Posted on 2004-04-19
Medium Priority
Last Modified: 2011-09-20
i have a file that I can not get rid of that I believe is associated with Zestyfind.com

Adaware can locate it but it says it can not remove it because it is still running.  The file is called


I have also recently noticed that there is something on my toolbar called "bird dupe cast"  Is this part of the Zestyfind problem?
Question by:BigWilz
  • 5
  • 2
LVL 21

Accepted Solution

jvuz earned 252 total points
ID: 10869127
LVL 49

Assisted Solution

sunray_2003 earned 248 total points
ID: 10874996
Use spybot ,ad-ware ,CWshredder and post the log from Hijackthis here

After installing them, First Update them and then run

Spyware/Adware removal tools:

What is spyware : http://www.spychecker.com/spyware.html

SpyBot-S&D : http://www.safer-networking.org/

Ad-aware : http://www.webattack.com/download/dladaware.shtml 

CWShredder: http://www.softpedia.com/public/cat/10/17/10-17-150.shtml

HijackThis : http://www.spychecker.com/program/hijackthis.html 
WEBINAR: GDPR Implemented - Tips & Lessons Learned

Join the WatchGuard team on Thursday, March 29th as we recount some valuable lessons learned in weighing the needs of a business against the new regulatory environment, look ahead at the two months left before implementation, and help you understand the steps you can take today!

LVL 21

Expert Comment

ID: 10875506
LVL 49

Expert Comment

ID: 10966109
Give us a feedback regarding your status on this question
LVL 21

Expert Comment

ID: 10975068
Please come back and give us some feedback so we can help more if necesarry.

LVL 21

Expert Comment

ID: 11209685


Featured Post

We Need Your Input!

WatchGuard is currently running a beta program for our new macOS Host Sensor for our Threat Detection and Response service. We're looking for more macOS users to help provide insight and feedback to help us make the product even better. Please sign up for our beta program today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
2017 was a scary year for cyber security.  Hear what our security experts say that hackers have in store for us in 2018.
This video tutorial shows you the steps to go through to set up what I believe to be the best email app on the android platform to read Exchange mail.  Get the app on your phone: The first step is to make sure you have the Samsung Email app on your …
From store locators to asset tracking and route optimization, learn how leading companies are using Google Maps APIs throughout the customer journey to increase checkout conversions, boost user engagement, and optimize order fulfillment. Powered …

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question