Visualizzazione dei risultati da 1 a 5 su 5
  1. #1
    Utente di HTML.it L'avatar di crib
    Registrato dal
    Dec 2003
    Messaggi
    61

    maschera login ADSERVER

    ogni volta che apro la pagina di normalissimi e sicuri siti (dove prima non avevo nessuna sorpresa) mi si apre anche una finestra di login con i campi nume utent, password e dominio da inserire e "sito: adserver.webads.nl"...ma anche altri e quando leggo un'email che mi è arrivata da yahoo al posto di "sito: adserver.webads.nl" c'e "sito: "us.a1.yimg.com"...mai sentito? ne sapete qualcosa?
    eppure il due indirizzi fanno parte dell'elenco "killer" nel file C:\WINNT\system32\drivers\etc\host



    127.0.0.1 localhost
    127.0.0.1 adserver.webads.nl
    127.0.0.1 us.a1.yimg.com


    ================================================== ============

    ECCO il LOG di HijackThis con la spunta sull'opzione "calculate MD5 of files if possible",
    ....
    Logfile of HijackThis v1.98.1
    Scan saved at 12.00.45, on 03/08/2004
    Platform: Windows 2000 SP4 (WinNT 5.00.2195)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINNT\System32\smss.exe
    C:\WINNT\system32\csrss.exe
    C:\WINNT\system32\winlogon.exe
    C:\WINNT\system32\services.exe
    C:\WINNT\system32\lsass.exe
    C:\WINNT\system32\svchost.exe
    C:\WINNT\system32\svchost.exe
    C:\WINNT\system32\spoolsv.exe
    C:\WINNT\System32\msdtc.exe
    C:\Programmi\Network ICE\BlackICE\blackd.exe
    C:\WINNT\system32\ircomm2k.exe
    C:\WINNT\system32\nvsvc32.exe
    C:\Programmi\Panda Software\Panda Titanium Antivirus 2004\Pavsrv50.exe
    C:\WINNT\system32\tcpsvcs.exe
    C:\Programmi\Panda Software\Panda Titanium Antivirus 2004\AVENGINE.EXE
    C:\WINNT\System32\snmp.exe
    C:\WINNT\system32\stisvc.exe
    C:\Programmi\File comuni\Symantec Shared\CCPD-LC\symlcsvc.exe
    C:\WINNT\SYSTEM32\THOTKEY.EXE
    C:\WINNT\System32\WBEM\WinMgmt.exe
    C:\WINNT\System32\inetsrv\inetinfo.exe
    C:\WINNT\System32\mqsvc.exe
    C:\WINNT\Explorer.EXE
    C:\WINNT\System32\ezSP_Px.exe
    C:\Programmi\Toshiba\TOSHIBA Controls\TFncKy.exe
    C:\WINNT\system32\TFNF5.exe
    C:\Programmi\Typhoon\Notebook Mouse\5.0\MOUSE32A.EXE
    C:\Programmi\NetLaunch\launch.exe
    C:\Programmi\RAM Idle\RAMIdle.exe
    C:\WINNT\system32\TPWRTRAY.EXE
    C:\Programmi\QTbar\qtbar.exe
    C:\Programmi\Panda Software\Panda Titanium Antivirus 2004\APVXDWIN.EXE
    C:\Programmi\Babylon\Babylon.exe
    C:\Programmi\Qurb\QSP-2.1.203.0\QOELoader.exe
    C:\WINNT\StartupMonitor.exe
    C:\Programmi\Turbotop\Ttop.exe
    C:\Programmi\Panda Software\Panda Titanium Antivirus 2004\WebProxy.exe
    C:\Programmi\DU Meter\DUMETER.EXE
    C:\Programmi\TweakMASTER\TwMaster.exe
    C:\Programmi\Network ICE\BlackICE\blackice.exe
    C:\Programmi\HJ\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://mshp.dll/sp.html#10213
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page_bak = http://www.wintricks.it/index.shtml
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Collegamenti
    R3 - Default URLSearchHook is missing
    O2 - BHO: (no name) - {C56CB6B0-0D96-11D6-8C65-B2868B609932} - (no file)
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\programmi\google\googletoolbar2.dll (filesize 770048 bytes, MD5 6ECAAEB4BE272887C04919A4A8396DCD)
    O3 - Toolbar: @msdxmLC.dll,-1@1040,&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx (filesize 849680 bytes, MD5 C9C7011217ADDE31295130AE10CF2E45)
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\programmi\google\googletoolbar2.dll (filesize 770048 bytes, MD5 6ECAAEB4BE272887C04919A4A8396DCD)
    O4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINNT\System32\ezSP_Px.exe (filesize 40960 bytes, MD5 60BA97A94AE9BD2A8E241EC44B807A76)
    O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon (filesize 111376 bytes, MD5 FBE5CD4F730B331BFDABE729F4096611)
