Trust in Contextual - get rid of

G

Guest

Hi,

It's finally happened. Despite all my protection, I have something
hijacking machine. I have run Hijack this and see some obvious things. But
it doesn't seem to be working fully to rid me of it. When I try to go to
blog places for help, my machine is hijacked and sent to some Sheriff
program or Monster websearch site instead. How can I use Hijack this log
file to get help? Any suggestions?

Thanks!

JEL
 
A

Anonymous Bob

JEL said:
Hi,

It's finally happened. Despite all my protection, I have something
hijacking machine. I have run Hijack this and see some obvious things. But
it doesn't seem to be working fully to rid me of it. When I try to go to
blog places for help, my machine is hijacked and sent to some Sheriff
program or Monster websearch site instead. How can I use Hijack this log
file to get help? Any suggestions?

Thanks!

JEL

If you're having problems navigating to security web sites, you may have to
depend on currently installed programs. What anti-virus/ anti-adware
programs do you have on your system now?

Bob Vanderveen
 
D

Dave M

JEL;

It's not wise to use HijackThis without skilled guidance, because you're
apt to cause more harm to yourself than you'll be able to correct any
problem on your system. Merijn, the original developer of HijackThis,
maintains a list of support forums here which you'd be well advised to take
advantage of:

http://www.merijn.org/forums.php
 
A

Anonymous Bob

JEL said:
Hi,

It's finally happened. Despite all my protection, I have something
hijacking machine. I have run Hijack this and see some obvious things. But
it doesn't seem to be working fully to rid me of it. When I try to go to
blog places for help, my machine is hijacked and sent to some Sheriff
program or Monster websearch site instead. How can I use Hijack this log
file to get help? Any suggestions?

Here's a list of online scanners. It's unlikely that all of them are
blocked.
http://security.symantec.com
http://housecall.trendmicro.com
http://www.coledata.com/virusalert.htm
http://www.cybertechhelp.com/html/misc/av.php
http://www.pandasoftware.es/activescan/activescan-com.asp
http://www.pandasoftware.com/about_panda/press_room/nanoscan_online_scanner_detects_malware.htm
http://www.ravantivirus.com/scan/
http://www.bitdefender.com/

Bob Vanderveen
 
G

Guest

The Sheriff program you mention. Would that be SpySheriff by any chance? Its
important to post as much information as possible so that some appropriate
assistance can be given. For example. What Antispyware programs do you have
already installed on your system and have you run them? What do they tell
you? Are the definitions up to date? Is there a removal tool available?
Google if possible.
IMHO. A HJT log file should only be used as a last resort to locate and
eradicate persistent malaware by presenting the user with the opportunity of
removing the offending registry entries but, ONLY under the guidance of an
expert who fully understands the workings of the Windows registry. To do
otherwise, could render your system inoperable.

Stu
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top