Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 91700 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

Computer HiJacked - pop ups / ads [Solved]


  • This topic is locked This topic is locked
21 replies to this topic

#16 HairManDan

HairManDan

    New Member

  • Authentic Member
  • Pip
  • 11 posts

Posted 08 May 2014 - 11:55 PM

Hi again Jeff,

 

I followed your instructions,  makes it very easy for me with the step by step.  There was only 1 thing of Java to delete and after it installed the new version, it checked for old versions and didn't see any.

 

I couldn't find the malware bytes but my friend said to check the start menu,  it must of been an old version because it updated it.  I couldn't find the hyper scan and and the one scan was only for registered license. I just ran the quick scan,  hope that is Ok?

 

I didn't see the link to run as administrator,  but Eset did run.

 

The computer seems to be running way better than it was before my first post, but the Eset scan found a bunch of stuff that worries me. I did notice the ammyy_admin program in the list from the Eset scan,  that is my salonbiz support if I need it,  they can take over my computer and help me out.

 

I have a bunch of stylists that work in my salon that use this computer and install a bunch of stuff on it. We are going to change the user account rights I guess after we are done here.

 

Thanks again ! I really appreciate your help,  the log files you have me post are crazy.

Dan

 

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Database version: v2014.05.09.04

Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 9.0.8112.16421
Tease :: TEASE-PC [administrator]

5/8/2014 10:47:38 PM
MBAM-log-2014-05-08 (22-56-46).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 240659
Time elapsed: 8 minute(s), 23 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 5
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7F6AFBF1-E065-4627-A2FD-810366367D01} (PUP.Optional.DefaultTab.A) -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{3E7C8B5A-96AB-438F-BF9B-782400655440} (PUP.Optional.Qwiklinx.A) -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B2D33ED6-EBBD-467C-BF6F-F175D9B51363} (PUP.Optional.DefaultTab.A) -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{BAD84EE2-624D-4e7c-A8BB-41EFD720FD77} (PUP.Optional.DefaultTab.A) -> No action taken.
HKLM\System\CurrentControlSet\Services\vxlsnyaiet32 (PUP.Optional.AdPeak.A) -> No action taken.

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 2
C:\Program Files\Information (PUP.Optional.Information.A) -> No action taken.
C:\Program Files\HQvidPv1.1 (PUP.Optional.HQVid.A) -> No action taken.

Files Detected: 6
C:\Program Files\Information\background.html (PUP.Optional.Information.A) -> No action taken.
C:\Program Files\Information\50368.crx (PUP.Optional.Information.A) -> No action taken.
C:\Program Files\Information\50368.xpi (PUP.Optional.Information.A) -> No action taken.
C:\Program Files\HQvidPv1.1\53098.crx (PUP.Optional.HQVid.A) -> No action taken.
C:\Program Files\HQvidPv1.1\53098.xpi (PUP.Optional.HQVid.A) -> No action taken.
C:\Program Files\HQvidPv1.1\background.html (PUP.Optional.HQVid.A) -> No action taken.

(end)

 

C:\AdwCleaner\Quarantine\C\Program Files\003\vxlsnyaiet32.exe.vir Win32/AdWare.Adpeak.F application
C:\AdwCleaner\Quarantine\C\ProgramData\apn\APN-Stub\W3IV6-G\APNIC.7z.vir a variant of Win32/Bundled.Toolbar.Ask.F potentially unsafe application
C:\AdwCleaner\Quarantine\C\ProgramData\apn\APN-Stub\W3IV6-G\APNIC.dll.vir a variant of Win32/Bundled.Toolbar.Ask.F potentially unsafe application
C:\Program Files\HQvidPv1.1\53098.crx JS/Toolbar.Crossrider.B potentially unwanted application
C:\Program Files\HQvidPv1.1\53098.xpi JS/Toolbar.Crossrider.B potentially unwanted application
C:\Program Files\Information\50368.crx JS/Toolbar.Crossrider.B potentially unwanted application
C:\Program Files\Information\50368.xpi JS/Toolbar.Crossrider.B potentially unwanted application
C:\Program Files\NoAdware\NoAdware5.exe probably a variant of Win32/Adware.ErrorClean application
C:\Program Files\NoAdware\nutilities.dll Win32/NoAdware potentially unwanted application
C:\Qoobox\Quarantine\C\Users\Tease\AppData\Roaming\DefaultTab\DefaultTab\DefaultTabBHO.dll.vir a variant of Win32/Toolbar.DefaultTab.B potentially unwanted application
C:\Qoobox\Quarantine\C\Users\Tease\AppData\Roaming\DefaultTab\DefaultTab\DefaultTabStart.exe.vir a variant of Win32/Toolbar.DefaultTab.B potentially unwanted application
C:\Qoobox\Quarantine\C\Users\Tease\AppData\Roaming\DefaultTab\DefaultTab\DefaultTabWrap.dll.vir a variant of Win32/Toolbar.DefaultTab.B potentially unwanted application
C:\Qoobox\Quarantine\C\Users\Tease\AppData\Roaming\DefaultTab\DefaultTab\DTUpdate.exe.vir Win32/Toolbar.DefaultTab.A potentially unwanted application
C:\Users\Tease\Desktop\AMMYY_Admin.exe a variant of Win32/RemoteAdmin.Ammyy.B potentially unsafe application
C:\Users\Tease\Downloads\AMMYY_Admin.exe a variant of Win32/RemoteAdmin.Ammyy.B potentially unsafe application
C:\Users\Tease\Downloads\noadware.exe multiple threats
 


