Internet valt steeds uit

  • pavlov

    Bertold schreef:

    >

    >

    > als ik op findjobs.bat klikt verschijnt er een nieuwe venster

    > genaamd files.txt maar de scherm is leeg…

    Vreemd. :?

    Wil je eens een startuplogje van Hijack This plaatsen?

    Ga daarvoor in Hijack This naar config - misc tools - generate startup list log.

    Doe dat svp nadat je onderstaande dialer in Hijack This hebt aangevinkt en daarna herstart hebt (zorg er svp voor dat Internet Explorer is afgesloten voordat je op “fix checked” klikt):

    O16 - DPF: {9B4AA442-9EBF-11D5-8C11-0050DA4957F5} - www.cavello.com/dialxs/plugins/d/2/440/nl.exe

    Plaats hier dan svp het startuplistlogje. :)

    Susanne. :)

    Ps. Het zou me hoogst verbazen als iemand je verder wil helpen, als uit dat logje wéér blijkt dat je geen virusscanner hebt geinstalleerd. :)

  • Bertold

    gedaan, hier het log:

    StartupList report, 04-11-2005, 16:49:53

    StartupList version: 1.52.2

    Started from : C:\WINDOWS\DESKTOP\HIJACKTHIS.EXE

    Detected: Windows ME (Win9x 4.90.3000)

    Detected: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    * Using default options

    ==================================================

    Running processes:

    C:\WINDOWS\SYSTEM\KERNEL32.DLL

    C:\WINDOWS\SYSTEM\MSGSRV32.EXE

    C:\WINDOWS\SYSTEM\mmtask.tsk

    C:\WINDOWS\SYSTEM\MPREXE.EXE

    C:\WINDOWS\SYSTEM\MSTASK.EXE

    C:\WINDOWS\SYSTEM\STIMON.EXE

    C:\PROGRAM FILES\AGNITUM\OUTPOST FIREWALL 1.0\OUTPOST.EXE

    C:\WINDOWS\SYSTEM\KB891711\KB891711.EXE

    C:\WINDOWS\EXPLORER.EXE

    C:\PROGRAM FILES\REAL\REALPLAYER\REALPLAY.EXE

    C:\PROGRAM FILES\MICROSOFT OFFICE\OFFICE\WINWORD.EXE

    C:\WINDOWS\SYSTEM\SPOOL32.EXE

    C:\WINDOWS\DESKTOP\HIJACKTHIS.EXE

    C:\WINDOWS\NOTEPAD.EXE

    ————————————————–

    Autorun entries from Registry:

    HKLM\Software\Microsoft\Windows\CurrentVersion\Run

    DXM6Patch_981116 = C:\WINDOWS\p_981116.exe /Q:A

    RealTray = C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER

    Outpost Firewall = “C:\Program Files\Agnitum\Outpost Firewall 1.0\outpost.exe” /waitservice

    ————————————————–

    Autorun entries from Registry:

    HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnceEx

    (Default) =

    ————————————————–

    Autorun entries from Registry:

    HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices

    LoadPowerProfile = Rundll32.exe powrprof.dll,LoadCurrentPwrScheme

    SchedulingAgent = mstask.exe

    StillImageMonitor = C:\WINDOWS\SYSTEM\STIMON.EXE

    TrueVector = C:\WINDOWS\SYSTEM\ZONELABS\VSMON.EXE -service

    Outpost Firewall = C:\PROGRAM FILES\AGNITUM\OUTPOST FIREWALL 1.0\outpost.exe /service

    KB891711 = C:\WINDOWS\SYSTEM\KB891711\KB891711.EXE

    ————————————————–

    File association entry for .TXT:

    HKEY_CLASSES_ROOT\txtfile\shell\open\command

    (Default) = C:\WINDOWS\NOTEPAD.EXE %1

    ————————————————–

    C:\WINDOWS\WININIT.BAK listing:

    (Created 2/11/2005, 20:13:0)

    NUL=C:\PROGRA~1\INSTAL~1\{D7E7E~1\

    ————————————————–

    C:\AUTOEXEC.BAT listing:

    SET COMSPEC=C:\WINDOWS\COMMAND.COM

    SET windir=C:\WINDOWS

    SET winbootdir=C:\WINDOWS

    SET PATH=C:\WINDOWS;C:\WINDOWS\COMMAND;“C:\Program Files\Common Files\Roxio Shared\DLLShared”

