Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Support
Windows Malware Removal Help & Support
Facebook redirecting me to Pricegrabber.com
Message
<blockquote data-quote="Jack" data-source="post: 37856" data-attributes="member: 1"><p>Hello and Welcome!</p><p>With what anti-malware software did you scan your system?Was your system previously infected? Usually redirects happen because of some sort of residual damage after removing a malware infection.</p><p></p><p>Let's check a few things: </p><p></p><p><span style="font-size: 15px"><strong>STEP 1:</strong> Check your internet connection for proxies</span></p><p>Proxy server prevents the user from accessing the internet,follow the below instructions to remove the a proxy server.</p><ol> <li data-xf-list-type="ol">Open Internet Explorer. <ul> <li data-xf-list-type="ul">For Internet Explorer 9 : Click on the gear icon <img src="http://malwaretips.com/images/removalguide/icongear.jpg" alt="" class="fr-fic fr-dii fr-draggable " style="" /> at the top (far right) and click again on <strong>Internet Options</strong>.</li> <li data-xf-list-type="ul">For Internet Explorer 8 : Click on <strong> Tools</strong>, select <strong>Internet Options</strong>.</li> </ul><img src="http://malwaretips.com/images/removalguide/ie1.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></li> <li data-xf-list-type="ol">Go to the tab <strong>Connections</strong>.At the bottom, click on <strong>LAN settings</strong>.<br /> <img src="http://malwaretips.com/images/removalguide/ie2.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></li> <li data-xf-list-type="ol"><strong>Uncheck</strong> the option <em>Use a proxy server for your LAN</em>. This will remove the proxy server and allow you to use the internet again.<br /> <img src="http://malwaretips.com/images/removalguide/ie3.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></li> </ol><p></p><p><span style="font-size: 15px">If you are a Firefox users, go to Firefox (Tools) > Options > Advanced tab > Network > Settings > Select <strong>No Proxy</strong></span></p><p><img src="http://i.imgur.com/4W7v6.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></p><hr /><p></p><p></p><p><span style="font-size: 15px"><strong>STEP 2</strong> : Check your<strong>DNS settings</strong></span></p><p><strong>Check Windows 7 DNS</strong></p><ol> <li data-xf-list-type="ol">On your <strong>Start menu</strong>, open the <strong>Control Panel</strong>.</li> <li data-xf-list-type="ol">Under the <strong>Network and Internet</strong> section, click <strong>View network status and tasks</strong>.</li> <li data-xf-list-type="ol">In the <strong>View your active networks</strong> section, click the item to the right of <strong>Connections</strong>:<br /> <img src="http://malwaretips.com/images/removalguide/dns.jpg" alt="" class="fr-fic fr-dii fr-draggable " style="" /></li> <li data-xf-list-type="ol">On the <strong>General</strong> tab of the Connection Status window, click <strong>Properties</strong>.</li> <li data-xf-list-type="ol">On the <strong>General</strong> tab of the Connection Properties window, scroll down and select I<strong>nternet Protocol Version 4 (TCP/IPv4)</strong>, then click <strong>Properties</strong>.<br /> <img src="http://malwaretips.com/images/removalguide/dns1.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></li> <li data-xf-list-type="ol">On the <strong>Genera</strong>l tab of the <strong>Internet Protocol Version 4 (TCP/IPv4) Properties</strong> window, in the lower section, select <strong>Obtain DNS server address automatically</strong>.<br /> <img src="http://malwaretips.com/images/removalguide/dns2.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></li> <li data-xf-list-type="ol">Click <strong>OK</strong> and exit all the windows.</li> </ol><hr /><p></p><p></p><p><span style="font-size: 15px"><strong>STEP 3</strong> : Check your <strong>Windows HOSTS file</strong></span></p><p>The hosts file is one of several system facilities to assist in addressing network nodes in a computer network. It is a common part in an operating system's Internet Protocol (IP) implementation, and serves the function of translating human-friendly hostnames into numeric protocol addresses, called IP addresses, that identify and locate a host in an IP network.