
Bramboo
Lid-
Items
9 -
Registratiedatum
-
Laatst bezocht
Alles dat geplaatst werd door Bramboo
-
oke dan ga ik dat proberen. kun jij iets met die windows update log? want daardoor werkt mn laptop op dit moment niet goed, omdat ie zo ver achter loopt met updaten.
-
windows update log: 2010-06-10 18:24:15:538 1396 2150 AU AU received handle event 2010-06-10 18:24:16:330 1396 2150 AU AU setting pending client directive to 'Unable To Detect' 2010-06-10 18:24:32:595 1396 2150 AU Launched new AU client for directive 'Unable To Detect', session id = 0x1 2010-06-10 18:24:36:578 1396 2150 AU AU received handle event 2010-06-10 18:24:36:578 1396 2150 AU AU setting pending client directive to 'Unable To Detect' 2010-06-10 18:24:51:580 1396 2150 AU WARNING: AU found no suitable session to launch client in 2010-06-10 18:25:07:846 1396 2150 Shutdwn user declined update at shutdown 2010-06-10 18:25:08:038 1396 2150 AU AU initiates service shutdown 2010-06-10 18:25:08:203 1396 2150 AU ########### AU: Uninitializing Automatic Updates ########### 2010-06-10 18:25:29:140 1396 2150 Report CWERReporter finishing event handling. (00000000) 2010-06-10 18:25:29:839 1396 2150 Service ********* 2010-06-10 18:25:29:839 1396 2150 Service ** END ** Service: Service exit [Exit code = 0x240001] 2010-06-10 18:25:29:839 1396 2150 Service ************* 2010-06-10 18:34:22:431 1432 18f4 Misc =========== Logging initialized (build: 7.4.7600.226, tz: +0200) =========== 2010-06-10 18:34:23:942 1432 18f4 Misc = Process: C:\Windows\system32\svchost.exe 2010-06-10 18:34:24:364 1432 18f4 Misc = Module: c:\windows\system32\wuaueng.dll 2010-06-10 18:34:22:431 1432 18f4 Service ************* 2010-06-10 18:34:25:388 1432 18f4 Service ** START ** Service: Service startup 2010-06-10 18:34:25:474 1432 18f4 Service ********* 2010-06-10 18:34:34:001 1432 18f4 Agent * WU client version 7.4.7600.226 2010-06-10 18:34:37:161 1432 18f4 Agent * Base directory: C:\Windows\SoftwareDistribution 2010-06-10 18:34:38:739 1432 18f4 Agent * Access type: No proxy 2010-06-10 18:34:39:145 1432 18f4 Agent * Network state: Connected 2010-06-10 18:35:51:137 1432 18f4 Report CWERReporter::Init succeeded 2010-06-10 18:35:51:137 1432 18f4 Agent *********** Agent: Initializing Windows Update Agent *********** 2010-06-10 18:35:51:137 1432 18f4 Agent *********** Agent: Initializing global settings cache *********** 2010-06-10 18:35:51:137 1432 18f4 Agent * WSUS server: <NULL> 2010-06-10 18:35:51:137 1432 18f4 Agent * WSUS status server: <NULL> 2010-06-10 18:35:51:137 1432 18f4 Agent * Target group: (Unassigned Computers) 2010-06-10 18:35:51:137 1432 18f4 Agent * Windows Update access disabled: No 2010-06-10 18:35:51:179 1432 18f4 DnldMgr Download manager restoring 0 downloads 2010-06-10 18:35:51:207 1432 18f4 DnldMgr Retrieved 18 persisted download jobs 2010-06-10 18:35:51:207 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 0] *********** 2010-06-10 18:35:51:207 1432 18f4 DnldMgr * BITS JobId = {689DFF06-8C39-4F51-BD2C-1ACE31178643} 2010-06-10 18:35:51:207 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:51:250 1432 18f4 DnldMgr * UpdateId = {4F5D8232-6043-4796-B093-8ABD14017A34}.100 2010-06-10 18:35:51:558 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:51:566 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 1] *********** 2010-06-10 18:35:51:566 1432 18f4 DnldMgr * BITS JobId = {8A6E770A-2E40-41DD-8BCD-53073D9AF30D} 2010-06-10 18:35:51:566 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:51:605 1432 18f4 DnldMgr * UpdateId = {477F8C91-218D-403E-A4A2-D63402504D75}.101 2010-06-10 18:35:51:746 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:51:746 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 2] *********** 2010-06-10 18:35:51:746 1432 18f4 DnldMgr * BITS JobId = {4940091D-A167-4A5E-9BA3-95E9DD58E7E1} 2010-06-10 18:35:51:746 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:51:777 1432 18f4 DnldMgr * UpdateId = {CD5CF387-51E5-4CB8-ACAE-398D10ED966C}.101 2010-06-10 18:35:51:957 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:51:957 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 3] *********** 2010-06-10 18:35:51:957 1432 18f4 DnldMgr * BITS JobId = {A2DC8D22-00E1-4AAB-B495-B93EF5667A78} 2010-06-10 18:35:51:957 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:51:980 1432 18f4 DnldMgr * UpdateId = {E21FB04E-716E-45A3-BC0A-47D83182010D}.101 2010-06-10 18:35:52:066 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:52:066 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 4] *********** 2010-06-10 18:35:52:066 1432 18f4 DnldMgr * BITS JobId = {47D8F830-7D6D-4DEA-8F98-7A6C5E3FA967} 2010-06-10 18:35:52:066 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:52:082 1432 18f4 DnldMgr * UpdateId = {F9501614-A81B-4641-8AFC-D4FFCCED7F5F}.102 2010-06-10 18:35:52:152 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:52:152 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 5] *********** 2010-06-10 18:35:52:152 1432 18f4 DnldMgr * BITS JobId = {804EA533-A474-4531-8727-6F4409CC6340} 2010-06-10 18:35:52:152 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:52:183 1432 18f4 DnldMgr * UpdateId = {0C128189-FF1E-4781-8FDD-08DD27F284B6}.102 2010-06-10 18:35:52:242 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:52:242 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 6] *********** 2010-06-10 18:35:52:242 1432 18f4 DnldMgr * BITS JobId = {EFEDA733-924B-42CE-9EEE-2229A3CC969C} 2010-06-10 18:35:52:242 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:52:254 1432 18f4 DnldMgr * UpdateId = {85BF2FA3-C8E2-4093-9A6E-212D83C5351F}.101 2010-06-10 18:35:52:340 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:52:340 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 7] *********** 2010-06-10 18:35:52:340 1432 18f4 DnldMgr * BITS JobId = {D3F0B238-18F2-4275-9AA6-51F9EEA7D1BC} 2010-06-10 18:35:52:340 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:52:355 1432 18f4 DnldMgr * UpdateId = {DF487C62-0854-4CCB-8960-EFA394E79976}.100 2010-06-10 18:35:52:449 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:52:449 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 8] *********** 2010-06-10 18:35:52:449 1432 18f4 DnldMgr * BITS JobId = {092E1B3F-34F4-4755-B902-56232B1EF12B} 2010-06-10 18:35:52:449 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:52:453 1432 18f4 DnldMgr * UpdateId = {E1CA5D48-2217-4736-992C-E34836E4C075}.100 2010-06-10 18:35:52:496 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:52:500 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 9] *********** 2010-06-10 18:35:52:500 1432 18f4 DnldMgr * BITS JobId = {D11B9A44-344D-453B-8C8A-7AD5729C5166} 2010-06-10 18:35:52:500 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:52:504 1432 18f4 DnldMgr * UpdateId = {6275596C-6E83-4558-81D4-20457A6340D5}.101 2010-06-10 18:35:52:633 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:52:633 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 10] *********** 2010-06-10 18:35:52:633 1432 18f4 DnldMgr * BITS JobId = {6050FF73-F29A-4E86-A9B0-3345A5A7A4E4} 2010-06-10 18:35:52:633 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:52:636 1432 18f4 DnldMgr * UpdateId = {B2CD6820-9B82-4108-824D-2E0BF92BF90F}.101 2010-06-10 18:35:52:808 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:52:808 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 11] *********** 2010-06-10 18:35:52:808 1432 18f4 DnldMgr * BITS JobId = {22E74278-7B09-4EF8-83ED-C78AFF09D5DD} 2010-06-10 18:35:52:808 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:52:898 1432 18f4 