    SET PROMPT=$p$g

    SET TEMP=C:\WINDOWS\TEMP

    SET TMP=C:\WINDOWS\TEMP

    SET TVDUMPFLAGS=8

    ————————————————–

    C:\WINDOWS\WINSTART.BAT listing:

    C:\WINDOWS\tmpcpyis.bat

    ————————————————–

    Enumerating Browser Helper Objects:

    (no name) - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (file missing) - {53707962-6F74-2D53-2644-206D7942484F}

    ————————————————–

    Enumerating Task Scheduler jobs:

    Toepassing Optimalisatie Start.job

    PCHealth-planner voor gegevensverzameling.job

    7ADF67F69186856B.job

    813B06B89183DFB1.job

    4D589EAF9180B052.job

    95B800656E7E35C2.job

    94D4F44E6E7DD6A3.job

    ————————————————–

    Enumerating Download Program Files:

    InProcServer32 = C:\WINDOWS\SYSTEM\MACROMED\FLASH\FLASH.OCX

    CODEBASE = http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab

    InProcServer32 = C:\WINDOWS\SYSTEM\MACROMED\DIRECTOR\SWDIR.DLL

    CODEBASE = http://download.macromedia.com/pub/shockwave/cabs/director/sw.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\MESSENGERSTATSCLIENT.DLL

    CODEBASE = http://messenger.zone.msn.com/binary/MessengerStatsClient.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\SOLITAIRESHOWDOWN.DLL

    CODEBASE = http://messenger.zone.msn.com/binary/SolitaireShowdown.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\MINESWEEPER.DLL

    CODEBASE = http://messenger.zone.msn.com/binary/MineSweeper.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\EASYWEBINSTALLER.OCX

    CODEBASE = http://www.klikeuro.nl/cab/EasyWebInstaller.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\ZYLOMLOADER.DLL

    CODEBASE = http://game15.zylomgames.com/activex/zylomloader.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\AXISCAMCONTROL.OCX

    CODEBASE = http://195.18.69.102/activex/AxisCamControl.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\POPCAPLOADER.DLL

    CODEBASE = http://www.popcap.com/games/popcaploader_v6.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\MSNPUPLD.DLL

    CODEBASE = http://by15fd.bay15.hotmail.msn.com/resources/MsnPUpld.cab

    InProcServer32 = C:\WINDOWS\SYSTEM\QTPLUGIN.OCX

    CODEBASE = http://137.222.163.13:8080/contentFactory/media/qtplugin.cab

    CODEBASE = http://download.microsoft.com/download/F/6/E/F6E491A6-77E1-4E20-9F5F-94901338C922/wmv9VCM.CAB

    InProcServer32 = C:\WINDOWS\EG_AUTH_1043.DLL

    CODEBASE = http://akamai.downloadv3.com/binaries/P2EClient/EGAUTH_1043_EN.cab

    InProcServer32 = C:\WINDOWS\DOWNLO~1\OSCAN8.OCX

    CODEBASE = http://www.bitdefender.com/scan8/oscan8.cab

    InProcServer32 = C:\WINDOWS\DOWNLO~1\XSCAN60.OCX

    CODEBASE = http://housecall60.trendmicro.com/housecall/xscan60.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\ASINST.DLL

    CODEBASE = http://acs.pandasoftware.com/activescan/as5free/asinst.cab

    ————————————————–

    Enumerating ShellServiceObjectDelayLoad items:

    WebCheck: C:\WINDOWS\SYSTEM\WEBCHECK.DLL

    AUHook: C:\WINDOWS\SYSTEM\AUHOOK.DLL

    ————————————————–

    End of report, 6.763 bytes

    Report generated in 0,087 seconds

    Command line options:

    /verbose - to add additional info on each section

    /complete - to include empty sections and unsuspicious data

    /full - to include several rarely-important sections

    /force9x - to include Win9x-only startups even if running on WinNT

    /forcent - to include WinNT-only startups even if running on Win9x

    /forceall - to include all Win9x and WinNT startups, regardless of platform

    /history - to list version history only

    is het goed allemaal??

    bvd bertold

  • pablo

    nope,is niet goed,ik zie nog steeds geen virusscanner :?

    download de killbox en pak hem uit naar je bureaublad

    http://www.downloads.subratam.org/KillBox.zip

    start de killbox en zet een vinkje bij “delete on reboot”

    kopieer de vetgedrukte tekst:

    C:\windows\tasks\7ADF67F69186856B.job

    C:\windows\tasks\813B06B89183DFB1.job

    C:\windows\tasks\4D589EAF9180B052.job

    C:\windows\tasks\95B800656E7E35C2.job

    C:\windows\tasks\94D4F44E6E7DD6A3.job

    open “file” in het killboxmenu bovenaan en kies: Paste from clipboard

    je zal zien, het bovenstaande vetgedrukte zal staan in het “Full Path of File to Delete”-veld.

