Skip to main content

Whaddya Know How to remove Browser Hijacker?

Do you have one of this issue when you browse the Internet using your default MS Internet Explorer?
  • When you open your Internet Browser, you receive persistent website asking you to install an Anti-Virus program from unknown antivirus company.

  • When you open your Internet Browser, website's start popping up.

  • When you surf the Internet, your workstation start showing relevant ads.

  • You can't change your default home page.

If yes, you're Internet access was hijacked. So how do you fix it, that's your next question?

If you are not familiar on how to fix this issue, it is highly recommended to seek professional IT help. You can check with your local Best Buy or Circuit City for technical support, even better check with your local community.

Here's my personal solution to fix "hijacked browser". I will try to make it easy for you to follow.

  1. First download "Hijack This" tool courtesy by Trend Micro. You can download this from CNet Download (http://www.download.com/) website.
  2. When you're in download website, in search form type "hijack this" (without quote) and hit [Enter] key or the magnifying glass to begin the search. It will shows other program related to Micro Trend "hijack this" tool. As of this date, the latest version is Trend Micro Hijack This 2.0.0 for Windows. Click on download now.
  3. Save this program to your temp folder e.g. c:\temp\
  4. Open your Windows Explorer, go to c:\temp\ and double click on HJTInstall program.
  5. Click on Run to start the installation.
  6. It will ask you for the installation path, just accept the default c:\Program Files\Trend Micro\HijackThis and click on Install to continue.
  7. Accept the User License Agreement, click on I Accept.
  8. After the installation, the system will display Welcome to HijackThis program.

You're ready to begin removing spyware to your workstation. WARNING: Sorry, I have to warn you. This tool directly can delete files to your registry and might damage your workstation, be careful.

Click the Do a system scan and save a logfile, it will show you bunch of programs running on your workstation. Before you do anything here, check the latest installation of programs in your c:\program files\ directory. Sort them by install date, you will see the latest programs added to your computer. Go to the subdirectory and see what .exe file available and compare this to the logfile you have from running the Hijack This tool.

I'm using an example of malicious (spyware) program listed below:

  • C:\Program Files\MSX ; which has msx.exe file
  • C:\Program Files\Applications ; found wcs.exe, wcm.exe, iebtm.exe and iebtmm.exe files.

In Hijack This tool, I found them listed as one of the 04 - HKLM\..., I put check on them and click on "Fix checked". The tool will remove this to your computer.

Completely the program in folder. Open your Windows Explorer, go to C:\Program Files\ folder and delete the offending subfolders.

Restart your computer, and check your Internet Explorer to see if your surfing experience is back to normal. Good luck to you and don't forget to us know (Email EM @KING.NET) if this procedure help out.

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp