HK_LM:Run, VAIOSurvey
command: "C:\Program Files (x86)\Sony\VAIO Survey\VAIO Sat Survey.exe"
file: C:\Program Files (x86)\Sony\VAIO Survey\VAIO Sat Survey.exe
size: 385024
MD5: E51449759EC41555A38689BD4F62AD76

Located: HK_LM:Run, VWLASU
command: "C:\Program Files\Sony\VAIO Wireless Wizard\AutoLaunchWLASU.exe"
file: C:\Program Files\Sony\VAIO Wireless Wizard\AutoLaunchWLASU.exe
size: 24576
MD5: FF299BB033DC7B2FB3210F12869E344C

Located: HK_CU:Run, CommCtr
where: S-1-5-21-2759811940-1960771091-791034196-1000...
command: C:\PROGRA~2\NET2PH~1\CommCtr.exe -auto
file: C:\PROGRA~2\NET2PH~1\CommCtr.exe
size: 2383872
MD5: 44A864B27206F85BF7F1FA5C130746C2

Located: HK_CU:Run, SpybotSD TeaTimer
where: S-1-5-21-2759811940-1960771091-791034196-1000...
command: C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe
file: C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe
size: 1833296
MD5: 63B3FF83B87AFCEBA89CED54695DA0F6

Located: Startup (common), Microsoft Office.lnk
where: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup...
command: C:\Program Files (x86)\Microsoft Office\Office\OSA9.EXE
file: C:\Program Files (x86)\Microsoft Office\Office\OSA9.EXE
size: 65588
MD5: FDC1F94B79D3C08E5D66341E3CD6688E

Located: Startup (common), QuickBooks Delivery Agent.lnk
where: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup...
command: C:\Program Files (x86)\Intuit\QuickBooks Pro\Components\QBAgent\QBDAgent.exe
file: C:\Program Files (x86)\Intuit\QuickBooks Pro\Components\QBAgent\QBDAgent.exe
size: 118784
MD5: 3ADD8F553490B9A1192514B172890A07

Located: Startup (common), QuickBooks Update Agent.lnk
where: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup...
command: C:\Program Files (x86)\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
file: C:\Program Files (x86)\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
size: 972064
MD5: E77C55BE85ED6FA0A0AABC51C8D0E9BF

Located: WinLogon, VESWinlogon
command: VESWinlogon.dll
file: VESWinlogon.dll
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!



--- Browser helper object list ---
{074C1DC5-9320-4A9A-947D-C042949C6216} (ContributeBHO Class)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name:
CLSID name: ContributeBHO Class
Path: C:\Program Files (x86)\Adobe\
Long name: contributeieplugin.dll
Short name: CONTRI~1.DLL
Date (created): 3/16/2007 3:13:06 PM
Date (last access): 11/22/2008 9:54:30 PM
Date (last write): 3/16/2007 3:13:06 PM
Filesize: 118784
Attributes: archive
MD5: E23691A98928CE49586753982B8402A2
CRC32: 2CAFCB5A
Version: 1.0.0.0

{18DF081C-E8AD-4283-A596-FA578C2EBDC3} (AcroIEHelperStub)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name: AcroIEHelperStub
CLSID name: Adobe PDF Link Helper
Path: C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\
Long name: AcroIEHelperShim.dll
Short name: ACROIE~2.DLL
Date (created): 6/12/2008 12:33:16 AM
Date (last access): 9/28/2008 3:26:46 PM
Date (last write): 6/12/2008 12:33:16 AM
Filesize: 75128
Attributes: archive
MD5: E96C752BBA0E22330A43258FC800200E
CRC32: E5D72083
Version: 9.0.0.332

{53707962-6F74-2D53-2644-206D7942484F} (Spybot-S&D IE Protection)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name:
CLSID name: Spybot-S&D IE Protection
description: Spybot-S&D IE Browser plugin
classification: Legitimate
known filename: SDhelper.dll
info link: http://spybot.eon.net.au/
info source: Patrick M. Kolla
Path: C:\PROGRA~2\SPYBOT~1\
Long name: SDHelper.dll
Short name:
Date (created): 11/21/2008 9:23:20 PM
Date (last access): 11/21/2008 9:28:40 PM
Date (last write): 9/15/2008 2:25:44 PM
Filesize: 1562960
Attributes: readonly hidden sysfile archive
MD5: 35F73F1936BDE91F1B6995510A61E7A8
CRC32: BE6A5D15
Version: 1.6.2.14