</p><p>Because of its role in local name resolution, the hosts file represents an attack vector for malicious software. The file may be hijacked, for example, by adware, computer viruses, trojan horse software, and may be modified to redirect traffic from the intended destination to sites hosting content that may be offensive or intrusive to the user or the user’s computer system.</p><p></p><ol> <li data-xf-list-type="ol">Go to > <em>C:\WINDOWS\system32\drivers\etc.</em><br /> <img src="http://malwaretips.com/images/removalguide/host1.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></li> <li data-xf-list-type="ol"> Double-click “hosts” file to open it.You can open this file with <strong>Notepad</strong>.<br /> <img src="http://malwaretips.com/images/removalguide/host2.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></li> <li data-xf-list-type="ol">The “hosts” file should look the same as our below code box.If there are more, then remove them and save changes.<br /> <br /> Default Host file for Windows 7 <br /> [code]# Copyright (c) 1993-2006 Microsoft Corp.<br /> #<br /> # This is a sample HOSTS file used by Microsoft TCP/IP for Windows.<br /> #<br /> # This file contains the mappings of IP addresses to host names. Each<br /> # entry should be kept on an individual line. The IP address should<br /> # be placed in the first column followed by the corresponding host name.<br /> # The IP address and the host name should be separated by at least one<br /> # space.<br /> #<br /> # Additionally, comments (such as these) may be inserted on individual<br /> # lines or following the machine name denoted by a '#' symbol.<br /> #<br /> # For example:<br /> #<br /> # 102.54.94.97 rhino.acme.com # source server<br /> # 38.25.63.10 x.acme.com # x client host<br /> <br /> # localhost name resolution is handle within DNS itself.<br /> # 127.0.0.1 localhost<br /> # ::1 localhost[/code]</li> </ol><p>You can find more details on how to reset your host file at <a href="http://support.microsoft.com/kb/972034" target="_blank">Microsoft Support Center</a>.</p><hr /><p></p><p><span style="font-size: 15px">Please tell me if you find any suspicious modification.</span></p><p></p><p></p><p><span style="font-size: 18px"><strong>Security scans:</strong></span></p><p><span style="font-size: 15px"><strong>STEP 1 : </strong> Download and scan with <a href="http://support.kaspersky.com/downloads/utils/tdsskiller.exe" target="_blank"><strong>Kaspersky TDSSKiller</strong></a></span></p><p><span style="font-size: 15px"></span></p><p>TDSSKiller is a utility that was created in order to provide you with a simple means of disinfecting any system that suffers a rootkit infection.A rootkit is a program or a set of programs designed to obscure the fact that a system has been compromised.</p><ol> <li data-xf-list-type="ol">Please download the latest official version of TDSSKiller.</li> <li data-xf-list-type="ol">Double-click on it to <strong>launch it</strong>.</li> <li data-xf-list-type="ol">TDSSKiller will now start and display the welcome screen as shown below.In order to start a system scan , press the <em>'Start Scan'</em> button.<br /> <img src="http://malwaretips.com/images/removalguide/tdsskiller2.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></li> <li data-xf-list-type="ol">TDSSKiller will now scan your computer for the TDSS infection.<br /> <img src="http://malwaretips.com/images/removalguide/tdsskiller3.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></li> <li data-xf-list-type="ol"> When the scan has finished it will display a result screen stating whether or not the infection was found on your computer. If it was found it will display a screen similar to the one below.<br /> <img src="http://malwaretips.com/images/removalguide/tdsskiller4.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></li> <li data-xf-list-type="ol">To remove the infection simply click on the <strong>Continue</strong> button and TDSSKiller will attempt to clean the infection. </li> <li data-xf-list-type="ol">A <strong>reboot</strong> might require to completely remove the malware from your system. In this scenario, always confirm the reboot action to be on the safe side.