DnldMgr * UpdateId = {97A3BA78-6130-4808-A7C0-4A6AC89D20D8}.102 2010-06-10 18:35:52:996 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:52:996 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 12] *********** 2010-06-10 18:35:52:996 1432 18f4 DnldMgr * BITS JobId = {E8B350AA-4A7E-4347-8033-2C9671671C11} 2010-06-10 18:35:52:996 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:53:031 1432 18f4 DnldMgr * UpdateId = {D6D12E09-8564-4D61-AA68-20AACD637B3C}.103 2010-06-10 18:35:53:121 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:53:121 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 13] *********** 2010-06-10 18:35:53:121 1432 18f4 DnldMgr * BITS JobId = {F457F3B0-A440-41BB-BF79-C47E75E5505C} 2010-06-10 18:35:53:121 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:53:144 1432 18f4 DnldMgr * UpdateId = {2F7F1542-2B38-4F04-A728-75539971CCF3}.105 2010-06-10 18:35:53:238 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:53:238 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 14] *********** 2010-06-10 18:35:53:238 1432 18f4 DnldMgr * BITS JobId = {AA972CCD-09F7-4D15-8959-37471627E6A9} 2010-06-10 18:35:53:238 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:53:238 1432 18f4 DnldMgr * UpdateId = {41D2AC66-E91D-41BA-B7B8-57EB9385CD9D}.101 2010-06-10 18:35:53:375 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:53:375 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 15] *********** 2010-06-10 18:35:53:375 1432 18f4 DnldMgr * BITS JobId = {D91D9CD6-36A8-4F25-98EE-304716A7B3DE} 2010-06-10 18:35:53:375 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:53:379 1432 18f4 DnldMgr * UpdateId = {4A978EEB-9758-46C4-872D-E978811DC8A2}.101 2010-06-10 18:35:53:441 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:53:441 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 16] *********** 2010-06-10 18:35:53:441 1432 18f4 DnldMgr * BITS JobId = {FA5B2AE7-15F2-4BAF-B281-D9939F662967} 2010-06-10 18:35:53:441 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:53:441 1432 18f4 DnldMgr * UpdateId = {72A0ABD5-DACF-42E2-96D0-9404E9E849FF}.102 2010-06-10 18:35:53:636 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:53:636 1432 18f4 DnldMgr *********** DnldMgr: Restoring download [no. 17] *********** 2010-06-10 18:35:53:636 1432 18f4 DnldMgr * BITS JobId = {AB7AF4EF-A758-4755-AE6B-8EA0C2EA77D6} 2010-06-10 18:35:53:636 1432 18f4 DnldMgr * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D} 2010-06-10 18:35:53:636 1432 18f4 DnldMgr * UpdateId = {722958DA-82B1-42C5-BD49-CAD349C6EE78}.101 2010-06-10 18:35:53:687 1432 18f4 DnldMgr * Restored download job. 2010-06-10 18:35:53:765 1432 18f4 AU ########### AU: Initializing Automatic Updates ########### 2010-06-10 18:35:53:785 1432 18f4 AU # Approval type: Scheduled (User preference) 2010-06-10 18:35:53:785 1432 18f4 AU # Scheduled install day/time: Every day at 3:00 2010-06-10 18:35:53:785 1432 18f4 AU # Auto-install minor updates: Yes (User preference) 2010-06-10 18:35:54:558 1432 18f4 AU Setting AU scheduled install time to 2010-06-11 01:00:00 2010-06-10 18:35:54:558 1432 18f4 AU Initializing featured updates 2010-06-10 18:35:54:558 1432 18f4 AU Found 0 cached featured updates 2010-06-10 18:35:54:558 1432 18f4 AU AU setting pending client directive to 'Unable To Detect' 2010-06-10 18:35:54:566 1432 18f4 AU AU finished delayed initialization 2010-06-10 18:35:56:011 1432 18f4 Report *********** Report: Initializing static reporting data *********** 2010-06-10 18:35:56:011 1432 18f4 Report * OS Version = 6.0.6002.2.0.66304 2010-06-10 18:35:56:011 1432 18f4 Report * OS Product Type = 0x00000002 2010-06-10 18:35:56:144 1432 18f4 Report * Computer Brand = Dell Inc. 2010-06-10 18:35:56:144 1432 18f4 Report * Computer Model = Vostro 1000 2010-06-10 18:35:56:226 