[Webinar] Streamline your web hosting managementRegister Today

x
?
Solved

Plomedia

Posted on 2011-03-10
9
Medium Priority
?
1,120 Views
Last Modified: 2013-12-06
When I'm web searching, I get redirected to Plomedia. How can I stop this?
0
Comment
Question by:stevedantonio
  • 6
  • 3
9 Comments
 
LVL 38

Accepted Solution

by:
younghv earned 2000 total points
ID: 35095774
For Hijacking/re-directs, you might want to start with TDSSKILLER found here:
http://support.kaspersky.com/downloads/utils/tdsskiller.zip

* Download the file TDSSKiller.zip and extract it into a folder on the infected (or potentially infected) PC.
* Execute the file TDSSKiller.exe.
* Wait for the scan and disinfection process to be over. You do not have to reboot the PC after the disinfection is over.

If the tool finds a hidden service it will prompt you to type "delete",  you can also just hit "Enter" without typing in and the scan will continue...
The user can then post the log to be analyzed.

Let us know the results and we can take the next steps.
0
 
LVL 38

Expert Comment

by:younghv
ID: 35095951
Depending on your results with the above, move to the next steps:

Download, install, and run
CCleaner (www.ccleaner.com)
Doing this will clean out all of the Temp/Junk files from your browser.

Download, install, and run
Malwarebytes (MBAM) (http://www.malwarebytes.org/mbam.php)
When downloading, save to your "Desktop" and use the "Save As" function (Internet Explorer) to rename the file.
The instructions are included right in that link.

When finished with MBAM, post the log that is generated and let us look at it for you.

IF NEEDED, we may ask you do download ComboFix (using the same "Save As" process).
0
 

Author Comment

by:stevedantonio
ID: 35095963
scan results

 scan results
0
Never miss a deadline with monday.com

The revolutionary project management tool is here!   Plan visually with a single glance and make sure your projects get done.

 
LVL 38

Expert Comment

by:younghv
ID: 35095992
Excellent!
Please select the 'reboot' option.
0
 
LVL 38

Expert Comment

by:younghv
ID: 35096006
Also (and just because I am a paranoid), please download and run the two programs listed in my other post.

It will only take 5-10 minutes at the most, and will be great follow up for other malware that may be present.
0
 

Author Comment

by:stevedantonio
ID: 35096062
Thank you. I already have a registered version of malware.  But the ccleaner is not free. is that correct?
0
 
LVL 38

Expert Comment

by:younghv
ID: 35096299
Both are free - entirely - although there is a paid version of MalwareBytes you can buy.
If you already have "MalwareBytes" (not something similar) installed, please use the 'Update' function and fun a "Full Scan".
0
 
LVL 38

Expert Comment

by:younghv
ID: 35096309
LOL!
You can 'fun' a full scan if you like, but I prefer that you 'run' it.
0
 

Author Closing Comment

by:stevedantonio
ID: 35096344
Thank you
0

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Suggested Courses

608 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question