</li> </ol><p></p><p></p><p><span style="font-size: 15px"><strong>STEP 2:</strong> Download and scan with <a href="http://www.surfright.nl/en/downloads" target="_blank"><strong>HitmanPro</strong></a></span></p><p></p><p></p><ol> <li data-xf-list-type="ol">Please download the latest official version of Hitman Pro.<br /> <a href="http://www.surfright.nl/en/downloads" target="_blank"><img src="http://malwaretips.com/images/removalguide/downloadnow.gif" alt="" class="fr-fic fr-dii fr-draggable " style="" /></a></li> <li data-xf-list-type="ol">Start Hitman Pro by clicking on the previously downloaded file. <br /> <strong>NOTE</strong> : If you have problems starting Hitman Pro, use the “<em>Force Breach</em>” mode. Hold down the left <strong>CTRL-key</strong> when you start Hitman Pro and all non-essential processes are terminated, including the malware process. (<a href="http://www.youtube.com/watch?feature=player_embedded&v=m6eRWTv2STk" target="_blank">How to start Hitman Pro in Force Breach mode - video</a>)<br /> <br /> <img src="http://malwaretips.com/images/removalguide/hitman1.jpg" alt="" class="fr-fic fr-dii fr-draggable " style="" /><br /> </li> <li data-xf-list-type="ol">Click Settings to proceed to the application scan options. Note that Hitman Pro 3 is free to use for the first 30 days, after which time it will prompt you to purchase a licence key.<br /> In the Settings menu, ensure that the options "<em>Create Restore Point Before Removing Files</em>" is checked, and click <strong>OK</strong>. Click <strong>Next</strong> to continue to the scan.<br /> <br /> <img src="http://malwaretips.com/images/removalguide/hitman2.jpg" alt="" class="fr-fic fr-dii fr-draggable " style="" /><br /> </li> <li data-xf-list-type="ol">The Setup screen is displayed. Here, you can decide whether or not you wish to install Hitman Pro 3 on your system. To proceed with installation, select <strong>Yes,create a copy of Hitman Pro so I can regularly scan this computer</strong> .Click <strong>Next</strong> to continue.<br /> <br /> <img src="http://malwaretips.com/images/removalguide/hitman3.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /><br /> </li> <li data-xf-list-type="ol">Hitman Pro will start scanning your system for malicious software. Depending on the the size of your hard drive, and the performance of your computer, this step will take several minutes.<br /> <br /> <img src="http://malwaretips.com/images/removalguide/hitman4.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /><br /> </li> <li data-xf-list-type="ol">Once the scan is complete, a summary of detected malicious files is displayed.<br /> <img src="http://malwaretips.com/images/removalguide/hitman5.jpg" alt="" class="fr-fic fr-dii fr-draggable " style="" /><br /> </li> <li data-xf-list-type="ol"> Click <strong>Next</strong> to start removing the infected files.Hitman Pro 3 will now cleanse the infected files, and in some instances, may suggest a reboot in order to completely remove the malware from your system. In this scenario, always confirm the reboot action to be on the safe side.</li> </ol><p></p><p><span style="font-size: 15px"><strong>STEP 3</strong>: Download and scan with Emsisoft Emergency Kit</span></p><ol> <li data-xf-list-type="ol">Please download the latest official version of Emsisoft Emergency Kit<br /> <a href="http://download11.emsisoft.com/EmsisoftEmergencyKit.zip" target="_blank"><img src="http://malwaretips.com/images/removalguide/downloadnow.gif" alt="" class="fr-fic fr-dii fr-draggable " style="" /></a><br /> </li> <li data-xf-list-type="ol">Open the EEK Folder on your Desktop and double click <strong>EmergencyKitScanner.bat</strong></li> <li data-xf-list-type="ol">Click "<strong>Yes</strong>" to Update Emsisoft Emergency Kit</li> <li data-xf-list-type="ol">Put the mouse cursor over the "Menu" tab on the left and click-on "<strong>Scan PC</strong>".</li> <li data-xf-list-type="ol">Select "<strong>Smart Scan</strong>" and click-on the "<strong>Scan</strong>" button.</li> <li data-xf-list-type="ol">Save the scan log somewhere that you can find it.</li> <li data-xf-list-type="ol">Exit Emsisoft Emergency Kit.