Norton vs SpyBot & Adware

Discussion in 'adware, spyware & hijack cleaning' started by gallan, Mar 20, 2004.

Thread Status:
Not open for further replies.
  1. gallan

    gallan Registered Member

    Mar 14, 2004
    Prior log post and suggested remedies appeared to correct pesky ghost dialer and hijacker.......


    C:\WINDOWS\secure.html is still lurking as a listing along with selected homepage, although it now longer shows up on log.

    Subsequent/recent Norton scan found 15 (non virus) items and was capable of removing all but the following 5 listings........which Spybot and Adware scan DID NOT reference/find.

    WHY can't (costly) norton software remove them......and why aren't they even recognized by Spybot or Adware?

    I have known about the bridge.dll, which can't be removed using novice methods. Is it "safe" to delete any of these listing.......even if I COULD locate the files, i.e.,

    > was unable to follow the routes beyond the first three references: C - WINDOWS - Temporary Internet files. WHERE IS Content.IE5? (bridge.dll, a.exe, cax.dll

    >could not find (or cdt bbi8016.exe) in WINDOWS TEMP

    The compressed file a.exe within C:\WINDOWS\Temporary Internet Files\Content.IE5\M00KJ1RI\bridge[1].cab is a Adware threat.

    The compressed file Belt.exe within C:\WINDOWS\TEMP\ is a Adware threat.

    The compressed file bridge.dll within C:\WINDOWS\Temporary Internet Files\Content.IE5\M00KJ1RI\bridge[1].cab is a Adware threat.

    The compressed file cax.dll within C:\WINDOWS\Temporary Internet Files\Content.IE5\0FOT0BAT\us_cax[1].cab is a Adware threat.

    The file C:\WINDOWS\TEMP\cdt_bbi8016.exe is a Adware threat.
  2. dvk01

    dvk01 Global Moderator

    Oct 9, 2003
    Loughton, Essex. UK
    empty temporary internet files folder by closing IE, go to control panel , click on Internet options/general tab and press delete files

    then using windows explorer go to windows/temp, select EVERYTHING in that folder and delete the whole lot.

    go to and download 'Hijack This!'.
    unzip it, make sure it is placed into it's own folder, not a temporary folder. Then doubleclick the Hijackthis.exe.
    Click the "Scan" button, when the scan is finished the scan button will become "Save Log" click that and save the log.
    Go to where you saved the log and click on "Edit > Select All" then click on "Edit > Copy" then Paste the log back here in a reply.
    It will possibly show issues deserving our attention, but most of what it lists will be harmless or even required,
    so do NOT fix anything yet.
    Someone here will be happy to help you analyze the results.

    having looked over your old post I see you have a CWS hijacker so
    download CWshredder from then unzip & Run it
    Close all browser windows, click on the cwshredder.exe then click "FIX" (Not "Scan only") and let it do it's thing.

    and make sure you follow the advice about the security updates listed on the last page, in order to prevent re-infection, otherwise you will be continually reinfected
    the patches are :
    *Note: The simplest way to make sure you have all the security patches is to go to Windows update and install all "Critical Updates & service Packs"
  3. TeMerc

    TeMerc Registered Member

    Feb 1, 2004
    PHX. AZ.
    Well, firstly, none of the AV companies can keep up with every variant of the new viruses and so forth that pop up every day, don't fault Norton products, the other brands miss just as much.
    As far as AdAware and Spybot go, they do actually detect some dialers and other more malicious apps, but, they are geared more towards the basics, ad/mal/spyware. So, again, don't fault them, they do a great job, as witness they both are the 2 top DLs on most freeware sites in the world. And, also, they are specifically targeted by a few of the more pervasive nasty scumware out there, to be detected, and turned off.
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.