C:\spad\start.html

Discussion in 'SpywareBlaster & Other Forum' started by Rbeis, May 27, 2004.

Thread Status:
Not open for further replies.
  1. Rbeis

    Rbeis Registered Member

    Joined:
    May 27, 2004
    Posts:
    2
    My Browser Hijack Blaster has worked perfectly for months but now will not control "C:\spad\start.html," a porno "start" page. No matter how many times I reset my IE home page, it resets to C:\spad\start.html, and Blaster now thinks that's my home page. When I reset to my real home page, Blaster won't adjust. Can anyone help?
     
  2. LowWaterMark

    LowWaterMark Administrator

    Joined:
    Aug 10, 2002
    Posts:
    18,280
    Location:
    New England
    From what you've said it looks like some kind of spyware managed to become embedded into your system, and it'll need to be removed before you can get control over your home page. (BHB provides only one main protection, alerts regarding changes to the default pages in your browser. Unfortunately, there's a lot more to modern spyware than that, and such spyware can cause many more problems than just page changes. At least BHB was able to let you know the problem is there.)

    The best way to address this is to follow the scanning procedure described in this thread and post a HijackThis Log in that forum section for the experts to review):

    https://www.wilderssecurity.com/showthread.php?t=15913
     
  3. Rbeis

    Rbeis Registered Member

    Joined:
    May 27, 2004
    Posts:
    2
    Problem fixed. I did something else. First I used a 48-hour-old Restore Point. That ended the hijacking of my IE home page. Then, later, I noticed that the spyware ("Spad") had put a whole folder on my C drive and deleted it without trouble. . . . Normally I use Enigma Spyhunter to get rid of such pests.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.