Solved

www.makemsearch.com

Posted on 2004-09-27
12
154 Views
Last Modified: 2013-12-04
This is personal.  I have been fighting the adware software that has infected my machine.  It have reach a new level where it has installed itself on my tool bars.  When IE initially starts up the url listed is www.makemsearch.com.  Any idea how to remove this and prevent future infections?

Thanks,

Mac

PS - I gave this a high point level as I have no clue were to start.
0
Comment
Question by:RWMacfarlane
  • 4
  • 3
  • 2
  • +2
12 Comments
 
LVL 32

Accepted Solution

by:
Luc Franken earned 500 total points
ID: 12163430
Hi RWMacfarlane,

>>as I have no clue were to start.<<
Your place to start is: http:Q_20975384.html

From there, find the links to adaware and spybot search and destroy.
Run a full systemscan with Ad-aware, see if it helps, if it doesn't, run a full systemscan with spybot S&D. (make sure to update both for running)
If it doesn't help, please post back.

Greetings,

LucF
0
 
LVL 65

Expert Comment

by:SheharyaarSaahil
ID: 12163529
Remember to run the spyware removal tools in safemode and turn off ur system restore before cleaning ur system if u are running WinXP\ME !!

And Use ToolbarCop to remove the unwanted Toolband, Toolbar Icons and BHO:
http://www.mvps.org/sramesh2k/toolbarcop.htm
( site credit goes to Ramesh >> http://www.experts-exchange.com/M_926622.html :)

Also Download HijackThis v1.98.2 from here, run it and Save the LOG file:
http://tools.radiosplace.com/HijackThis.exe

Then Post it at this site >> http://www.hijackthis.de/index.php?langselect=english
and it will automatically analyse it for u,,, Fix everything which it labels as Nasty :)
To Fix, check the lines and click on Fix Checked !!

CAUTION: Before fixing the entries in hijackthis, make sure that they are really Nasty and can be deleted, better u first research for it on Google and then when u will confirm that they shud be deleted, Fix them. And whenever u run Hijackthis, run it from a New folder on ur desktop, so that in case of any problem, u can take advantages of its created backups of fixed items. And in case if u still face problems in dealing with it, just analyse ur log at the above site, and then scroll down where u will see a Save Analyse button, hit it and it will save ur Log Analysation, then copy the link of that page and paste it here, and we will check it for u :)
0
 
LVL 1

Expert Comment

by:Grinler-
ID: 12201882
I would advise you post your hijackthis log here for review rather than letting the script do it for you.  Unless you know what you are doing, fixing an item can cause problems.
0
 
LVL 12

Expert Comment

by:alandc
ID: 12230140
Please do NOT post your hijack log files.
They only gum up the search engines.

Only use them at this location
http://www.hijackthis.de/index.php?langselect=english

If you want to share the results with us that is fine.

The spyware tools mentioned are capable of removing even the latest cruel versions of spyware available but let us know if you run into difficulties.
0
 
LVL 1

Expert Comment

by:Grinler-
ID: 12230281
I disagree with using the automatic log analyzer.  It has in the past advised on removing valid items and ignored harmful items.  If you want reliable help with a log, it should be done manually.
0
 
LVL 32

Expert Comment

by:Luc Franken
ID: 12230325
Grinler-

Although looking at a log myself is better then running it through a log analizer, you might want to read this:
http://www.experts-exchange.com/Community_Support/Expert_Input/Q_21129167.html

So, then you might understand the reason to point to automatic processing before manual handling.

Thanks,

LucF
0
Free Gift Card with Acronis Backup Purchase!

Backup any data in any location: local and remote systems, physical and virtual servers, private and public clouds, Macs and PCs, tablets and mobile devices, & more! For limited time only, buy any Acronis backup products and get a FREE Amazon/Best Buy gift card worth up to $200!

 
LVL 1

Expert Comment

by:Grinler-
ID: 12230451
Ahh ok.  Never knew that was a rule.  Dont necessarily agree...but i dont run the place :)
0
 
LVL 32

Expert Comment

by:Luc Franken
ID: 12230606
Although it isn't a rule, it's more like a guideline because of the many people around Experts Exchange cluttering the database with Hijackthis logfiles.
The agreement became only to ask for a HJT logfile if everything else fails. (Like it should be IMO)

Thanks again,

LucF
0
 

Author Comment

by:RWMacfarlane
ID: 12275441
LucF,

I have a question.  I checked the tips section as you suggested and found that one of tips, disable the auto down load, seems to have solved the problem.  Who do I give the point?  You are the person who gave the tips I used?

Cheers,

Mac

0
 
LVL 12

Expert Comment

by:alandc
ID: 12275588
I would point a reference to -->
http://www.experts-exchange.com/Web/Browser_Issues/Q_20975384.html

which is the link to "standard response material re Spyware, Adware, BHOs, and other Malware"
and suggest (as you have) that disabling Auto-Download fixed your browser issues.

You can then leave the question open and the points un-assigned for an administrator to decide or else divide the points among those technicans that helped you based on your own assessment of their helpfulness.
0
 
LVL 65

Expert Comment

by:SheharyaarSaahil
ID: 12276100
>> Who do I give the point?
to LucF..... he gave the link which helped u to solve ur problem..... so he deserves the credit here :)
0
 
LVL 32

Expert Comment

by:Luc Franken
ID: 12279692
Glad to help :)

LucF
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now