    O4 - HKLM\..\Run: [000StTHK] 000StTHK.exe (filesize 24576 bytes, MD5 CCB1A96002F0888DA70964781C742A82)
    O4 - HKLM\..\Run: [TFncKy] C:\Programmi\Toshiba\TOSHIBA Controls\TFncKy.exe /Type 20
    O4 - HKLM\..\Run: [TFNF5] TFNF5.exe (filesize 69632 bytes, MD5 ADCDA8984C42C33B0B9AC3CC7B3A86F8)
    O4 - HKLM\..\Run: [LWBMOUSE] C:\Programmi\Typhoon\Notebook Mouse\5.0\MOUSE32A.EXE (filesize 357376 bytes, MD5 13BE264551E9AE48906C16FBE870EDB3)
    O4 - HKLM\..\Run: [NetLaunch] C:\Programmi\NetLaunch\launch.exe (filesize 81920 bytes, MD5 E0E9946C35C9481799EDA251EDF0B066)
    O4 - HKLM\..\Run: [RAM Idle] C:\Programmi\RAM Idle\RAMIdle.exe (filesize 104960 bytes, MD5 62F16F758C35441BB10B8B5A0FAFE715)
    O4 - HKLM\..\Run: [Tweak UI] RUNDLL32.EXE TWEAKUI.CPL,TweakMeUp (filesize 10000 bytes, MD5 FEF164FC71FE934023BEBA34C8666C73)
    O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE (filesize 188416 bytes, MD5 9E71CBA021FF7BCB4CC0AA34BA3FB776)
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet (filesize 364544 bytes, MD5 0BB3E6D6F6A89F0B2994BABAE5BF8003)
    O4 - HKLM\..\Run: [APVXDWIN] "C:\Programmi\Panda Software\Panda Antivirus Titanium\APVXDWIN.EXE" /s
    O4 - HKLM\..\Run: [PPMemCheck] C:\Programmi\PestPatrol\PPMemCheck.exe (filesize 148480 bytes, MD5 8783DB0B018082051FB4BA3B9E0237CD)
    O4 - HKLM\..\Run: [PestPatrol Control Center] C:\Programmi\PestPatrol\PPControl.exe (filesize 53248 bytes, MD5 E2362C0CB43D5911007775E2EF99B2BA)
    O4 - HKLM\..\Run: [CookiePatrol] C:\Programmi\PestPatrol\CookiePatrol.exe (filesize 69632 bytes, MD5 BD0110A00ED856AD4601C20F82DEF09C)
    O4 - HKLM\..\Run: [TweakMASTER] "C:\Programmi\TweakMASTER\TwMaster.exe" /auto (filesize 1746432 bytes, MD5 713458D4C5DE923BF2F0681A16E670D8)
    O4 - HKLM\..\RunServices: [TSPOWER] TSPOWER.DRV
    O4 - HKCU\..\Run: [Apivision.com QTbar] C:\Programmi\QTbar\qtbar.exe (filesize 359936 bytes, MD5 652965BAA7F081FE5C9AF6ED530D6979)
    O4 - HKCU\..\Run: [SpySweeper] "C:\Programmi\Spy Sweeper\SpySweeper.exe" /0 (filesize 3210752 bytes, MD5 A08B41C7B0837BF30B5F7EF3587E56B0)
    O4 - Global Startup: APVXDWIN.EXE.lnk = C:\Programmi\Panda Software\Panda Titanium Antivirus 2004\APVXDWIN.EXE (filesize 204800 bytes, MD5 EC495C18570FE87AC34E9CC0E58492AE)
    O4 - Global Startup: Babylon.exe.lnk = C:\Programmi\Babylon\Babylon.exe (filesize 2379843 bytes, MD5 943DD007BBA69444F409AC53614FF5B8)
    O4 - Global Startup: qurb.lnk = C:\Programmi\Qurb\QSP-2.1.203.0\QOELoader.exe (filesize 6656 bytes, MD5 7A9FCF253D8086BBCE99665E1EA2F1EB)
    O4 - Global Startup: StartupMonitor.lnk = C:\WINNT\StartupMonitor.exe (filesize 86016 bytes, MD5 064805A7893898CBF058086832217771)
    O4 - Global Startup: Ttop.lnk = C:\Programmi\Turbotop\Ttop.exe (filesize 161792 bytes, MD5 A604C80C112AB02842969AEC675101E7)
    O8 - Extra context menu item: &Evidenzia - C:\WINNT\WEB\highlight.htm (filesize 277 bytes, MD5 C4A7DACCF223AD5D6D7024F4F3F3BE3E)
    O8 - Extra context menu item: &Google Search - res://c:\programmi\google\GoogleToolbar2.dll/cmsearch.html
    O8 - Extra context menu item: &Lista dei Links - C:\WINNT\WEB\urllist.htm (filesize 1892 bytes, MD5 5F161957F895BC40C1146B0B4A07397C)
    O8 - Extra context menu item: Apri Frame in &Nuova Finestra - C:\WINNT\WEB\frm2new.htm (filesize 72 bytes, MD5 02A3713396DEA33FE8012D08C5D8C010)
    O8 - Extra context menu item: Backward &Links - res://c:\programmi\google\GoogleToolbar2.dll/cmbacklinks.html
    O8 - Extra context menu item: Cac&hed Snapshot of Page - res://c:\programmi\google\GoogleToolbar2.dll/cmcache.html
    O8 - Extra context menu item: Lista delle I&mmagini - C:\WINNT\Web\imglist.htm (filesize 16017 bytes, MD5 005C6139F60CF6954FF72CDAB97244D8)
    O8 - Extra context menu item: Ricerca nel &Web - C:\WINNT\WEB\selsearch.htm (filesize 394 bytes, MD5 995487A1A44D95C386EBF51143D96293)