    Er is een klein pijltje naast dat veld. Als je daarop klikt zal je al die bovenstaande lijntjes ( indien bestanden aanwezig ) die je gekopieerd hebt zien staan ( dat is tenminste de bedoeling )

    Daarna klik je op de rode knop met het wit kruisje erin,klik in beide popschermpjes op JA,je pc zal nu herstarten,zoniet doe het dan handmatig.

    plaats na de herstart een nieus hijack logje en een startuplistlogje ( met virusscanner graag )

    paul

  • Bertold

    startuplogje:

    StartupList report, 04-11-2005, 17:10:29

    StartupList version: 1.52.2

    Started from : C:\WINDOWS\DESKTOP\HIJACKTHIS.EXE

    Detected: Windows ME (Win9x 4.90.3000)

    Detected: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    * Using default options

    ==================================================

    Running processes:

    C:\WINDOWS\SYSTEM\KERNEL32.DLL

    C:\WINDOWS\SYSTEM\MSGSRV32.EXE

    C:\WINDOWS\SYSTEM\mmtask.tsk

    C:\WINDOWS\SYSTEM\MPREXE.EXE

    C:\WINDOWS\SYSTEM\MSTASK.EXE

    C:\WINDOWS\SYSTEM\STIMON.EXE

    C:\PROGRAM FILES\AGNITUM\OUTPOST FIREWALL 1.0\OUTPOST.EXE

    C:\WINDOWS\SYSTEM\KB891711\KB891711.EXE

    C:\WINDOWS\EXPLORER.EXE

    C:\PROGRAM FILES\REAL\REALPLAYER\REALPLAY.EXE

    C:\WINDOWS\SYSTEM\DDHELP.EXE

    C:\WINDOWS\DESKTOP\HIJACKTHIS.EXE

    C:\WINDOWS\NOTEPAD.EXE

    ————————————————–

    Autorun entries from Registry:

    HKLM\Software\Microsoft\Windows\CurrentVersion\Run

    DXM6Patch_981116 = C:\WINDOWS\p_981116.exe /Q:A

    RealTray = C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER

    Outpost Firewall = “C:\Program Files\Agnitum\Outpost Firewall 1.0\outpost.exe” /waitservice

    ————————————————–

    Autorun entries from Registry:

    HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnceEx

    (Default) =

    ————————————————–

    Autorun entries from Registry:

    HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices

    LoadPowerProfile = Rundll32.exe powrprof.dll,LoadCurrentPwrScheme

    SchedulingAgent = mstask.exe

    StillImageMonitor = C:\WINDOWS\SYSTEM\STIMON.EXE

    TrueVector = C:\WINDOWS\SYSTEM\ZONELABS\VSMON.EXE -service

    Outpost Firewall = C:\PROGRAM FILES\AGNITUM\OUTPOST FIREWALL 1.0\outpost.exe /service

    KB891711 = C:\WINDOWS\SYSTEM\KB891711\KB891711.EXE

    ————————————————–

    File association entry for .TXT:

    HKEY_CLASSES_ROOT\txtfile\shell\open\command

    (Default) = C:\WINDOWS\NOTEPAD.EXE %1

    ————————————————–

    C:\WINDOWS\WININIT.BAK listing:

    (Created 4/11/2005, 17:7:54)

    NUL=C:\WINDOWS\TASKS\7ADF67~1.JOB

    ————————————————–

    C:\AUTOEXEC.BAT listing:

    SET COMSPEC=C:\WINDOWS\COMMAND.COM

    SET windir=C:\WINDOWS

    SET winbootdir=C:\WINDOWS

    SET PATH=C:\WINDOWS;C:\WINDOWS\COMMAND;“C:\Program Files\Common Files\Roxio Shared\DLLShared”

