?
Solved

WHere are IE Toolbars stored / registered, and how do I access and identify them?

Posted on 2005-03-09
5
Medium Priority
?
961 Views
Last Modified: 2013-12-04
WHere are IE Toolbars stored / registered, and how do I access and identify them?
0
Comment
Question by:DrDamnit
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 37

Expert Comment

by:bbao
ID: 13503892
it depends on specific toolbar programs. e.g. commonly, google toolbar is located at "c:\program files\google", yahoo toolbar is located at "c:\program files\yahoo", and some activex based toolbars are lcoated at "c:\windowss\downloaded program files" (on XP).

hope it helps,
bbao
0
 
LVL 16

Expert Comment

by:mdiglio
ID: 13505738
Hello,
I see from your history that you have used Hijackthis before.

http://www.spychecker.com/download/download_hijackthis.html

You can run hijackthis again.
Everything under "03" will be IE Toolbars and it will give you a path to where they are located
Here is an example output of what you will see:

O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_6_0_0.dll
0
 
LVL 32

Author Comment

by:DrDamnit
ID: 13506417
But what I want to know, is how hijack this finds them.
0
 
LVL 37

Accepted Solution

by:
bbao earned 500 total points
ID: 13509368
by checking registry HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR
0
 
LVL 16

Expert Comment

by:mdiglio
ID: 13512290
Ah hah! I see now, you are building a spyware removal app.
Best of Luck in your endeavour...it sure is needed

 
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Have you created a query with information for a calendar? ... and then, abra-cadabra, the calendar is done?! I am going to show you how to make that happen. Visualize your data!  ... really see it To use the code to create a calendar from a q…
Suggested Courses
Course of the Month10 days, 21 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question