1432 18f4 Report * Bios Revision = 2.4.1 2010-06-10 18:35:56:226 1432 18f4 Report * Bios Name = BIOS Version 2.4.1 2010-06-10 18:35:56:226 1432 18f4 Report * Bios Release Date = 2006-05-31T00:00:00 2010-06-10 18:35:56:226 1432 18f4 Report * Locale ID = 1043 2010-06-10 18:36:03:343 1432 3728 Report CWERReporter finishing event handling. (00000000) 2010-06-10 18:36:09:636 1432 18f4 AU Launched new AU client for directive 'Unable To Detect', session id = 0x1 2010-06-10 22:02:14:500 1432 18f4 AU ############# 2010-06-10 22:02:14:533 1432 18f4 AU ## START ## AU: Search for updates 2010-06-10 22:02:14:533 1432 18f4 AU ######### 2010-06-10 22:02:14:970 1432 18f4 AU <<## SUBMITTED ## AU: Search for updates [CallId = {8DF766BD-4F76-452B-9D29-2B7F6E02F583}] 2010-06-10 22:02:15:029 1432 16a9c Agent ************* 2010-06-10 22:02:15:029 1432 16a9c Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates] 2010-06-10 22:02:15:029 1432 16a9c Agent ********* 2010-06-10 22:02:15:030 1432&
-
dat logje met HiJackThis lukt gewoon steeds niet, dat doet ie niet om welke reden dan ook.. ik kan maar 1 ding tegelijk selecteren in hijackthis en dan niets kopieren of plakken.. hier het logje van Malware Bites: Malwarebytes' Anti-Malware 1.46 Malwarebytes Databaseversie: 4167 Windows 6.0.6002 Service Pack 2 Internet Explorer 8.0.6001.18904 3-6-2010 18:31:43 mbam-log-2010-06-03 (18-31-43).txt Scantype: Snelle scan Objecten gescand: 123764 Verstreken tijd: 48 minuut/minuten, 6 seconde(n) Geheugenprocessen geïnfecteerd: 0 Geheugenmodulen geïnfecteerd: 0 Registersleutels geïnfecteerd: 53 Registerwaarden geïnfecteerd: 3 Registerdata geïnfecteerd: 2 Mappen geïnfecteerd: 2 Bestanden geïnfecteerd: 12 Geheugenprocessen geïnfecteerd: (Geen kwaadaardige objecten gedetecteerd) Geheugenmodulen geïnfecteerd: (Geen kwaadaardige objecten gedetecteerd) Registersleutels geïnfecteerd: HKEY_CLASSES_ROOT\coresrv.coreservices (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\coresrv.coreservices.1 (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\coresrv.lfgax (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\coresrv.lfgax.1 (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\experthelper.****pro_bho (Trojan.BHO) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\experthelper.****pro_bho.1 (Trojan.BHO) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\hbmain.commband (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\hbmain.commband.1 (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\hbr.hbmain (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\hbr.hbmain.1 (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\hostie.bho (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\hostie.bho.1 (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\shoppingreport.hbax (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\shoppingreport.hbax.1 (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\shoppingreport.hbinfoband (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\shoppingreport.hbinfoband.1 (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\shoppingreport.iebutton (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\shoppingreport.iebutton.1 (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\shoppingreport.iebuttona (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\shoppingreport.iebuttona.1 (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\shoppingreport.rprtctrl (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\shoppingreport.rprtctrl.1 (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\srv.coreservices (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\srv.coreservices.1 (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\toolbar.htmlmenuui (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\toolbar.htmlmenuui.1 (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\toolbar.toolbarctl (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\toolbar.toolbarctl.1 (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{8ad9ad05-36be-4e40-ba62-5422eb0d02fb} (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{aebf09e2-0c15-43c8-99bf-928c645d98a0} (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{90b8b761-df2b-48ac-bbe0-bcc03a819b3b} (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{eb6ec5d7-7d19-a8c7-d607-f0993bf94a9f} (Trojan.BHO) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Typelib\{cdca70d8-c6a6-49ee-9bed-7429d6c477a2} (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Typelib\{d136987f-e1c4-4ccc-a220-893df03ec5df} (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{4a7c84e2-e95c-43c6-8dd3-03abcd0eb60e} (Adware.SmartShopper) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{eb6ec5d7-7d19-a8c7-d607-f0993bf94a9f} (Trojan.BHO) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6fd31ed6-7c94-4bbc-8e95-f927f4d3a949} (Adware.180Solutions) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1f158a1e-a687-4a11-9679-b3ac64b86a1c} (Adware.Seekmo) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c5428486-50a0-4a02-9d20-520b59a9f9b2} (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c5428486-50a0-4a02-9d20-520b59a9f9b3} (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{3cc3d8fe-f0e0-4dd1-a69a-8c56bcc7bebf} (Adware.SmartShopper) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{3cc3d8fe-f0e0-4dd1-a69a-8c56bcc7bec0} (Adware.SmartShopper) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{4a7c84e2-e95c-43c6-8dd3-03abcd0eb60e} (Adware.SmartShopper) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{8bcb5337-ec01-4e38-840c-a964f174255b} (Adware.SmartShopper) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{90b8b761-df2b-48ac-bbe0-bcc03a819b3b} (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{eb6ec5d7-7d19-a8c7-d607-f0993bf94a9f} (Trojan.BHO) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{90b8b761-df2b-48ac-bbe0-bcc03a819b3b} (Adware.Zango) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{eb6ec5d7-7d19-a8c7-d607-f0993bf94a9f} (Trojan.BHO) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\experthelper (Trojan.BHO) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\idid (Trojan.Sasfix) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Handle (Malware.Trace) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\ShoppingReport (Adware.ShopperReports) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\ShoppingReport (Adware.ShopperReports) -> Quarantined and deleted successfully. Registerwaarden geïnfecteerd: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{90b8b761-df2b-48ac-bbe0-bcc03a819b3b} (Adware.Zango) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{90b8b761-df2b-48ac-bbe0-bcc03a819b3b} (Adware.Zango) -> Quarantined and deleted successfully. HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\canaveral (Trojan.FakeAlert) -> Quarantined and deleted successfully. Registerdata geïnfecteerd: HKEY_CLASSES_ROOT\regfile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: ("regedit.exe" "%1") Good: (regedit.exe "%1") -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (explorer.exe rundll32.exe ftoe.rho linqrp) Good: (Explorer.exe) -> Quarantined and deleted successfully. Mappen geïnfecteerd: C:\Program Files\ExpertHelper (Trojan.BHO) -> Quarantined and deleted successfully. C:\Program Files\Seekeen (Trojan.Agent) -> Quarantined and deleted successfully. Bestanden geïnfecteerd: C:\Windows\System32\ftoe.rho (Backdoor.Bot) -> Quarantined and deleted successfully. C:\Windows\Temp\864E.tmp (Backdoor.Bot) -> Quarantined and deleted successfully. C:\Windows\Temp\997.tmp (Backdoor.Bot) -> Quarantined and deleted successfully. C:\Windows\Temp\TMP0000000180AD7A276AC5DC54 (Trojan.Dropper) -> Quarantined and deleted successfully. C:\Windows\Temp\TMP0000000355A28E02BD8EAFDF (Trojan.Dropper) -> Quarantined and deleted successfully. C:\Windows\Temp\SEEF6DD.tmp\upgrade.exe (Adware.Zwangi) -> Quarantined and deleted successfully. C:\Program Files\ExpertHelper\pcre3.dll (Trojan.BHO) -> Quarantined and deleted successfully. C:\Program Files\ExpertHelper\uninstall.exe (Trojan.BHO) -> Quarantined and deleted successfully. C:\Program Files\Seekeen\seekeen.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\Windows\System32\sshnas21.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job (Trojan.Downloader) -> Quarantined and deleted successfully. C:\Windows\Tasks\{66BA574B-1E11-49b8-909C-8CC9E0E8E015}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
-
hijackthislog: ---------- Post toegevoegd om 06:47 ---------- Vorige post was om 06:44 ---------- heb ook een windows update log voor als je daar iets aan hebt?
-
heb die bestanden uit HiJackThis verwijdert, dat programma geinstalleerd, een scan laten lopen en alle bestanden daaruit verwijdert. Opnieuw opgestart en mn bureaublad doet t weer, meteen een herstelpunt gemaakt, alleen werkt nu mn windows update ineens niet meer en geeft hij foutmelding: 80072EFE moet ik nu trouwens nog een HiJackThis scan laten lopen?
-
het lukte echt niet dus heb maar ff printscreentjes gedaan:
-
oh sorry, maar dat lukt niet, ik kreeg een schermpje met dit:
-
* Trend Micro HijackThis v2.0.4 * See bottom for version history. The different sections of hijacking possibilities have been separated into the following groups. You can get more detailed information about an item by selecting it from the list of found items OR highlighting the relevant line below, and clicking 'Info on selected item'. R - Registry, StartPage/SearchPage changes R0 - Changed registry value R1 - Created registry value R2 - Created registry key R3 - Created extra registry value where only one should be F - IniFiles, autoloading entries F0 - Changed inifile value F1 - Created inifile value F2 - Changed inifile value, mapped to Registry F3 - Created inifile value, mapped to Registry N - Netscape/Mozilla StartPage/SearchPage changes N1 - Change in prefs.js of Netscape 4.x N2 - Change in prefs.js of Netscape 6 N3 - Change in prefs.js of Netscape 7 N4 - Change in prefs.js of Mozilla O - Other, several sections which represent: O1 - Hijack of auto.search.msn.com with Hosts file O2 - Enumeration of existing MSIE BHO's O3 - Enumeration of existing MSIE toolbars O4 - Enumeration of suspicious autoloading Registry entries O5 - Blocking of loading Internet Options in Control Panel O6 - Disabling of 'Internet Options' Main tab with Policies O7 - Disabling of Regedit with Policies O8 - Extra MSIE context menu items O9 - Extra 'Tools' menuitems and buttons O10 - Breaking of Internet access by New.Net or WebHancer O11 - Extra options in MSIE 'Advanced' settings tab O12 - MSIE plugins for file extensions or MIME types O13 - Hijack of default URL prefixes O14 - Changing of IERESET.INF O15 - Trusted Zone Autoadd O16 - Download Program Files item O17 - Domain hijack O18 - Enumeration of existing protocols and filters O19 - User stylesheet hijack O20 - AppInit_DLLs autorun Registry value, Winlogon Notify Registry keys O21 - ShellServiceObjectDelayLoad (SSODL) autorun Registry key O22 - SharedTaskScheduler autorun Registry key O23 - Enumeration of NT Services O24 - Enumeration of ActiveX Desktop Components Command-line parameters: * /autolog - automatically scan the system, save a logfile and open it * /ihatewhitelists - ignore all internal whitelists * /uninstall - remove all HijackThis Registry entries, backups and quit * /silentautuolog - the same as /autolog, except with no required user intervention * Version history * [v2.0.4] * Fixed parser issues on winlogon notify * Fixed issues to handle certain environment variables * Rename HJT generates complete scan log [v2.00.0] * AnalyzeThis added for log file statistics * Recognizes Windows Vista and IE7 * Fixed a few bugs in the O23 method * Fixed a bug in the O22 method (SharedTaskScheduler) * Did a few tweaks on the log format * Fixed and improved ADS Spy * Improved Itty Bitty Procman (processes are frozen before they are killed) * Added listing of O4 autoruns from other users * Added listing of the Policies Run items in O4 method, used by SmitFraud trojan * Added /silentautolog parameter for system admins * Added /deleteonreboot [file] parameter for system admins * Added O24 - ActiveX Desktop Components enumeration * Added Enhanced Security Confirguration (ESC) Zones to O15 Trusted Sites check [v1.99.1] * Added Winlogon Notify keys to O20 listing * Fixed crashing bug on certain Win2000 and WinXP systems at O23 listing * Fixed lots and lots of 'unexpected error' bugs * Fixed lots of inproper functioning bugs (i.e. stuff that didn't work) * Added 'Delete NT Service' function in Misc Tools section * Added ProtocolDefaults to O15 listing * Fixed MD5 hashing not working * Fixed 'ISTSVC' autorun entries with garbage data not being fixed * Fixed HijackThis uninstall entry not being updated/created on new versions * Added Uninstall Manager in Misc Tools to manage 'Add/Remove Software' list * Added option to scan the system at startup, then show results or quit if nothing found [v1.99] * Added O23 (NT Services) in light of newer trojans * Integrated ADS Spy into Misc Tools section * Added 'Action taken' to info in 'More info on this item' [v1.98] * Definitive support for Japanese/Chinese/Korean systems * Added O20 (AppInit_DLLs) in light of newer trojans * Added O21 (ShellServiceObjectDelayLoad, SSODL) in light of newer trojans * Added O22 (SharedTaskScheduler) in light of newer trojans * Backups of fixed items are now saved in separate folder * HijackThis now checks if it was started from a temp folder * Added a small process manager (Misc Tools section) [v1.96] * Lots of bugfixes and small enhancements! Among others: * Fix for Japanese IE toolbars * Fix for searchwww.com fake CLSID trick in IE toolbars and BHO's * Attributes on Hosts file will now be restored when scanning/fixing/restoring it. * Added several files to the LSP whitelist * Fixed some issues with incorrectly re-encrypting data, making R0/R1 go undetected until a restart * All sites in the Trusted Zone are now shown, with the exception of those on the nonstandard but safe domain list [v1.95] * Added a new regval to check for from Whazit hijack (Start Page_bak). * Excluded IE logo change tweak from toolbar detection (BrandBitmap and SmBrandBitmap). * New in logfile: Running processes at time of scan. * Checkmarks for running StartupList with /full and /complete in HijackThis UI. * New O19 method to check for Datanotary hijack of user stylesheet. * Google.com IP added to whitelist for Hosts file check. [v1.94] * Fixed a bug in the Check for Updates function that could cause corrupt downloads on certain systems. * Fixed a bug in enumeration of toolbars (Lop toolbars are now listed!). * Added imon.dll, drwhook.dll and wspirda.dll to LSP safelist. * Fixed a bug where DPF could not be deleted. * Fixed a stupid bug in enumeration of autostarting shortcuts. * Fixed info on Netscape 6/7 and Mozilla saying '%shitbrowser%' (oops). * Fixed bug where logfile would not auto-open on systems that don't have .log filetype registered. * Added support for backing up F0 and F1 items (d'oh!). [v1.93] * Added mclsp.dll (McAfee), WPS.DLL (Sygate Firewall), zklspr.dll (Zero Knowledge) and