    Advertisements

Register to Remove


#17 jeffce

jeffce

    Malware Guy

  • Authentic Member
  • PipPipPipPipPipPip
  • 8,693 posts

Posted 09 May 2014 - 05:38 AM

Hi,
 
Well done!!  
 
Run Malwarebytes again but this time remove anything that is found and then post the new log.
----------------
 
ComboFix
 
Please open Notepad (Start -> Run -> type notepad in the Open field -> OK) and copy and paste the text present inside the code box below:

ClearJavaCache::
 
File::
C:\Program Files\HQvidPv1.1\53098.crx
C:\Program Files\HQvidPv1.1\53098.xpi
C:\Program Files\Information\50368.crx
C:\Program Files\Information\50368.xpi
C:\Program Files\NoAdware\NoAdware5.exe
C:\Program Files\NoAdware\nutilities.dll
C:\Users\Tease\Downloads\noadware.exe

  • Save this as CFScript.txt and change the "Save as type" to "All Files" and place it on your desktop.

    CFScriptB-4.gif
  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before following the steps below. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
  • Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
  • ComboFix may request an update; please allow it.
  • ComboFix will now run a scan on your system. It may reboot your system when it finishes. This is normal.
  • When finished, it shall produce a log for you. Copy and paste the contents of the log in your next reply.
  • CAUTION: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.

------------------------

 

Post both the new ComboFix log, Malwarebytes log and also let me know how your system is running.  :)


Posted Image
 
 

#18 HairManDan

HairManDan

    New Member

  • Authentic Member
  • Pip
  • 11 posts

Posted 09 May 2014 - 01:01 PM

Hi Jeff,

 

It was so much better after you had me do things. Really seems to responding well now and I am not getting any more popups as I had said before. Seems like a new computer again!

 

Ran the tools like you said and did what you told me to.

 

Thanks again!

 

I can't find the Malwarebytes log ???

 

 