    O8 - Extra context menu item: Salva oggetto con Net Transport - C:\Programmi\NetTransport187\NTAddLink.html (filesize 1628 bytes, MD5 6389D958AA7FA340C960CA3B59058B86)
    O8 - Extra context menu item: Salva tutti gli oggetti con Net Transport - C:\Programmi\NetTransport187\NTAddList.html (filesize 754 bytes, MD5 64E85D3A3AFA8410B709DB34104ACE4E)
    O8 - Extra context menu item: Si&milar Pages - res://c:\programmi\google\GoogleToolbar2.dll/cmsimilar.html
    O8 - Extra context menu item: Zoom &In - C:\WINNT\WEB\zoomin.htm (filesize 452 bytes, MD5 C96EBFE037ED13526B6CD8C4D21F5FB5)
    O8 - Extra context menu item: Zoom O&ut - C:\WINNT\WEB\zoomout.htm (filesize 452 bytes, MD5 55A067792F21379659C69F6F2FBB00BF)
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINNT\system32\msjava.dll (filesize 947472 bytes, MD5 E75AA32C6B79C846F5314CA4DA92F29E)
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINNT\system32\msjava.dll (filesize 947472 bytes, MD5 E75AA32C6B79C846F5314CA4DA92F29E)
    O9 - Extra button: Compila - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Programmi\Siber Systems\AI RoboForm\RoboFormComFillForms.html
    O9 - Extra 'Tools' menuitem: Compila Modulo &] - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Programmi\Siber Systems\AI RoboForm\RoboFormComFillForms.html
    O9 - Extra button: Salva - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Programmi\Siber Systems\AI RoboForm\RoboFormComSavePass.html
    O9 - Extra 'Tools' menuitem: Salva Moduli &[ - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Programmi\Siber Systems\AI RoboForm\RoboFormComSavePass.html
    O9 - Extra button: Others - {6A0426D1-0FF2-49a0-ABC2-05B67826C727} - C:\Programmi\closeIeX\closeIeY.exe (filesize 36864 bytes, MD5 58220EA3140949A2D9DAAD8B012F7B05)
    O9 - Extra 'Tools' menuitem: Close OTHER IEx's - {6A0426D1-0FF2-49a0-ABC2-05B67826C727} - C:\Programmi\closeIeX\closeIeY.exe (filesize 36864 bytes, MD5 58220EA3140949A2D9DAAD8B012F7B05)
    O9 - Extra button: RoboForm - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Programmi\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
    O9 - Extra 'Tools' menuitem: RF Barra strumenti &2 - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Programmi\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
    O9 - Extra button: Maximizer - {C112BB87-7D00-11d5-A934-0010B5AEBFCE} - C:\Programmi\IE New Window Maximizer\checkup.exe (filesize 20480 bytes, MD5 21125A887E2FB02880E7BCEE67C86EC8)
    O9 - Extra 'Tools' menuitem: IE New Window Maximizer - {C112BB87-7D00-11d5-A934-0010B5AEBFCE} - C:\Programmi\IE New Window Maximizer\checkup.exe (filesize 20480 bytes, MD5 21125A887E2FB02880E7BCEE67C86EC8)
    O12 - Plugin for .pdf: C:\Programmi\Internet Explorer\PLUGINS\nppdf32.dll (filesize 133376 bytes, MD5 A2EA5C73896AC06D2811A2AC157350BF)
    O16 - DPF: Yahoo! Chat - http://us.chat1.yimg.com/us.yimg.com.../c381/chat.cab
    O16 - DPF: {2B323CD9-50E3-11D3-9466-00A0C9700498} - http://us.chat1.yimg.com/us.yimg.com...45/yacscom.cab
    O16 - DPF: {6CB5E471-C305-11D3-99A8-000086395495} - http://toolbar.google.com/data/it/bi.../GoogleNav.cab
    O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.4.1_02) -
    O16 - DPF: {CAFEEFAC-0014-0001-0002-ABCDEFFEDCBA} (Java Runtime Environment 1.4.1_02) -
    O17 - HKLM\System\CCS\Services\Tcpip\..\{85D46A58-94E3-442B-BC36-D6101B55F2CC}: NameServer = 193.70.192.25 193.70.152.25
    O17 - HKLM\System\CCS\Services\Tcpip\..\{E49046E1-4982-4A55-BA84-4312CB955AF6}: NameServer = 192.169.0.3
    O18 - Protocol: icoo - {4A8DADD4-5A25-4D41-8599-CB7458766220} - C:\WINNT\msopt.dll (file missing)
    Secondo alcuni autorevoli testi di tecnica di aeronautica, il calabrone non può volare, a causa della forma e del peso del proprio corpo in rapporto alla superficie alare.
    Ma il calabrone non lo sa e perciò continua a volare. I.S.