{602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} (Symantec NCO BHO)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name: Symantec NCO BHO
CLSID name: Symantec NCO BHO
Path: C:\Program Files (x86)\Norton Internet Security\Engine\16.1.0.33\
Long name: CoIEPlg.dll
Short name:
Date (created): 11/23/2008 9:40:52 AM
Date (last access): 11/23/2008 9:40:52 AM
Date (last write): 11/4/2008 11:32:26 PM
Filesize: 340848
Attributes: readonly archive
MD5: E86FCD9AE2AAD9C54F5CDA667F59704E
CRC32: 2E38F589
Version: 2009.1.0.11

{6D53EC84-6AAE-4787-AEEE-F4628F01010C} (Symantec Intrusion Prevention)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name: Symantec Intrusion Prevention
CLSID name: Symantec Intrusion Prevention
Path: C:\Program Files (x86)\Norton Internet Security\Engine\16.1.0.33\
Long name: IPSBHO.dll
Short name:
Date (created): 11/23/2008 9:40:52 AM
Date (last access): 11/23/2008 9:40:52 AM
Date (last write): 11/23/2008 9:17:06 AM
Filesize: 107896
Attributes: readonly archive
MD5: FE17553789F8A318DCAF1811FFA021C4
CRC32: 9A61ED05
Version: 9.0.0.172

{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} (SSVHelper Class)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name:
CLSID name: SSVHelper Class
Path: C:\Program Files (x86)\Java\jre1.6.0\bin\
Long name: ssv.dll
Short name:
Date (created): 8/12/2008 4:03:34 PM
Date (last access): 9/28/2008 3:28:22 PM
Date (last write): 8/12/2008 4:03:34 PM
Filesize: 501384
Attributes: archive
MD5: 55A2F8AE42C4B347173F1AEDE5061BE3
CRC32: E41413E9
Version: 6.0.0.105

{7C554162-8CB7-45A4-B8F4-8EA1C75885F9} (AOL Toolbar BHO)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name: AOL Toolbar BHO
CLSID name: AOL Toolbar BHO
Path: C:\Program Files (x86)\AOL\AOL Toolbar 5.0\
Long name: aoltb.dll
Short name:
Date (created): 11/21/2007 12:00:34 PM
Date (last access): 9/28/2008 3:26:40 PM
Date (last write): 11/21/2007 12:00:34 PM
Filesize: 1185120
Attributes: archive
MD5: 6DCC603EF288E99AC8AFBFC9D126D83F
CRC32: 24C9AE28
Version: 5.3.12.2

{AE7CD045-E861-484f-8273-0445EE161910} (Adobe PDF Conversion Toolbar Helper)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name:
CLSID name: Adobe PDF Conversion Toolbar Helper
description: Adobe Acrobat
classification: Legitimate
known filename: AcroIEFavClient.dll
info link: http://www.adobe.com/products/acrobatpro/main.html
info source: TonyKlein
Path: C:\Program Files (x86)\Adobe\Acrobat 8.0\Acrobat\
Long name: AcroIEFavClient.dll
Short name: ACROIE~1.DLL
Date (created): 11/23/2008 6:09:14 PM
Date (last access): 5/11/2007 4:37:12 AM
Date (last write): 5/10/2007 10:47:04 PM
Filesize: 321120
Attributes: archive
MD5: FF29E3FB75E7726EE002B65A9F2D4A6E
CRC32: 1831F50E
Version: 8.1.0.0



--- ActiveX list ---
{17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool)
DPF name:
CLSID name: Windows Genuine Advantage Validation Tool
Installer: C:\Windows\Downloaded Program Files\LegitCheckControl.inf
Codebase: http://download.microsoft.com/download/8/b/d/8bd77752-5704-4d68-a152-f7252adaa4f2/LegitCheckControl.cab
description:
classification: Legitimate
known filename: LegitCheckControl.DLL
info link:
info source: Safer Networking Ltd.
Path: C:\Windows\SysWow64\
Long name: LegitCheckControl.DLL
Short name: LEGITC~1.DLL
Date (created): 3/20/2008 6:06:36 PM
Date (last access): 3/20/2008 6:06:36 PM
Date (last write): 3/20/2008 6:06:36 PM
Filesize: 1480232
Attributes: archive
MD5: E058C4821D48E0A67F6069CB50818D44
CRC32: 3513AE02
Version: 1.7.69.2