ComboFix 14-05-07.03 - Tease 05/09/2014  13:41:28.2.2 - x86
Microsoft® Windows Vista™ Business   6.0.6002.2.1252.1.1033.18.2004.810 [GMT -5:00]
Running from: c:\users\Tease\Desktop\ComboFix.exe
Command switches used :: c:\users\Tease\Desktop\CFScript.txt
AV: avast! Antivirus *Disabled/Updated* {17AD7D40-BA12-9C46-7131-94903A54AD8B}
SP: avast! Antivirus *Disabled/Updated* {ACCC9CA4-9C28-93C8-4B81-AFE241D3E736}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
FILE ::
"c:\program files\HQvidPv1.1\53098.crx"
"c:\program files\HQvidPv1.1\53098.xpi"
"c:\program files\Information\50368.crx"
"c:\program files\Information\50368.xpi"
"c:\program files\NoAdware\NoAdware5.exe"
"c:\program files\NoAdware\nutilities.dll"
"c:\users\Tease\Downloads\noadware.exe"
.
.
(((((((((((((((((((((((((   Files Created from 2014-04-09 to 2014-05-09  )))))))))))))))))))))))))))))))
.
.
2014-05-09 18:50 . 2014-05-09 18:50 -------- d-----w- c:\windows\system32\config\systemprofile\AppData\Local\temp
2014-05-09 18:50 . 2014-05-09 18:50 -------- d-----w- c:\users\Default\AppData\Local\temp
2014-05-09 04:07 . 2014-05-09 04:07 -------- d-----w- c:\program files\ESET
2014-05-09 03:33 . 2014-05-09 03:33 -------- d-----w- c:\users\Tease\AppData\Roaming\Oracle
2014-05-09 03:33 . 2014-05-09 03:33 -------- d-----w- c:\programdata\Oracle
2014-05-09 03:32 . 2014-05-09 03:32 -------- d-----w- c:\program files\Common Files\Java
2014-05-09 03:32 . 2014-05-09 03:32 94632 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
2014-05-09 03:31 . 2014-05-09 03:31 -------- d-----w- c:\program files\Java
2014-05-08 03:54 . 2014-05-09 18:50 -------- d-----w- c:\users\Tease\AppData\Local\temp
2014-05-07 04:40 . 2010-08-30 13:34 536576 ----a-w- c:\windows\system32\sqlite3.dll
2014-05-07 04:39 . 2014-05-08 18:48 -------- d-----w- C:\AdwCleaner
2014-05-06 10:20 . 2014-04-17 10:32 8050496 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{43B461D9-A7AA-4B68-AF60-B16CF3DF381B}\mpengine.dll
2014-05-04 00:14 . 2014-05-04 00:14 -------- d-----w- c:\users\Tease\AppData\Roaming\AVAST Software
2014-05-04 00:13 . 2014-05-04 00:13 776976 ----a-w- c:\windows\system32\drivers\aswSnx.sys
2014-05-04 00:13 . 2014-05-04 00:13 57672 ----a-w- c:\windows\system32\drivers\aswTdi.sys
2014-05-04 00:13 . 2014-05-04 00:13 180632 ----a-w- c:\windows\system32\drivers\aswVmm.sys
2014-05-04 00:13 . 2014-05-04 00:13 49944 ----a-w- c:\windows\system32\drivers\aswRvrt.sys
2014-05-04 00:13 . 2014-05-04 00:13 411552 ----a-w- c:\windows\system32\drivers\aswSP.sys
2014-05-04 00:13 . 2014-05-04 00:13 67824 ----a-w- c:\windows\system32\drivers\aswMonFlt.sys
2014-05-04 00:13 . 2014-05-04 00:13 54832 ----a-w- c:\windows\system32\drivers\aswRdr.sys
2014-05-04 00:13 . 2014-05-04 00:13 24184 ----a-w- c:\windows\system32\drivers\aswHwid.sys
2014-05-04 00:13 . 2014-05-04 00:13 271264 ----a-w- c:\windows\system32\aswBoot.exe
2014-05-04 00:13 . 2014-05-04 00:13 43152 ----a-w- c:\windows\avastSS.scr
2014-05-04 00:12 . 2014-05-04 00:12 -------- d-----w- c:\program files\AVAST Software
2014-05-04 00:10 . 2014-05-04 00:11 -------- d-----w- c:\programdata\AVAST Software
2014-05-03 08:00 . 2014-04-29 10:07 2382848 ----a-w- c:\windows\system32\mshtml.tlb
2014-04-29 01:29 . 2014-05-05 21:30 -------- d-----w- c:\users\Public\Util
2014-04-14 17:13 . 2014-04-14 17:13 -------- d-----w- c:\program files\Flash Update
2014-04-14 17:11 . 2014-04-14 17:11 -------- d-----w- c:\users\Tease\AppData\Local\pptaddin
2014-04-14 17:11 . 2014-05-05 18:00 -------- d-----w- c:\users\Tease\AppData\Local\SoftUpdate
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-03-31 14:35 . 2009-10-02 23:16 231584 ------w- c:\windows\system32\MpSigStub.exe
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{81017EA9-9AA8-4A6A-9734-7AF40E7D593F}"= "c:\program files\Yahoo!\Companion\Installs\cpn5\yt.dll" [2014-02-11 1565464]
.
[HKEY_CLASSES_ROOT\clsid\{81017ea9-9aa8-4a6a-9734-7af40e7d593f}]
[HKEY_CLASSES_ROOT\yt.YTNavAssistPlugin.1]
[HKEY_CLASSES_ROOT\TypeLib\{003028C2-EA1C-4676-A316-B5CB50917002}]
