Go Back   Cyber Tech Help Support Forums > Software > Malware Removal

Notices

Malware Removal Discussion about Trojans, viruses, hoaxes, firewalls, spyware, and general Security issues. If you suspect your PC is infected with a virus, trojan or spyware app please include any supporting documentation or logs

Closed Topic
 
Topic Tools
  #1  
Old May 28th, 2004, 08:18 AM
AnnMarie's Avatar
AnnMarie AnnMarie is offline
CTH Subscriber
 
Join Date: Oct 2001
O/S: Windows Vista 32-bit
Location: New Zealand
Posts: 59,810
Please read before posting Hijack This logs.

Please do not post your logs in someone else's thread. Start a new thread by clicking on New Thread in the top lefthand corner of the Forum.

The latest version of Hijack This can be downloaded from here. This version of Hijack This will self-extract when you doubleclick on it to C:\Program Files. If you are able to, please run either Ad-Aware or Spybot first.

A new version of Ad-Aware has been released. If you have Ad-Aware 6 installed, uninstall it before installing Ad-Aware SE. I understand that updates for Ad-Aware 6 have now been phased out.

Choose a download location for Ad-Aware SE from here. When you have installed it, make sure that you read all the instructions and go online and update it before you run it.

To configure Ad-Aware, click on the Configuration button (second from left in the top righthand corner) and follow the below instructions:

Click on the General button on the left hand side.

Make sure the following items under "Safety" have a green check in them. If they do not, click once on the circle next to them to put a checkmark in it.

Automatically save logfile
Automatically quarantine objects prior to removal
Safe Mode (always request confirmation)


Next click on the Advanced button on the left hand side.

Make sure the following items under "Logfile Detail Level" have a green check in them. If they do not, click once on the circle next to them to put a checkmark in it.

Include additional object information
Include negligible objects information
Include environment information


Next click on the Tweak button on the left hand side.

Click on the + (plus) sign next "Scanning Engine". Make sure the following items under "Scanning Engine" have a green check in them. If they do not, click once on the circle next to them to put a checkmark in it.

Unload recognized processes & modules during scan
Scan registry for all users instead of current user only


Next click on the + (plus) sign next to "Cleaning Engine". Make sure the following items under "Cleaning Engine" have a green check in them. If they do not, click once on the circle next to them to put a checkmark in it.

Always try to unload modules before deletion
During removal, unload Explorer and IE if necessary
Let Windows remove files in use at next reboot
Delete quarantined objects after restoring


Click on the + (plus) sign next to "Log Files". Make sure the following items under "Log Files" have a green check in them. If they do not, click once on the circle next to them to put a checkmark in it.

Include basic Ad-Aware settings in logfile
Include additional Ad-Aware settings in logfile


Once these settings have been completed, click on the Proceed button.

Now click on Scan Now, click on "Select" to choose which drive to scan and click on "Perform a full system scan". Uncheck the Search for negligible risk entries. Click on "Next" to begin scanning.

NB, to remove spyware objects found, rightclick on one and choose "Select All Objects"

Reboot afterwards.

Now run Hijack This and post your log.

Spybot can be downloaded from here and there is a tutorial here.

If you are unable to download and run Ad-Aware or Spybot, could you please say so in your thread and post any error messages.
  #2  
Old June 2nd, 2004, 03:21 AM
lufbra lufbra is offline
CTH Subscriber
 
Join Date: Sep 2000
O/S: Windows 10 Home
Posts: 12,532
Nice post, AnnMarie, and please allow me to add to this...

For anyone who gives up their valuable time to help others here...If someone posts a question in another forum that you know is possibly HiJack This related, can you please ask the "poster" to post the HJT log in this Cyber Safety forum...

http://www.cybertechhelp.com/forums/...splay.php?f=25

Just to keep things in some kind of order here!!
  #3  
Old June 21st, 2004, 01:28 AM
MishY's Avatar
MishY MishY is offline
Cyber Tech Help Administrator
 
Join Date: Sep 2000
O/S: Linux
Location: England
Age: 46
Posts: 9,287
Please search the Cyber Safety forum before posting as it is very likely your spyware problem has been resolved for someone else. This will aid you to find your solution quicker.

Thank you
Closed Topic

Bookmarks

Topic Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Topics
Topic Topic Starter Forum Replies Last Post
Hints for posting in the Networking Forum *** PLEASE READ BEFORE POSTING z1p Networking 3 August 12th, 2010 03:03 PM
How do I learn to read the hijack logs? viking12344 Malware Removal 14 June 12th, 2005 04:23 PM
posting logs dr_ledger Malware Removal 7 February 23rd, 2005 02:46 AM
Posting Logs gcarrier Malware Removal 2 November 14th, 2004 05:43 AM
Help me read Hijack logs enat66 The Anything Else Board 2 April 30th, 2004 09:15 PM


All times are GMT +1. The time now is 03:23 PM.