    SET PROMPT=$p$g

    SET TEMP=C:\WINDOWS\TEMP

    SET TMP=C:\WINDOWS\TEMP

    SET TVDUMPFLAGS=8

    ————————————————–

    C:\WINDOWS\WINSTART.BAT listing:

    C:\WINDOWS\tmpcpyis.bat

    ————————————————–

    Enumerating Browser Helper Objects:

    (no name) - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (file missing) - {53707962-6F74-2D53-2644-206D7942484F}

    ————————————————–

    Enumerating Task Scheduler jobs:

    Toepassing Optimalisatie Start.job

    PCHealth-planner voor gegevensverzameling.job

    813B06B89183DFB1.job

    4D589EAF9180B052.job

    95B800656E7E35C2.job

    94D4F44E6E7DD6A3.job

    ————————————————–

    Enumerating Download Program Files:

    InProcServer32 = C:\WINDOWS\SYSTEM\MACROMED\FLASH\FLASH.OCX

    CODEBASE = http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab

    InProcServer32 = C:\WINDOWS\SYSTEM\MACROMED\DIRECTOR\SWDIR.DLL

    CODEBASE = http://download.macromedia.com/pub/shockwave/cabs/director/sw.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\MESSENGERSTATSCLIENT.DLL

    CODEBASE = http://messenger.zone.msn.com/binary/MessengerStatsClient.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\SOLITAIRESHOWDOWN.DLL

    CODEBASE = http://messenger.zone.msn.com/binary/SolitaireShowdown.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\MINESWEEPER.DLL

    CODEBASE = http://messenger.zone.msn.com/binary/MineSweeper.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\EASYWEBINSTALLER.OCX

    CODEBASE = http://www.klikeuro.nl/cab/EasyWebInstaller.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\ZYLOMLOADER.DLL

    CODEBASE = http://game15.zylomgames.com/activex/zylomloader.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\AXISCAMCONTROL.OCX

    CODEBASE = http://195.18.69.102/activex/AxisCamControl.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\POPCAPLOADER.DLL

    CODEBASE = http://www.popcap.com/games/popcaploader_v6.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\MSNPUPLD.DLL

    CODEBASE = http://by15fd.bay15.hotmail.msn.com/resources/MsnPUpld.cab

    InProcServer32 = C:\WINDOWS\SYSTEM\QTPLUGIN.OCX

    CODEBASE = http://137.222.163.13:8080/contentFactory/media/qtplugin.cab

    CODEBASE = http://download.microsoft.com/download/F/6/E/F6E491A6-77E1-4E20-9F5F-94901338C922/wmv9VCM.CAB

    InProcServer32 = C:\WINDOWS\EG_AUTH_1043.DLL

    CODEBASE = http://akamai.downloadv3.com/binaries/P2EClient/EGAUTH_1043_EN.cab

    InProcServer32 = C:\WINDOWS\DOWNLO~1\OSCAN8.OCX

    CODEBASE = http://www.bitdefender.com/scan8/oscan8.cab

    InProcServer32 = C:\WINDOWS\DOWNLO~1\XSCAN60.OCX

    CODEBASE = http://housecall60.trendmicro.com/housecall/xscan60.cab

    InProcServer32 = C:\WINDOWS\DOWNLOADED PROGRAM FILES\ASINST.DLL

    CODEBASE = http://acs.pandasoftware.com/activescan/as5free/asinst.cab

    ————————————————–

    Enumerating ShellServiceObjectDelayLoad items:

    WebCheck: C:\WINDOWS\SYSTEM\WEBCHECK.DLL

    AUHook: C:\WINDOWS\SYSTEM\AUHOOK.DLL

    ————————————————–

    End of report, 6.685 bytes

    Report generated in 0,074 seconds

    Command line options:

    /verbose - to add additional info on each section

    /complete - to include empty sections and unsuspicious data

    /full - to include several rarely-important sections

    /force9x - to include Win9x-only startups even if running on WinNT

    /forcent - to include WinNT-only startups even if running on Win9x

    /forceall - to include all Win9x and WinNT startups, regardless of platform

    /history - to list version history only

    hijacklogje:

    Logfile of HijackThis v1.99.1

    Scan saved at 17:10:21, on 04-11-2005

    Platform: Windows ME (Win9x 4.90.3000)

    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:

    C:\WINDOWS\SYSTEM\KERNEL32.DLL

    C:\WINDOWS\SYSTEM\MSGSRV32.EXE

    C:\WINDOWS\SYSTEM\mmtask.tsk

    C:\WINDOWS\SYSTEM\MPREXE.EXE

    C:\WINDOWS\SYSTEM\MSTASK.EXE

    C:\WINDOWS\SYSTEM\STIMON.EXE

    C:\PROGRAM FILES\AGNITUM\OUTPOST FIREWALL 1.0\OUTPOST.EXE

    C:\WINDOWS\SYSTEM\KB891711\KB891711.EXE

    C:\WINDOWS\EXPLORER.EXE

    C:\PROGRAM FILES\REAL\REALPLAYER\REALPLAY.EXE

    C:\WINDOWS\SYSTEM\DDHELP.EXE

    C:\WINDOWS\DESKTOP\HIJACKTHIS.EXE

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.multikabel.nl

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer aangeboden door Multikabel

    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost

    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Koppelingen

    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (file missing)

    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX

    O4 - HKLM\..\Run: C:\WINDOWS\p_981116.exe /Q:A

    O4 - HKLM\..\Run: C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER

    O4 - HKLM\..\Run: “C:\Program Files\Agnitum\Outpost Firewall 1.0\outpost.exe” /waitservice

    O4 - HKLM\..\RunServices: Rundll32.exe powrprof.dll,LoadCurrentPwrScheme

    O4 - HKLM\..\RunServices: mstask.exe

    O4 - HKLM\..\RunServices: C:\WINDOWS\SYSTEM\STIMON.EXE

    O4 - HKLM\..\RunServices: C:\WINDOWS\SYSTEM\ZONELABS\VSMON.EXE -service

    O4 - HKLM\..\RunServices: C:\PROGRAM FILES\AGNITUM\OUTPOST FIREWALL 1.0\outpost.exe /service

    O4 - HKLM\..\RunServices: C:\WINDOWS\SYSTEM\KB891711\KB891711.EXE

    O14 - IERESET.INF: START_PAGE_URL=http://www.multikabel.nl

    O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab

    O16 - DPF: {F6BF0D00-0B2A-4A75-BF7B-F385591623AF} (Solitaire Showdown Class) - http://messenger.zone.msn.com/binary/SolitaireShowdown.cab

    O16 - DPF: {2917297F-F02B-4B9D-81DF-494B6333150B} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab

    O16 - DPF: {E3802230-F0E2-4A75-9947-EAB78DD8153F} (InstallerX Class) - http://www.klikeuro.nl/cab/EasyWebInstaller.cab

    O16 - DPF: {CE69F98F-2AF3-4306-BAC6-A79070EDA1B4} (Zylom Loader Object) - http://game15.zylomgames.com/activex/zylomloader.cab

    O16 - DPF: {917623D1-D8E5-11D2-BE8B-00104B06BDE3} (CamImage Class) - http://195.18.69.102/activex/AxisCamControl.cab

    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://www.popcap.com/games/popcaploader_v6.cab

    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://by15fd.bay15.hotmail.msn.com/resources/MsnPUpld.cab

    O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Object) - http://137.222.163.13:8080/contentFactory/media/qtplugin.cab

    O16 - DPF: {BD3653E4-884B-43C4-970B-670802501B7F} - http://akamai.downloadv3.com/binaries/P2EClient/EGAUTH_1043_EN.cab

    O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://www.bitdefender.com/scan8/oscan8.cab

    O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) - http://housecall60.trendmicro.com/housecall/xscan60.cab

    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab

    klopt het?

  • pablo

    nope,niet goed gegaan :?:)

    start de killbox,zet een vinkje bij “delete on reboot” en plak de volgende regel in het schermpje:

    C:\windows\tasks\813B06B89183DFB1.job

    klik op het rode kruis,klik in het eerste popupschermpje op ja en in het tweede op nee.

    herhaal dit voor de volgende regels:

    C:\windows\tasks\4D589EAF9180B052.job

    C:\windows\tasks\95B800656E7E35C2.job

    C:\windows\tasks\94D4F44E6E7DD6A3.job

    herstart nu je pc en plaats nog twee nieuwe logjes

    en nu met een virusscanner er in anders zoek je het verder maar uit,het is nu door diverse personen herhaald :?

    http://www.virushelp.nl/software.htm

    paul

  • Linka

    ik zal het maandag proberen, ben weekend niet thuis dus vandaar…..

    Bertold