[HKEY_CLASSES_ROOT\yt.YTNavAssistPlugin]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\~\Browser Helper Objects\{B50DF051-E1D4-439C-B94E-F4DE82B56542}]
2013-01-22 15:33 231872 ----a-w- c:\users\Tease\AppData\Roaming\Cartwheel\Cartwheel.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\00avast]
@="{472083B0-C522-11CF-8763-00608CC02F24}"
[HKEY_CLASSES_ROOT\CLSID\{472083B0-C522-11CF-8763-00608CC02F24}]
2014-05-04 00:13 260976 ----a-w- c:\program files\AVAST Software\Avast\ashShell.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2011-05-31 39408]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]
"GoogleChromeAutoLaunch_77B66175FF1ADC7C53A5C4A2372E2B86"="c:\program files\Google\Chrome\Application\chrome.exe" [2014-04-24 841032]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ECenter"="c:\dell\E-Center\EULALauncher.exe" [2008-02-27 17920]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2007-06-15 142104]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2007-06-15 154392]
"Persistence"="c:\windows\system32\igfxpers.exe" [2007-06-15 138008]
"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\Iaanotif.exe" [2007-10-03 178712]
"PDVDDXSrv"="c:\program files\CyberLink\PowerDVD DX\PDVDDXSrv.exe" [2008-05-23 128296]
"HPUsageTracking"="c:\program files\HP\HP UT\bin\hppusg.exe" [2007-05-04 36864]
"hpbdfawep"="c:\program files\HP\Dfawep\bin\hpbdfawep.exe" [2007-04-25 954368]
"WinampAgent"="c:\program files\Winamp\winampa.exe" [2009-04-10 37888]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2013-05-08 41056]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2013-04-04 958576]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2007-09-25 1282048]
"AvastUI.exe"="c:\program files\AVAST Software\Avast\AvastUI.exe" [2014-05-04 3873704]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2013-07-02 254336]
.
c:\users\Tease\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OpenOffice.org 3.0.lnk - c:\program files\OpenOffice.org 3\program\quickstart.exe [2008-9-12 384000]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ    autocheck autochk *\0aswBoot.exe /M:1b2a9a78bed /dir:C:\Program
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-3317765444-2801609547-1844496941-1000]
"EnableNotificationsRef"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork REG_MULTI_SZ    PLA DPS BFE mpssvc
LocalServiceAndNoImpersonation REG_MULTI_SZ    FontCache
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2014-04-30 07:29 1078088 ----a-w- c:\program files\Google\Chrome\Application\34.0.1847.131\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2014-05-09 c:\windows\Tasks\2-Way Appt Confirmation.job
- c:\program files\Demandforce D3\DFLink\DFLink.exe [2014-04-29 12:30]
.
2014-05-09 c:\windows\Tasks\Demandforce DFLink Update.job
- c:\program files\Demandforce D3\DFLink\DFUpdate.exe [2013-11-12 03:00]
.
2014-05-09 c:\windows\Tasks\Demandforce DFLink Upload.job
- c:\program files\Demandforce D3\DFLink\DFLink.exe [2014-04-29 12:30]
.
2014-05-09 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-05-31 14:53]
.
2014-05-09 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-05-31 14:53]
.
2014-05-09 c:\windows\Tasks\HP WEP.job
- c:\program files\HP\Dfawep\bin\hpbdfawep.exe [2007-04-25 20:28]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://google.com/
mStart Page = hxxp://partnerpage.google.com/smallbiz.dell.com/en_us?hl=en&client=dell-usuk&channel=us-smb&ibd=6081024
uSearchURL,(Default) = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr9/*http://www.yahoo.com
TCP: Interfaces\{0349A97C-F561-496C-9344-F1DCE89A54E9}: NameServer = 8.8.8.8,69.217.161.1
.
- - - - ORPHANS REMOVED - - - -
.
AddRemove-GetSavin - c:\users\Tease\AppData\Local\getsavin\uninst.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2014-05-09 13:50
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2014-05-09  13:53:32
ComboFix-quarantined-files.txt  2014-05-09 18:53
ComboFix2.txt  2014-05-08 04:03
.
Pre-Run: 182,709,178,368 bytes free
Post-Run: 182,748,377,088 bytes free
.
- - End Of File - - 3EF7131BE617FB826E2B7FA21DA45803
5C616939100B85E558DA92B899A0FC36
 