{8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.3.0_02)
DPF name: Java Runtime Environment 1.3.0_02
CLSID name: Java Plug-in 1.3.0_02
Installer: c:\winnt\Download Program Files\jinstall.inf
Codebase: http://java.sun.com/products/plugin/1.3.0_02/jinstall-130_02-win.cab
description: Sun Java
classification: Legitimate
known filename: %PROGRAM FILES%\JabaSoft\JRE\*\Bin\npjava131.dll
info link:
info source: Patrick M. Kolla
Path: C:\Program Files\JavaSoft\JRE\1.3.0_02\bin\
Long name: NPJava130_02.dll
Short name: NPJAVA~1.DLL
Date (created): 11/21/2008 10:31:36 PM
Date (last access): 11/21/2008 10:31:36 PM
Date (last write): 1/30/2001 11:21:04 AM
Filesize: 28777
Attributes: archive
MD5: 0A964CACEBC0C0C87A7D1AFF8FB24AA6
CRC32: B9BFEE0E
Version: 1.3.0.2

{CAFEEFAC-0016-0000-0000-ABCDEFFEDCBA} (Java Runtime Environment 1.6.0)
DPF name: Java Runtime Environment 1.6.0
CLSID name: Java Plug-in 1.6.0
Installer:
Codebase: http://java.sun.com/update/1.6.0/jinstall-1_6_0-windows-i586.cab
description:
classification: Legitimate
known filename: npjpi160.dll
info link:
info source: Safer Networking Ltd.
Path: C:\Program Files (x86)\Java\jre1.6.0\bin\
Long name: npjpi160.dll
Short name:
Date (created): 8/12/2008 4:03:34 PM
Date (last access): 9/28/2008 3:28:22 PM
Date (last write): 8/12/2008 4:03:34 PM
Filesize: 132744
Attributes: archive
MD5: 69AD062A99FF030285DE344BA8BF87C4
CRC32: 0695855F
Version: 6.0.0.105

{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} (Java Runtime Environment 1.6.0)
DPF name: Java Runtime Environment 1.6.0
CLSID name: Java Plug-in 1.6.0
Installer:
Codebase: http://java.sun.com/update/1.6.0/jinstall-1_6_0-windows-i586.cab
description:
classification: Legitimate
known filename: npjpi150_06.dll
info link:
info source: Safer Networking Ltd.
Path: C:\Program Files (x86)\Java\jre1.6.0\bin\
Long name: npjpi160.dll
Short name:
Date (created): 8/12/2008 4:03:34 PM
Date (last access): 9/28/2008 3:28:22 PM
Date (last write): 8/12/2008 4:03:34 PM
Filesize: 132744
Attributes: archive
MD5: 69AD062A99FF030285DE344BA8BF87C4
CRC32: 0695855F
Version: 6.0.0.105

{E19F9331-3110-11d4-991C-005004D3B3DB} (Java Runtime Environment 1.3.0_02)
DPF name: Java Runtime Environment 1.3.0_02
CLSID name: Java Plug-in 1.3.0_02
Installer: c:\winnt\Download Program Files\jinstall.inf
Codebase: http://java.sun.com/products/plugin/1.3.0_02/jinstall-130_02-win.cab
description:
classification: Legitimate
known filename: npjava130_02.dll
info link:
info source: Safer Networking Ltd.
Path: C:\Program Files\JavaSoft\JRE\1.3.0_02\bin\
Long name: NPJava130_02.dll
Short name: NPJAVA~1.DLL
Date (created): 11/21/2008 10:31:36 PM
Date (last access): 11/21/2008 10:31:36 PM
Date (last write): 1/30/2001 11:21:04 AM
Filesize: 28777
Attributes: archive
MD5: 0A964CACEBC0C0C87A7D1AFF8FB24AA6
CRC32: B9BFEE0E
Version: 1.3.0.2



