vervolg: het progamma weer geinstalleert ,na installatie direct op laten starten en het vindt zelf gelijk Mij Web Toolbar Browser Hijacker , aan gegeven het direct te verwijderen.De scan doorlaten lopen, en alles wat het vond laten verwijderen. Waarbij aangetekent dat vooraf, met de andere scanners alles al was nagelopen.
Heb de computer laten herstarten, met het resutaat weer niet op het internet!
Het progje van @Buffy gedaan , en er weer op het internet !
Kan er zelf niet echt achter komen waar het probleem echt zit?
Dit is het log van het programma na de scan:
Spyware Scan Details Start Date: 01/10/2005 14:19:05 End Date: 01/10/2005 14:22:07 Total Time: 3 mins 2 secs Detected Threats CoolWebSearch.StartPage Browser Hijacker more information... Details: CoolWebSearch StartPage hijacks Internet Explorers start page not allowing the user to change this URL. Status: Removed Severe threat - Severe threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. There exists a high possibility of potential system damage or security flaw. Attacker has complete control over your computer or install new software on your machine. Possible Browser Hijack Browser Hijacker more information... Details: A possible spyware threat has hijacked your Internet Explorer web browser. Status: Removed High threat - High risk threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction. May open up communication ports, use polymorphic tactics, stealth installations, and/or anti-spy counter measures. May us a security flaw in the operating system to gain access to your computer. StartNow Hyperbar Toolbar more information... Details: Hijacks Internet Epxlorer search and homepage URLs. Status: Removed High threat - High risk threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction. May open up communication ports, use polymorphic tactics, stealth installations, and/or anti-spy counter measures. May us a security flaw in the operating system to gain access to your computer. EUniverse Updater Browser Hijacker more information... Details: EUniverse is an adware program that runs at startup, generates popup ads, and performs a number of spyware related functions such as transmitting personal information and hijacking Internet Explorer. Status: Removed High threat - High risk threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction. May open up communication ports, use polymorphic tactics, stealth installations, and/or anti-spy counter measures. May us a security flaw in the operating system to gain access to your computer. NewDotNet Browser Plug-in more information... Details: New.Net is an Internet Explorer spyware/hijacker plug-in that adds subdomains of 'new.net' to your name resolution system (Windows ’ Host file), resulting in what appear to be extra top-level domains (.shop, and so on) being resolvable. Status: Removed High threat - High risk threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction. May open up communication ports, use polymorphic tactics, stealth installations, and/or anti-spy counter measures. May us a security flaw in the operating system to gain access to your computer. SearchSquire Adware more information... Details: SearchSquire is an Internet Explorer sidebar containing paid links that open when you use search engines. Status: Removed Elevated threat - Elevated threats are usually threats that fall into the range of adware in which data about a user's habits are tracked and sent back to a server for analysis without your consent or knowledge. Infected registry keys/values detected HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main Start Page_bak Infected registry keys/values detected HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3F2BBC05-40DF-11D2-9455-00104BC936FF} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3F2BBC05-40DF-11D2-9455-00104BC936FF}\ProgID warez.DocHostUIHandler HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3F2BBC05-40DF-11D2-9455-00104BC936FF} Implements DocHostUIHandler Infected registry keys/values detected HKEY_LOCAL_MACHINE\SOFTWARE\Vendor\xml HKEY_LOCAL_MACHINE\SOFTWARE\Vendor\xml Infected files detected c:\windows\ndnuninstall6_38.exe Infected registry keys/values detected HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\searchsquire.com HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\searchsquire.com * 4 pagina 1 van 2 01/10/2005 file://C:\Program Files\Microsoft AntiSpyware\B9677913-C17E-4FC2-9698-AE8E03...
Warez P2P Adware Bundler more information... Details: Warez P2P is a file sharing program that bundles adware/spyware including HyperBar, StartNow, and New.Net. Status: Ignored Moderate threat - Moderate threats may profile users online habits or broadcast data back to a server with 'opt-out' permission. In most cases this type of threat is more along the lines of commercial type adware that offer a premium service in exchange for tracking your user online performance. Detected Spyware Cookies No spyware cookies were found during this scan. Infected registry keys/values detected HKEY_CURRENT_USER\Software\Warez HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warez URL:Warez protocol HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warez URL Protocol HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warezo\shell\open\command HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warezo HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warezo URL:Warez Of1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warezo URL Protocol HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warezp\shell\open\command HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warezp HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warezp URL:Warez Of2 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warezp URL Protocol HKEY_CURRENT_USER\Software\Warez Stats.MBRecvd 22 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warezq\shell\open\command HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warezq HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warezq URL:Warez_Query protocol HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warezq URL Protocol HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warez.DocHostUIHandler\Clsid HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warez.DocHostUIHandler\Clsid {3F2BBC05-40DF-11D2-9455-00104BC936FF} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warez.DocHostUIHandler HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warez.DocHostUIHandler\Clsid {3F2BBC05-40DF-11D2-9455-00104BC936FF} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warez.DocHostUIHandler Implements DocHostUIHandler HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warez\shell\open\command HKEY_LOCAL_MACHINE\SOFTWARE\Classes\warez pagina 2 van 2 01/10/2005 file://C:\Program Files\Microsoft AntiSpyware\B9677913-C17E-4FC2-9698-AE8E03...
Het is nu wel zo dat het nu wel werkt!!