Solved

zestyfind.com

Posted on 2004-04-19
9
195 Views
Last Modified: 2011-09-20
i have a file that I can not get rid of that I believe is associated with Zestyfind.com

Adaware can locate it but it says it can not remove it because it is still running.  The file is called

aqtiveds.cpy.dll

I have also recently noticed that there is something on my toolbar called "bird dupe cast"  Is this part of the Zestyfind problem?
0
Comment
Question by:BigWilz
  • 5
  • 2
9 Comments
 
LVL 21

Accepted Solution

by:
jvuz earned 63 total points
Comment Utility
0
 
LVL 49

Assisted Solution

by:sunray_2003
sunray_2003 earned 62 total points
Comment Utility
Use spybot ,ad-ware ,CWshredder and post the log from Hijackthis here

After installing them, First Update them and then run

Spyware/Adware removal tools:
------------------------------

What is spyware : http://www.spychecker.com/spyware.html

SpyBot-S&D : http://www.safer-networking.org/

Ad-aware : http://www.webattack.com/download/dladaware.shtml

CWShredder: http://www.softpedia.com/public/cat/10/17/10-17-150.shtml

HijackThis : http://www.spychecker.com/program/hijackthis.html
0
 
LVL 21

Expert Comment

by:jvuz
Comment Utility
0
What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 
LVL 21

Expert Comment

by:jvuz
Comment Utility
0
 
LVL 49

Expert Comment

by:sunray_2003
Comment Utility
Give us a feedback regarding your status on this question
0
 
LVL 21

Expert Comment

by:jvuz
Comment Utility
Please come back and give us some feedback so we can help more if necesarry.

Jvz
0
 
LVL 21

Expert Comment

by:jvuz
Comment Utility
Thanx,

Jvuz
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now