--- Process list ---
PID: 0 ( 0) [System]
PID: 2420 (4012) C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe
size: 1833296
MD5: 63B3FF83B87AFCEBA89CED54695DA0F6
PID: 4272 (4012) C:\Program Files (x86)\Intuit\QuickBooks Pro\Components\QBAgent\QBDAgent.exe
size: 118784
MD5: 3ADD8F553490B9A1192514B172890A07
PID: 4280 (4104) C:\Program Files (x86)\Sony\ISB Utility\ISBMgr.exe
size: 317280
MD5: C61DFED19704FA252702727EFCFF97C3
PID: 4296 (4104) C:\Program Files (x86)\Java\jre1.6.0\bin\jusched.exe
size: 77824
MD5: AB74AA8DEFC1CA82759788A55B673629
PID: 4356 (4104) C:\Program Files\Sony\VAIO Wireless Wizard\AutoLaunchWLASU.exe
size: 24576
MD5: FF299BB033DC7B2FB3210F12869E344C
PID: 4436 (4104) C:\Program Files (x86)\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe
size: 623992
MD5: 4A0BBDF88636F2EF08420BDCD343D286
PID: 4524 (4316) C:\Program Files\Sony Corporation\SmartWi Connection Utility\CCP.exe
size: 28672
MD5: 34A547C5888B014BE2A3D5893A61450D
PID: 4764 (4524) C:\Program Files\Sony Corporation\SmartWi Connection Utility\PowerManager.exe
size: 40960
MD5: D856023D1705326CA013941821A8A83A
PID: 4776 (4524) C:\Program Files\Sony Corporation\SmartWi Connection Utility\ThirdPartyAppMgr.exe
size: 28672
MD5: B43838FFE6736AF6FB8EB42BD69CBA07
PID: 4804 (4524) C:\Program Files\Sony Corporation\SmartWi Connection Utility\UIManager.exe
size: 65536
MD5: AC510875424A0ADAA42659F8840A467D
PID: 4976 (4272) C:\Windows\SysWOW64\mrtMngr.EXE
size: 65024
MD5: 15C8C57C68A7262BD3157DE9F4D34329
PID: 5100 (4012) C:\Program Files (x86)\Spybot - Search & Destroy\SpybotSD.exe
size: 4891472
MD5: 3B1B5D09D3C9C4CD39D4DB06ED7A0855
PID: 4740 (4124) C:\Program Files (x86)\Internet Explorer\ieuser.exe
size: 299520
MD5: 5B2E1C16A2C420F60CD391B666003F14
PID: 4376 (4124) C:\Program Files (x86)\Internet Explorer\iexplore.exe
size: 625664
MD5: 5B92133D3E7FB2644677686305E29E81
PID: 4 ( 0) System
PID: 508 ( 4) smss.exe
PID: 648 ( 636) csrss.exe
PID: 692 ( 636) wininit.exe
size: 96768
PID: 704 ( 684) csrss.exe
PID: 748 ( 692) services.exe
size: 279040
PID: 772 ( 684) winlogon.exe
size: 314880
PID: 800 ( 692) lsass.exe
PID: 808 ( 692) lsm.exe
size: 229888
PID: 948 ( 748) svchost.exe
size: 21504
PID: 1008 ( 748) svchost.exe
size: 21504
PID: 612 ( 748) svchost.exe
size: 21504
PID: 708 ( 748) svchost.exe
size: 21504
PID: 740 ( 748) svchost.exe
size: 21504
PID: 1036 ( 612) audiodg.exe
size: 88064
PID: 1064 ( 748) SLsvc.exe
PID: 1104 ( 748) svchost.exe
size: 21504
PID: 1200 ( 748) RTKAUDIOSERVICE.EXE
size: 139808
PID: 1364 ( 748) svchost.exe
size: 21504
PID: 1492 ( 708) wlanext.exe
size: 74240
PID: 1584 ( 748) spoolsv.exe
PID: 1608 ( 748) svchost.exe
size: 21504
PID: 1932 ( 748) mDNSResponder.exe
PID: 1964 ( 748) EvtEng.exe
PID: 932 ( 748) iviRegMgr.exe
PID: 1240 ( 748) ccSvcHst.exe
PID: 1028 ( 740) taskeng.exe
size: 169472
PID: 1132 ( 748) svchost.exe
size: 21504
PID: 1872 ( 748) QBCFMonitorService.exe
PID: 2256 ( 748) RegSrvc.exe
PID: 2272 ( 748) svchost.exe
size: 21504
PID: 2328 ( 748) uCamMonitor.exe
PID: 2360 ( 748) VESMgr.exe
PID: 2388 ( 748) SPMService.exe
PID: 2428 ( 748) VCFw.exe
PID: 2436 ( 948) dllhost.exe
size: 7168
PID: 2484 ( 748) VzCdbSvc.exe
PID: 2508 ( 748) svchost.exe
size: 21504
PID: 2536 ( 748) SearchIndexer.exe
size: 439808
PID: 2608 (2360) VESMgrSub.exe
PID: 2716 ( 948) VESGfxMgr.exe
PID: 2768 ( 948) igfxext.exe
PID: 2776 ( 748) XAudio64.exe
PID: 2828 ( 948) igfxsrvc.exe
PID: 2996 ( 748) VCSW.exe
PID: 360 ( 948) WmiPrvSE.exe
PID: 3752 (1240) ccSvcHst.exe
PID: 3760 ( 740) C:\Windows\System32\taskeng.exe
size: 169472
MD5: 5F109032CE46B7184ED9E50F9FE8489E
PID: 3832 ( 708) C:\Windows\System32\dwm.exe
PID: 3932 (3848) C:\Program Files\Sony\VAIO Power Management\SPMgr.exe
size: 1767264
MD5: 5C8513290973F0242F861EA839B39B6A
PID: 4012 (3792) C:\Windows\explorer.exe
size: 3080704
MD5: F6D765FB6B457542D954682F50C26E4F
PID: 2476 (4012) C:\Windows\System32\hkcmd.exe
PID: 3348 (4012) C:\Windows\System32\igfxpers.exe
PID: 3440 ( 740) taskeng.exe
size: 169472
PID: 4008 (3440) VCsystray.exe
PID: 1424 (3440) VAIOUpdt.exe
PID: 3112 ( 948) C:\Windows\System32\igfxsrvc.exe
PID: 3824 (4012) C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
size: 1220392
MD5: 21978B9449FF52AA8ACCE0574C2261C4
PID: 4940 ( 748) FNPLicensingService.exe
PID: 4628 (3824) SynTPHelper.exe
PID: 4052 ( 748) TrustedInstaller.exe