</li> </ol><p></p><p></p><p><span style="font-size: 15px"><strong>STEP 4</strong>: Run a OTL scan</span></p><p></p><ol> <li data-xf-list-type="ol">Please <a href="http://oldtimer.geekstogo.com/OTL.exe" target="_blank">download OTL</a> and save it to your Desktop. <br /> <a href="http://oldtimer.geekstogo.com/OTL.exe" target="_blank"><img src="http://malwaretips.com/images/removalguide/downloadnow.gif" alt="" class="fr-fic fr-dii fr-draggable " style="" /></a></li> <li data-xf-list-type="ol">Right-click on OTL.exe and select Run as Administrator to start OTL.</li> <li data-xf-list-type="ol">Double click on <strong>OTL.exe</strong> to run it.</li> <li data-xf-list-type="ol">Under <strong>Output</strong>, ensure that <strong>Minimal Output</strong> is selected.</li> <li data-xf-list-type="ol">Under <strong>Extra Registry</strong> section, select <strong>Use SafeList</strong>.</li> <li data-xf-list-type="ol">Click the <strong>Scan All Users</strong> checkbox.</li> <li data-xf-list-type="ol">Click on <strong>Run Scan</strong> at the top left hand corner.</li> <li data-xf-list-type="ol">When done, two Notepad files will open.<ul> <li data-xf-list-type="ul"><strong>OTListIt.txt</strong> <-- <em>Will be opened</em></li> <li data-xf-list-type="ul"><strong>Extra.txt</strong> <-- <em>Will be minimized</em></li> </ul></li> <li data-xf-list-type="ol">Save the scan log somewhere that you can find it.</li> </ol><p></p><p></p><p><span style="font-size: 18px"><strong>What's next?</strong></span></p><p></p><p>Attach the following logs to your post (You can find <a href="http://malwaretips.com/Thread-How-to-use-the-attachment-system?pid=16072#pid16072" target="_blank"><strong>here</strong></a> details on how to use the Attachment System): </p><ol> <li data-xf-list-type="ol">Kaspersky TDSS Killer log</li> <li data-xf-list-type="ol">Emsisoft Emergency Kit log</li> <li data-xf-list-type="ol">OTL.txt</li> <li data-xf-list-type="ol">Extras.txt</li> </ol><hr /><p></p><p></p><p></p><p></p><p>You can start a thread in our <a href="http://malwaretips.com/Forum-PC-Security-Configuration-Wizard" target="_blank">PC Security Configuration Wizard</a> and we will give full support to build up a solid defense for your system.</p></blockquote><p></p>
[QUOTE="Jack, post: 37856, member: 1"] Hello and Welcome! With what anti-malware software did you scan your system?Was your system previously infected? Usually redirects happen because of some sort of residual damage after removing a malware infection. Let's check a few things: [SIZE=4][b]STEP 1:[/b] Check your internet connection for proxies[/SIZE] Proxy server prevents the user from accessing the internet,follow the below instructions to remove the a proxy server. [list=1][*]Open Internet Explorer. [list][*]For Internet Explorer 9 : Click on the gear icon [IMG]http://malwaretips.com/images/removalguide/icongear.jpg[/IMG] at the top (far right) and click again on [b]Internet Options[/b]. [*]For Internet Explorer 8 : Click on [b] Tools[/b], select [b]Internet Options[/b].[/list] [IMG]http://malwaretips.com/images/removalguide/ie1.png[/IMG] [*]Go to the tab [b]Connections[/b].At the bottom, click on [b]LAN settings[/b]. [IMG]http://malwaretips.com/images/removalguide/ie2.png[/IMG] [*][b]Uncheck[/b] the option [i]Use a proxy server for your LAN[/i]. This will remove the proxy server and allow you to use the internet again. [IMG]http://malwaretips.com/images/removalguide/ie3.png[/IMG] [/list] [SIZE=4]If you are a Firefox users, go to Firefox (Tools) > Options > Advanced tab > Network > Settings > Select [b]No Proxy[/b][/SIZE] [IMG]http://i.imgur.com/4W7v6.png[/IMG] [hr] [SIZE=4][b]STEP 2[/b] : Check your[b]DNS settings[/b][/SIZE] [b]Check Windows 7 DNS[/b] [list=1][*]On your [b]Start menu[/b], open the [b]Control Panel[/b]. [*]Under the [b]Network and Internet[/b] section, click [b]View network status and tasks[/b]. [*]In the [b]View your active networks[/b] section, click the item to the right of [b]Connections[/b]: [img]http://malwaretips.com/images/removalguide/dns.jpg[/img] [*]On the [b]General[/b] tab of the Connection Status window, click [b]Properties[/b]. [*]On the [b]General[/b] tab of the Connection Properties window, scroll down and select I[b]nternet Protocol Version 4 (TCP/IPv4)[/b], then click [b]Properties[/b]. [img]http://malwaretips.com/images/removalguide/dns1.png[/img] [*]On the [b]Genera[/b]l tab of the [b]Internet Protocol Version 4 (TCP/IPv4) Properties[/b] window, in the lower section, select [b]Obtain DNS server address automatically[/b]. [img]http://malwaretips.com/images/removalguide/dns2.png[/img] [*]Click [b]OK[/b] and exit all the windows.