Browser Hijacker

Discussion in 'SpywareBlaster & Other Forum' started by nadirah, Jan 7, 2004.

Thread Status:
Not open for further replies.
  1. nadirah

    nadirah Registered Member

    Joined:
    Oct 14, 2003
    Posts:
    3,647
    Ad-aware found this browser hijacker in my IE. This is it:
    Started deep registry scan
    ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯
    Possible browser hijack attempt : {E6A3C1E2-F792-483E-9133-596215172BE9} (http://runonce.msn.com/setacceptlang.cab)

    Possible Browser Hijack attempt Object recognized!
    Type : RegKey
    Data :
    Rootkey : HKEY_LOCAL_MACHINE
    Object : SOFTWARE\Microsoft\Code Store Database\Distribution Units\{E6A3C1E2-F792-483E-9133-596215172BE9}


    Could u kindly add protection against this browser hijacker in Spywareblaster. Please reply as soon as possible , thanx!
     
  2. Pieter_Arntz

    Pieter_Arntz Spyware Veteran

    Joined:
    Apr 27, 2002
    Posts:
    13,331
    Location:
    Netherlands
    Hi nadirah,

    I'm not sure if MicroSoft would appreciate that. ;)

    I think it's better to ask LavaSoft why they would add this to their detection.

    If you would run HijackThis I think you will see this entry in your log, that corresponds with that CLSID.
    O16 - DPF: {E6A3C1E2-F792-483E-9133-596215172BE9} (AcceptLang Class) - http://runonce.msn.com/setacceptlang.cab

    Regards,

    Pieter
     
Thread Status:
Not open for further replies.