res://fljtt.dll/index.html#37049

Discussion in 'adware, spyware & hijack cleaning' started by NumbersGuy, Jun 18, 2004.

Thread Status:
Not open for further replies.
  1. NumbersGuy

    NumbersGuy Registered Member

    Joined:
    Jun 18, 2004
    Posts:
    1
    It seems I've been hit by the Coolwebsearch homepage hijacker. I've changed the default pages in the registry settings, reset my original settings, followed Microsoft's advice on using msconfig but all to avail. Someone did suggest opening up the dll file in notepad and erasing the data and then saving the file. It does prevent the search page from popping up but I get an error page instead so it's not much better.

    Anyone have any advice?
     
  2. snapdragin

    snapdragin Registered Member

    Joined:
    Feb 16, 2002
    Posts:
    8,415
    Location:
    Southern Ont., Canada
    Hi NumbersGuy,

    Welcome to Wilders.

    Please follow ALL the instructions in this link:
    https://www.wilderssecurity.com/showthread.php?t=15913

    Once you have downloaded HijackThis, create a permanent folder for it on your C: (call the folder whatever you'd like) then unzip Hijackthis.exe into the new folder (do not put it in a Temp folder or desktop).

    Then open Hijackthis and run it by clicking on the Scan button. When the scan has finished, the "Scan" button will then change to a Save Log button. Press the "Save Log" button and save it to a location you can easily find it. Open the saved log with Notepad, and copy and paste the entire contents of the log here in your next post.

    Please do NOT fix anything in Hijackthis by yourself. Most of what it lists will be harmless and even essential. Someone will review your log and reply back with instructions on what needs to be fixed.

    Regards,

    snap
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.