[/list] [hr] [SIZE=4][b]STEP 3[/b] : Check your [b]Windows HOSTS file[/b][/SIZE] The hosts file is one of several system facilities to assist in addressing network nodes in a computer network. It is a common part in an operating system's Internet Protocol (IP) implementation, and serves the function of translating human-friendly hostnames into numeric protocol addresses, called IP addresses, that identify and locate a host in an IP network. Because of its role in local name resolution, the hosts file represents an attack vector for malicious software. The file may be hijacked, for example, by adware, computer viruses, trojan horse software, and may be modified to redirect traffic from the intended destination to sites hosting content that may be offensive or intrusive to the user or the user’s computer system. [list=1][*]Go to > [i]C:\WINDOWS\system32\drivers\etc.[/i] [img]http://malwaretips.com/images/removalguide/host1.png[/img] [*] Double-click “hosts” file to open it.You can open this file with [b]Notepad[/b]. [img]http://malwaretips.com/images/removalguide/host2.png[/img] [*]The “hosts” file should look the same as our below code box.If there are more, then remove them and save changes. Default Host file for Windows 7 [code]# Copyright (c) 1993-2006 Microsoft Corp. # # This is a sample HOSTS file used by Microsoft TCP/IP for Windows. # # This file contains the mappings of IP addresses to host names. Each # entry should be kept on an individual line. The IP address should # be placed in the first column followed by the corresponding host name. # The IP address and the host name should be separated by at least one # space. # # Additionally, comments (such as these) may be inserted on individual # lines or following the machine name denoted by a '#' symbol. # # For example: # # 102.54.94.97 rhino.acme.com # source server # 38.25.63.10 x.acme.com # x client host # localhost name resolution is handle within DNS itself. # 127.0.0.1 localhost # ::1 localhost[/code][/list] You can find more details on how to reset your host file at [url=http://support.microsoft.com/kb/972034]Microsoft Support Center[/url]. [hr] [SIZE=4]Please tell me if you find any suspicious modification.[/SIZE] [SIZE=5][b]Security scans:[/b][/SIZE] [SIZE=4][b]STEP 1 : [/b] Download and scan with [url=http://support.kaspersky.com/downloads/utils/tdsskiller.exe][b]Kaspersky TDSSKiller[/b][/url] [/SIZE] TDSSKiller is a utility that was created in order to provide you with a simple means of disinfecting any system that suffers a rootkit infection.A rootkit is a program or a set of programs designed to obscure the fact that a system has been compromised. [list=1][*]Please download the latest official version of TDSSKiller. [*]Double-click on it to [b]launch it[/b]. [*]TDSSKiller will now start and display the welcome screen as shown below.In order to start a system scan , press the [i]'Start Scan'[/i] button. [img]http://malwaretips.com/images/removalguide/tdsskiller2.png[/img] [*]TDSSKiller will now scan your computer for the TDSS infection. [img]http://malwaretips.com/images/removalguide/tdsskiller3.png[/img] [*] When the scan has finished it will display a result screen stating whether or not the infection was found on your computer. If it was found it will display a screen similar to the one below. [IMG]http://malwaretips.com/images/removalguide/tdsskiller4.png[/IMG] [*]To remove the infection simply click on the [b]Continue[/b] button and TDSSKiller will attempt to clean the infection. [*]A [b]reboot[/b] might require to completely remove the malware from your system. In this scenario, always confirm the reboot action to be on the safe side.