mxavlsp.dll (OnTrack) to LSP safelist. * Fixed a bug in LSP routine for Win95. * Made taborder nicer. * Fixed a bug in backup/restore of IE plugins. * Added UltimateSearch hijack in O17 method (I think). * Fixed a bug with detecting/removing BHO's disabled by BHODemon. * Also fixed a bug in StartupList (now version 1.52.1). [v1.92] * Fixed two stupid bugs in backup restore function. * Added DiamondCS file to LSP files safelist. * Added a few more items to the protocol safelist. * Log is now opened immediately after saving. * Removed rd.yahoo.com from NSBSD list (spammers are starting to use this, no doubt spyware authors will follow). * Updated integrated StartupList to v1.52. * In light of SpywareNuker/BPS Spyware Remover, any strings relevant to reverse-engineers are now encrypted. * Rudimentary proxy support for the Check for Updates function. [v1.91] * Added rd.yahoo.com to the Nonstandard But Safe Domains list. * Added 8 new protocols to the protocol check safelist, as well as showing the file that handles the protocol in the log (O18). * Added listing of programs/links in Startup folders (O4). * Fixed 'Check for Update' not detecting new versions. [v1.9] * Added check for Lop.com 'Domain' hijack (O17). * Bugfix in URLSearchHook (R3) fix. * Improved O1 (Hosts file) check. * Rewrote code to delete BHO's, fixing a really nasty bug with orphaned BHO keys. * Added AutoConfigURL and proxyserver checks (R1). * IE Extensions (Button/Tools menuitem) in HKEY_CURRENT_USER are now also detected. * Added check for extra protocols (O18). [v1.81] * Added 'ignore non-standard but safe domains' option. * Improved Winsock LSP hijackers detection. * Integrated StartupList updated to v1.4. [v1.8] * Fixed a few bugs. * Adds detecting of free.aol.com in Trusted Zone. * Adds checking of URLSearchHooks key, which should have only one value. * Adds listing/deleting of Download Program Files. * Integrated StartupList into the new 'Misc Tools' section of the Config screen! [v1.71] * Improves detecting of O6. * Some internal changes/improvements. [v1.7] * Adds backup function! Yay! * Added check for default URL prefix * Added check for changing of IERESET.INF * Added check for changing of Netscape/Mozilla homepage and default search engine. [v1.61] * Fixes Runtime Error when Hosts file is empty. [v1.6] * Added enumerating of MSIE plugins * Added check for extra options in 'Advanced' tab of 'Internet Options'. [v1.5] * Adds 'Uninstall & Exit' and 'Check for update online' functions. * Expands enumeration of autoloading Registry entries (now also scans for .vbs, .js, .dll, rundll32 and service) [v1.4] * Adds repairing of broken Internet access (aka Winsock or LSP fix) by New.Net/WebHancer * A few bugfixes/enhancements [v1.3] * Adds detecting of extra MSIE context menu items * Added detecting of extra 'Tools' menu items and extra buttons * Added 'Confirm deleting/ignoring items' checkbox [v1.2] * Adds 'Ignorelist' and 'Info' functions [v1.1] * Supports BHO's, some default URL changes [v1.0] * Original release A good thing to do after version updates is clear your Ignore list and re-add them, as the format of detected items sometimes changes.
-
Ben ik weer, had een discussie geplaatst over dat ik geen bureaublad, menu start, taakbalk en iconen kon zien, en het ligt dus idd aan de explorer.exe, want als ik die open doet alles t weer.. MAAR hij start m niet automatisch op, iedere keer als ik mn laptop aanzet blijft ie uit en moet ik hem handmatig opstarten.. hoe voorkom ik dit? groetjes

OVER ONS
PC Helpforum helpt GRATIS computergebruikers sinds juli 2006. Ons team geeft via het forum professioneel antwoord op uw vragen en probeert uw pc problemen zo snel mogelijk op te lossen. Word lid vandaag, plaats je vraag online en het PC Helpforum-team helpt u graag verder!