  2. #2
    Moderatore di Sicurezza informatica e virus L'avatar di amvinfe
    Registrato dal
    May 2002
    Messaggi
    6,739
    dalla provvisoria elimina questi valori
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://mshp.dll/sp.html#10213
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about :blank
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    R3 - Default URLSearchHook is missing
    O2 - BHO: (no name) - {C56CB6B0-0D96-11D6-8C65-B2868B609932} - (no file)
    O18 - Protocol: icoo - {4A8DADD4-5A25-4D41-8599-CB7458766220} - C:\WINNT\msopt.dll (file missing)

    fai sempre dalla provvisoria una scansione con AdAware.
    ==
    Visita il mio blog SuspectFile.com
    ==

  3. #3
    Utente di HTML.it L'avatar di crib
    Registrato dal
    Dec 2003
    Messaggi
    61
    ad-aware
    spybot s&d
    pestpatrol
    spy sweeper
    panda antivirus

    e lo stesso HijackThis

    Tutti aggiornati

    non hanno risolto il problema...

    Riporto il log di HijackThis dopo le pulizie:

    Logfile of HijackThis v1.98.1
    Scan saved at 16.40.27, on 03/08/2004
    Platform: Windows 2000 SP4 (WinNT 5.00.2195)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINNT\System32\smss.exe
    C:\WINNT\system32\csrss.exe
    C:\WINNT\system32\winlogon.exe
    C:\WINNT\system32\services.exe
    C:\WINNT\system32\lsass.exe
    C:\WINNT\system32\svchost.exe
    C:\WINNT\system32\svchost.exe
    C:\WINNT\system32\spoolsv.exe
    C:\WINNT\System32\msdtc.exe
    C:\Programmi\Network ICE\BlackICE\blackd.exe
    C:\WINNT\system32\ircomm2k.exe
    C:\WINNT\system32\nvsvc32.exe
    C:\Programmi\Panda Software\Panda Titanium Antivirus 2004\Pavsrv50.exe
    C:\WINNT\system32\tcpsvcs.exe
    C:\Programmi\Panda Software\Panda Titanium Antivirus 2004\AVENGINE.EXE
    C:\WINNT\System32\snmp.exe
    C:\WINNT\system32\stisvc.exe
    C:\Programmi\File comuni\Symantec Shared\CCPD-LC\symlcsvc.exe
    C:\WINNT\SYSTEM32\THOTKEY.EXE
    C:\WINNT\System32\WBEM\WinMgmt.exe
    C:\WINNT\System32\inetsrv\inetinfo.exe
    C:\WINNT\System32\mqsvc.exe
    C:\WINNT\Explorer.EXE
    C:\WINNT\System32\ezSP_Px.exe
    C:\Programmi\Toshiba\TOSHIBA Controls\TFncKy.exe
    C:\WINNT\system32\TFNF5.exe
    C:\Programmi\Typhoon\Notebook Mouse\5.0\MOUSE32A.EXE
    C:\Programmi\NetLaunch\launch.exe
    C:\Programmi\RAM Idle\RAMIdle.exe
    C:\WINNT\system32\TPWRTRAY.EXE
    C:\Programmi\PestPatrol\PPMemCheck.exe
    C:\Programmi\PestPatrol\PPControl.exe
    C:\Programmi\PestPatrol\CookiePatrol.exe
    C:\Programmi\QTbar\qtbar.exe
    C:\Programmi\Spy Sweeper\SpySweeper.exe
    C:\Programmi\Panda Software\Panda Titanium Antivirus 2004\APVXDWIN.EXE
    C:\Programmi\Babylon\Babylon.exe
    C:\Programmi\Qurb\QSP-2.1.203.0\QOELoader.exe
    C:\WINNT\StartupMonitor.exe
    C:\Programmi\Turbotop\Ttop.exe
    C:\Programmi\Panda Software\Panda Titanium Antivirus 2004\WebProxy.exe
    C:\WINNT\system32\rundll32.exe
    C:\Programmi\DU Meter\DUMETER.EXE
    C:\Programmi\Avant Browser\iexplore.exe
    C:\Programmi\TweakMASTER\TwMaster.exe
    C:\Programmi\Avant Browser\aHTTP.exe
    C:\Programmi\Network ICE\BlackICE\blackice.exe
    C:\Programmi\Outlook Express\msimn.exe
    C:\Programmi\HJ\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page_bak = http://www.wintricks.it/index.shtml