[/list] [SIZE=4][b]STEP 2:[/b] Download and scan with [url=http://www.surfright.nl/en/downloads][b]HitmanPro[/b][/url][/SIZE] [list=1]Please download the latest official version of Hitman Pro. [url=http://www.surfright.nl/en/downloads][img]http://malwaretips.com/images/removalguide/downloadnow.gif[/img][/url] [*]Start Hitman Pro by clicking on the previously downloaded file. [b]NOTE[/b] : If you have problems starting Hitman Pro, use the “[i]Force Breach[/i]” mode. Hold down the left [b]CTRL-key[/b] when you start Hitman Pro and all non-essential processes are terminated, including the malware process. ([url=http://www.youtube.com/watch?feature=player_embedded&v=m6eRWTv2STk]How to start Hitman Pro in Force Breach mode - video[/url]) [img]http://malwaretips.com/images/removalguide/hitman1.jpg[/img] [*]Click Settings to proceed to the application scan options. Note that Hitman Pro 3 is free to use for the first 30 days, after which time it will prompt you to purchase a licence key. In the Settings menu, ensure that the options "[i]Create Restore Point Before Removing Files[/i]" is checked, and click [b]OK[/b]. Click [b]Next[/b] to continue to the scan. [img]http://malwaretips.com/images/removalguide/hitman2.jpg[/img] [*]The Setup screen is displayed. Here, you can decide whether or not you wish to install Hitman Pro 3 on your system. To proceed with installation, select [b]Yes,create a copy of Hitman Pro so I can regularly scan this computer[/b] .Click [b]Next[/b] to continue. [img]http://malwaretips.com/images/removalguide/hitman3.png[/img] [*]Hitman Pro will start scanning your system for malicious software. Depending on the the size of your hard drive, and the performance of your computer, this step will take several minutes. [img]http://malwaretips.com/images/removalguide/hitman4.png[/img] [*]Once the scan is complete, a summary of detected malicious files is displayed. [img]http://malwaretips.com/images/removalguide/hitman5.jpg[/img] [*] Click [b]Next[/b] to start removing the infected files.Hitman Pro 3 will now cleanse the infected files, and in some instances, may suggest a reboot in order to completely remove the malware from your system. In this scenario, always confirm the reboot action to be on the safe side.[/list] [SIZE=4][b]STEP 3[/b]: Download and scan with Emsisoft Emergency Kit[/SIZE] [list=1][*]Please download the latest official version of Emsisoft Emergency Kit [url=http://download11.emsisoft.com/EmsisoftEmergencyKit.zip][img]http://malwaretips.com/images/removalguide/downloadnow.gif[/img][/url] [*]Open the EEK Folder on your Desktop and double click [b]EmergencyKitScanner.bat[/b] [*]Click "[b]Yes[/b]" to Update Emsisoft Emergency Kit [*]Put the mouse cursor over the "Menu" tab on the left and click-on "[b]Scan PC[/b]". [*]Select "[b]Smart Scan[/b]" and click-on the "[b]Scan[/b]" button. [*]Save the scan log somewhere that you can find it. [*]Exit Emsisoft Emergency Kit.[/list] [SIZE=4][b]STEP 4[/b]: Run a OTL scan[/SIZE] [list=1][*]Please [url=http://oldtimer.geekstogo.com/OTL.exe]download OTL[/url] and save it to your Desktop. [url=http://oldtimer.geekstogo.com/OTL.exe][img]http://malwaretips.com/images/removalguide/downloadnow.gif[/img][/url] [*]Right-click on OTL.exe and select Run as Administrator to start OTL. [*]Double click on [b]OTL.exe[/b] to run it. [*]Under [b]Output[/b], ensure that [b]Minimal Output[/b] is selected. [*]Under [b]Extra Registry[/b] section, select [b]Use SafeList[/b]. [*]Click the [b]Scan All Users[/b] checkbox. [*]Click on [b]Run Scan[/b] at the top left hand corner. [*]When done, two Notepad files will open. [list][*][b]OTListIt.txt[/b] <-- [i]Will be opened[/i] [*][b]Extra.txt[/b] <-- [i]Will be minimized[/i][/list] [*]Save the scan log somewhere that you can find it.[/list] [SIZE=5][b]What's next?[/b][/SIZE] Attach the following logs to your post (You can find [url=http://malwaretips.com/Thread-How-to-use-the-attachment-system?pid=16072#pid16072][b]here[/b][/url] details on how to use the Attachment System): [list=1] [*]Kaspersky TDSS Killer log [*]Emsisoft Emergency Kit log [*]OTL.txt [*]Extras.txt[/list] [hr] You can start a thread in our [url=http://malwaretips.com/Forum-PC-Security-Configuration-Wizard]PC Security Configuration Wizard[/url] and we will give full support to build up a solid defense for your system.[/hr][/hr][/hr][/hr] [/QUOTE]
Insert quotes…
Verification
Post reply
Top