--- Browser start & search pages list ---
Spybot - Search & Destroy browser pages report, 11/23/2008 6:28:13 PM

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Local Page
C:\Windows\system32\blank.htm
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Page
http://go.microsoft.com/fwlink/?LinkId=54896
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page
about:blank
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Default_Page_URL
http://www.sony.com/vaiopeople_f08
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Local Page
%SystemRoot%\system32\blank.htm
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Search Page
http://go.microsoft.com/fwlink/?LinkId=54896
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Start Page
http://go.microsoft.com/fwlink/?LinkId=69157
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Page_URL
http://www.sony.com/vaiopeople_f08
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Search_URL
http://go.microsoft.com/fwlink/?LinkId=54896


--- Winsock Layered Service Provider list ---
Protocol 0: MSAFD Tcpip [TCP/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IP protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip

Protocol 1: MSAFD Tcpip [UDP/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IP protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip

Protocol 2: MSAFD Tcpip [RAW/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IP protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip

Protocol 3: MSAFD Tcpip [TCP/IPv6]
GUID: {F9EAB0C0-26D4-11D0-BBBF-00AA006C34E4}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IPv6 protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip

Protocol 4: MSAFD Tcpip [UDP/IPv6]
GUID: {F9EAB0C0-26D4-11D0-BBBF-00AA006C34E4}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IPv6 protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip

Protocol 5: MSAFD Tcpip [RAW/IPv6]
GUID: {F9EAB0C0-26D4-11D0-BBBF-00AA006C34E4}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IPv6 protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip

Protocol 6: RSVP TCPv6 Service Provider
GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP RVSP
DB filename: %SystemRoot%\system32\rsvpsp.dll
DB protocol: RSVP * Service Provider

Protocol 7: RSVP TCP Service Provider
GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP RVSP
DB filename: %SystemRoot%\system32\rsvpsp.dll
DB protocol: RSVP * Service Provider

Protocol 8: RSVP UDPv6 Service Provider
GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP RVSP
DB filename: %SystemRoot%\system32\rsvpsp.dll
DB protocol: RSVP * Service Provider

Protocol 9: RSVP UDP Service Provider
GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP RVSP
DB filename: %SystemRoot%\system32\rsvpsp.dll
DB protocol: RSVP * Service Provider

Namespace Provider 0: @%SystemRoot%\system32\nlasvc.dll,-1000
GUID: {6642243A-3BA8-4AA6-BAA5-2E0BD71FDD83}
Filename: %SystemRoot%\system32\NLAapi.dll
Description: Microsoft Windows NT/2k/XP name space provider
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: NLA-Namespace

Namespace Provider 1: E-mail Naming Shim Provider
GUID: {964ACBA2-B2BC-40EB-8C6A-A6DB40161CAE}
Filename:

Namespace Provider 2: PNRP Cloud Namespace Provider
GUID: {03FE89CE-766D-4976-B9C1-BB9BC42C7B4D}
Filename:

Namespace Provider 3: PNRP Name Namespace Provider
GUID: {03FE89CD-766D-4976-B9C1-BB9BC42C7B4D}
Filename:

Namespace Provider 4: Tcpip
GUID: {22059D40-7E9E-11CF-AE5A-00AA00A7112B}
Filename:
Description: Microsoft Windows NT/2k/XP TCP/IP name space provider
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: TCP/IP

Namespace Provider 5: NTDS
GUID: {3B2637EE-E580-11CF-A555-00C04FD8D4AC}
Filename: %SystemRoot%\System32\winrnr.dll
Description: Microsoft Windows NT/2k/XP name space provider
DB filename: %SystemRoot%\system32\winrnr.dll
DB protocol: NTDS

Namespace Provider 6: mdnsNSP
GUID: {B600E6E9-553B-4A19-8696-335E5C896153}
Filename: C:\Program Files (x86)\Bonjour\mdnsNSP.dll
Description: Apple Rendezvous protocol
DB filename: %ProgramFiles%\Rendezvous\bin\mdnsNSP.dll
DB protocol: mdnsNSP

md usa spybot fan
2008-11-24, 07:03
BTU1234:

I personally do not see anything that would have caused the problem. Maybe someone else can spot something.

BTU1234
2008-11-24, 13:02
Hi There,

Thanks for the information.

Is there any way, other than a complete system re-install, to get Spybot out of my computer's system and get the system back to the state it was in before I installed it?

Everything worked well before installing Spybot. But I'm getting more and more problems, particularly with Adobe CS3 programs. Spybot is so complex and hard to use that I must have made a mistake somewhere.

And, yes, Spybot did pick up a bunch of eXactAdvertising stuff that it removed. I'd like to leave that out. But everything else needs to go back to its original state.

Thanks

md usa spybot fan
2008-11-24, 16:44
BTU1234:

To completely uninstall Spybot-S&D including any system registry entries or files that may have been altered while using various features of Spybot:
Go into Spybot > Immunize.
Click "Undo" button (at the top of the right pane).
Go into Spybot > Mode > Advanced Mode > Tools > Resident.
Uncheck (if checked) the following:
Resident "SDHelper" (Internet Explorer bad download blocker) active.
Resident "TeaTimer" (Protection of over-all system settings) active.

Go into Spybot > Mode > Advanced Mode > Tools > IE Tweaks.
Uncheck (if checked) any of the following "Miscellaneous locks":
Lock Hosts file read-only as protection against hijackers.
Lock IE start page setting against user changes (current user).
Lock IE control panel against opening from within IE (current user).

Exit Spybot-S&D
Make sure that TeaTimer is not running by checking for the TeaTimer System Tray Icon. If the icon is there:
Right click Spybot's TeaTimer System Tray Icon > click Exit Spybot-S&D Resident. TeaTimer should close.

Go to Windows > Control panel > Add or Remove Programs > Locate "Spybot – Search & Destroy" > Remove.
Reboot your system.
Using Windows explorer, verified that the following folder has been delete. If not, delete it:C:\Program Files\Spybot - Search & Destroy
If you want to make sure that all the registry entries that Spybot-S&D added during installation are removed, there is a .reg file available on the safer-networking.org WEB site that can do that. See the following article:
FAQ - Frequently Asked Questions
How to uninstall?
http://www.safer-networking.org/index.php?page=howto&detail=uninstall
The direct download link is:
this very small fix (http://www.safer-networking.org/files/remove-spybotsd-settings.reg)
--- or ---
remove-spybotsd-settings.reg (http://www.safer-networking.org/files/remove-spybotsd-settings.reg)
Download the file.
Double click on it
Answer Yes then OK

_____

I do not recommend doing the following at least not immediately since you have logs and recovery file that may have to be used:

When you are sure that you will no long require any files from running Spybot such as recovery files, logs, etc., delete the application directory:
Windows 95 or 98:
C:\Windows\Application Data\Spybot - Search & Destroy
Windows ME:
C:\Windows\All Users\Application Data\Spybot - Search & Destroy
Windows NT, 2000 or XP:
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
Windows Vista:
C:\ProgramData\Spybot - Search & Destroy

BTU1234
2008-11-25, 01:20
Hey There,

Thanks a million for the help. I'll get back in touch if anything else happens.

BTU