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\programmi\google\googletoolbar2.dll (filesize 770048 bytes, MD5 6ECAAEB4BE272887C04919A4A8396DCD)
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\programmi\google\googletoolbar2.dll (filesize 770048 bytes, MD5 6ECAAEB4BE272887C04919A4A8396DCD)
    O4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINNT\System32\ezSP_Px.exe (filesize 40960 bytes, MD5 60BA97A94AE9BD2A8E241EC44B807A76)
    O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon (filesize 111376 bytes, MD5 FBE5CD4F730B331BFDABE729F4096611)
    O4 - HKLM\..\Run: [000StTHK] 000StTHK.exe (filesize 24576 bytes, MD5 CCB1A96002F0888DA70964781C742A82)
    O4 - HKLM\..\Run: [TFncKy] C:\Programmi\Toshiba\TOSHIBA Controls\TFncKy.exe /Type 20
    O4 - HKLM\..\Run: [TFNF5] TFNF5.exe (filesize 69632 bytes, MD5 ADCDA8984C42C33B0B9AC3CC7B3A86F8)
    O4 - HKLM\..\Run: [LWBMOUSE] C:\Programmi\Typhoon\Notebook Mouse\5.0\MOUSE32A.EXE (filesize 357376 bytes, MD5 13BE264551E9AE48906C16FBE870EDB3)
    O4 - HKLM\..\Run: [NetLaunch] C:\Programmi\NetLaunch\launch.exe (filesize 81920 bytes, MD5 E0E9946C35C9481799EDA251EDF0B066)
    O4 - HKLM\..\Run: [RAM Idle] C:\Programmi\RAM Idle\RAMIdle.exe (filesize 104960 bytes, MD5 62F16F758C35441BB10B8B5A0FAFE715)
    O4 - HKLM\..\Run: [Tweak UI] RUNDLL32.EXE TWEAKUI.CPL,TweakMeUp (filesize 10000 bytes, MD5 FEF164FC71FE934023BEBA34C8666C73)
    O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE (filesize 188416 bytes, MD5 9E71CBA021FF7BCB4CC0AA34BA3FB776)
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet (filesize 364544 bytes, MD5 0BB3E6D6F6A89F0B2994BABAE5BF8003)
    O4 - HKLM\..\Run: [APVXDWIN] "C:\Programmi\Panda Software\Panda Antivirus Titanium\APVXDWIN.EXE" /s
    O4 - HKLM\..\Run: [PPMemCheck] C:\Programmi\PestPatrol\PPMemCheck.exe (filesize 148480 bytes, MD5 8783DB0B018082051FB4BA3B9E0237CD)
    O4 - HKLM\..\Run: [PestPatrol Control Center] C:\Programmi\PestPatrol\PPControl.exe (filesize 53248 bytes, MD5 E2362C0CB43D5911007775E2EF99B2BA)
    O4 - HKLM\..\Run: [CookiePatrol] C:\Programmi\PestPatrol\CookiePatrol.exe (filesize 69632 bytes, MD5 BD0110A00ED856AD4601C20F82DEF09C)
    O4 - HKLM\..\Run: [TweakMASTER] "C:\Programmi\TweakMASTER\TwMaster.exe" /auto (filesize 1746432 bytes, MD5 713458D4C5DE923BF2F0681A16E670D8)
    O4 - HKLM\..\RunServices: [TSPOWER] TSPOWER.DRV
    O4 - HKCU\..\Run: [Apivision.com QTbar] C:\Programmi\QTbar\qtbar.exe (filesize 359936 bytes, MD5 652965BAA7F081FE5C9AF6ED530D6979)
    O4 - HKCU\..\Run: [SpySweeper] "C:\Programmi\Spy Sweeper\SpySweeper.exe" /0 (filesize 3210752 bytes, MD5 A08B41C7B0837BF30B5F7EF3587E56B0)
    O4 - Global Startup: APVXDWIN.EXE.lnk = C:\Programmi\Panda Software\Panda Titanium Antivirus 2004\APVXDWIN.EXE (filesize 204800 bytes, MD5 EC495C18570FE87AC34E9CC0E58492AE)
    O4 - Global Startup: Babylon.exe.lnk = C:\Programmi\Babylon\Babylon.exe (filesize 2379843 bytes, MD5 943DD007BBA69444F409AC53614FF5B8)
    O4 - Global Startup: qurb.lnk = C:\Programmi\Qurb\QSP-2.1.203.0\QOELoader.exe (filesize 6656 bytes, MD5 7A9FCF253D8086BBCE99665E1EA2F1EB)
    O4 - Global Startup: StartupMonitor.lnk = C:\WINNT\StartupMonitor.exe (filesize 86016 bytes, MD5 064805A7893898CBF058086832217771)