#19 jeffce

jeffce

    Malware Guy

  • Authentic Member
  • PipPipPipPipPipPip
  • 8,693 posts

Posted 09 May 2014 - 01:03 PM

Providing there are no other malware related problems...
 
IT APPEARS THAT THE LOGS WE HAVE NOW ARE NOW CLEAN!  GREAT JOB!!  
 
This infection appears to have been cleared, but I can not give you any absolute guarantees.  As a precaution, I would go ahead and change all of your passwords as this is especially important after an infection.
----------
 

The following will implement some cleanup procedures as well as reset System Restore points:
 
Press the Windows key + R and this will open the Run text box.  Copy/paste the following text into the Run box as shown and click OK.
  Combofix /Uninstall
  (Note: There is a space between the ..X and the /U that needs to be there.)
 
jEuYelX.jpg
----------
 

81mYIKe.jpg  AdwCleaner
 
Double click on AdwCleaner.exe to run the tool again.

  • Click on the Uninstall button.
  • Click Yes when asked are you sure you want to uninstall.
  • Both AdwCleaner.exe, its folder and all logs will be removed.

--------------


 Any of the logs that you created for use in the forums or remaining tools that have not yet been removed can be deleted so they aren't cluttering up your desktop. If you did not have Malwarebytes Antimalware before, I would keep it and run it weekly.
----------
 
Here are some tips to reduce the potential for spyware infection in the future:
 
1. Make your Internet Explorer more secure - This can be done by following these simple instructions:

  • From within Internet Explorer click on the Tools menu and then click on Options.
  • Click once on the Security tab
  • Click once on the Internet icon so it becomes highlighted.
  • Click once on the Custom Level button.
  • Change the Download signed ActiveX controls to Prompt
  • Change the Download unsigned ActiveX controls to Disable
  • Change the Initialize and script ActiveX controls not marked as safe to Disable
  • Change the Installation of desktop items to Prompt
  • Change the Launching programs and files in an IFRAME to Prompt
  • Change the Navigate sub-frames across different domains to Prompt
  • When all these settings have been made, click on the OK button.
  • If it prompts you as to whether or not you want to save the settings, press the Yes button.
  • Next press the Apply button and then the OK to exit the Internet Properties page.

2. FireFox  If you use Firefox, I recommend installing the following add-ons to help make your Firefox browser more secure:
NoScript
AdBlock Plus 
 
3. Use and update an anti-virus software - I can not overemphasize the need for you to use and update your anti-virus application on a regular basis.  With the ever increasing number of new variants of malware arriving on the scene daily, you become very susceptible to an attack without updated protection.
 
4. Firewall
Using a third-party firewall will allow you to give/deny access for applications that want to go online. Without a firewall your computer is susceptible to being hacked and taken over. Simply using a firewall in its default configuration can lower your risk greatly.   **There are firewalls that could be downloaded and used but I would personally only recommend using one of the following below:
Online Armor Free
Agnitum Outpost Firewall Free
Comodo Firewall Free
 
5. Make sure you keep your Windows OS current.  Windows XP users can visit Windows update  regularly to download and install any critical updates and service packs. Windows Vista/7 users can open the Start menu > All Programs > Windows Update > Check for Updates (in left hand task pane) to update these systems.  Without these you are leaving the back door open.
 
6. WOT (Web of Trust) As "Googling" is such an integral part of internet life, this free browser add on warns you about risky websites that try to scam visitors, deliver malware or send spam. It is especially helpful when browsing or searching in unfamiliar territory. WOT's color-coded icons show you ratings for 21 million websites, helping you avoid the dangerous sites.  WOT has an add-on available for Firefox, Internet Explorer as well as Google Chrome.
 
7. Finally, I strongly recommend that you read Miekiemoes' great advice How to prevent malware.
 
Please reply to this thread once more if you are satisfied so that we can mark the problem as resolved.
----------


  • HairManDan likes this
Posted Image
 
 

#20 HairManDan

HairManDan

    New Member

  • Authentic Member
  • Pip
  • 11 posts

Posted 09 May 2014 - 04:37 PM

Jeff,

 

Thanks again,  so much.  That took less than I figured it would of.

 

Everything seems good one again!

 

Dan



#21 jeffce

jeffce

    Malware Guy

  • Authentic Member
  • PipPipPipPipPipPip
  • 8,693 posts

Posted 09 May 2014 - 05:13 PM

You are more than welcome!  Glad that I could help.  :)


Posted Image
 
 

#22 jeffce

jeffce

    Malware Guy

  • Authentic Member
  • PipPipPipPipPipPip
  • 8,693 posts

Posted 10 May 2014 - 09:18 AM

Since this issue appears to be resolved ... this Topic has been closed. Glad we could be of assistance.

If you're the topic starter, and need this topic reopened, please contact a staff member with the address of the thread.

Everyone else please follow the instructions here http://forums.whatth...ed_t106388.html
and start a New Topic.
Posted Image
 
 

Related Topics



0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users