    O4 - Global Startup: Ttop.lnk = C:\Programmi\Turbotop\Ttop.exe (filesize 161792 bytes, MD5 A604C80C112AB02842969AEC675101E7)
    O8 - Extra context menu item: &Evidenzia - C:\WINNT\WEB\highlight.htm (filesize 277 bytes, MD5 C4A7DACCF223AD5D6D7024F4F3F3BE3E)
    O8 - Extra context menu item: &Google Search - res://c:\programmi\google\GoogleToolbar2.dll/cmsearch.html
    O8 - Extra context menu item: &Lista dei Links - C:\WINNT\WEB\urllist.htm (filesize 1892 bytes, MD5 5F161957F895BC40C1146B0B4A07397C)
    O8 - Extra context menu item: Apri Frame in &Nuova Finestra - C:\WINNT\WEB\frm2new.htm (filesize 72 bytes, MD5 02A3713396DEA33FE8012D08C5D8C010)
    O8 - Extra context menu item: Backward &Links - res://c:\programmi\google\GoogleToolbar2.dll/cmbacklinks.html
    O8 - Extra context menu item: Cac&hed Snapshot of Page - res://c:\programmi\google\GoogleToolbar2.dll/cmcache.html
    O8 - Extra context menu item: Lista delle I&mmagini - C:\WINNT\Web\imglist.htm (filesize 16017 bytes, MD5 005C6139F60CF6954FF72CDAB97244D8)
    O8 - Extra context menu item: Ricerca nel &Web - C:\WINNT\WEB\selsearch.htm (filesize 394 bytes, MD5 995487A1A44D95C386EBF51143D96293)
    O8 - Extra context menu item: Salva oggetto con Net Transport - C:\Programmi\NetTransport187\NTAddLink.html (filesize 1628 bytes, MD5 6389D958AA7FA340C960CA3B59058B86)
    O8 - Extra context menu item: Salva tutti gli oggetti con Net Transport - C:\Programmi\NetTransport187\NTAddList.html (filesize 754 bytes, MD5 64E85D3A3AFA8410B709DB34104ACE4E)
    O8 - Extra context menu item: Si&milar Pages - res://c:\programmi\google\GoogleToolbar2.dll/cmsimilar.html
    O8 - Extra context menu item: Zoom &In - C:\WINNT\WEB\zoomin.htm (filesize 452 bytes, MD5 C96EBFE037ED13526B6CD8C4D21F5FB5)
    O8 - Extra context menu item: Zoom O&ut - C:\WINNT\WEB\zoomout.htm (filesize 452 bytes, MD5 55A067792F21379659C69F6F2FBB00BF)
    O9 - Extra button: Compila - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Programmi\Siber Systems\AI RoboForm\RoboFormComFillForms.html
    O9 - Extra 'Tools' menuitem: Compila Modulo &] - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Programmi\Siber Systems\AI RoboForm\RoboFormComFillForms.html
    O9 - Extra button: Salva - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Programmi\Siber Systems\AI RoboForm\RoboFormComSavePass.html
    O9 - Extra 'Tools' menuitem: Salva Moduli &[ - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Programmi\Siber Systems\AI RoboForm\RoboFormComSavePass.html
    O9 - Extra button: RoboForm - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Programmi\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
    O9 - Extra 'Tools' menuitem: RF Barra strumenti &2 - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Programmi\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
    O16 - DPF: {6CB5E471-C305-11D3-99A8-000086395495} - http://toolbar.google.com/data/it/bi.../GoogleNav.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{85D46A58-94E3-442B-BC36-D6101B55F2CC}: NameServer = 193.70.192.25 193.70.152.25
    Secondo alcuni autorevoli testi di tecnica di aeronautica, il calabrone non può volare, a causa della forma e del peso del proprio corpo in rapporto alla superficie alare.
    Ma il calabrone non lo sa e perciò continua a volare. I.S.

  4. #4
    Utente di HTML.it L'avatar di crib
    Registrato dal
    Dec 2003
    Messaggi
    61
    ...ho rilevato una cosa importante facendo una prova:
    nel file C:\WINNT\system32\drivers\etc\host ho aggiunto una riga con un indirizzo sicuro (127.0.0.1 www.sitoprova.it) affinchè non mi si permettese il collegamento, poi ho cercato di collegarmici ed è apparsa la stessa finestra di login di cui ho tanto parlato sopra ma con l'intestazione del sito di prova...

    Ne ho dedotto che ogni volta che mi collego ad un indirizzo presente nel file C:\WINNT\system32\drivers\etc\host (anteceduto da 127.0.0.1) si visualizza la famosa maschera di login...

    a questo punto secondo me c'è da settare/variare qualche parametro riguardante le regole di login nel registro o in qualche strumento d'amministrazione...tipo "qualcosa che mi permetta di non inserire ogni volta i dati che si presentino in una maschera del genere e per quel genere di utilizzo..."io non so dove e quale...

    ..chiedo al MODERATORE se sarebbe il caso di postare 'sto quesito ad un esperto di reti nell'apposita sezione..
    grazie
    Secondo alcuni autorevoli testi di tecnica di aeronautica, il calabrone non può volare, a causa della forma e del peso del proprio corpo in rapporto alla superficie alare.
    Ma il calabrone non lo sa e perciò continua a volare. I.S.

  5. #5
    Moderatore di Sicurezza informatica e virus L'avatar di amvinfe
    Registrato dal
    May 2002
    Messaggi
    6,739
    puoi provare
    ==
    Visita il mio blog SuspectFile.com
    ==

Permessi di invio

  • Non puoi inserire discussioni
  • Non puoi inserire repliche
  • Non puoi inserire allegati
  • Non puoi modificare i tuoi messaggi
  •  
Powered by vBulletin® Version 4.2.1
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved.