You probably agreed to have it installed while downloading some "freeware" like screensavers or something like Bonzai Buddy.
READ ALL EULAS before you select the "I AGREE" button.
Use the following to scan and protect your computer:Anti-malware freeware
(You can run as many of these as you wish. Generally there is no conflict between these and you should always run several)
Ad-Aware SE Personal is a free version and it can be downloaded from our Mirror Sites in the Download section at Lavasoft website. However, please note that while the free Ad-Aware SE naturally helps you remove all spyware, it does not provide real-time memory scanning; this capability comes with the paid versions.http://www.lavasoft.com/
Spybot S&D: http://www.safer-networking.org/en/index.htmlBe sure to enable “Teatimer” which gives you realtime protection.
Did you have Teatimer enabled?
Microsoft Windows Defender http://www.microsoft.com/athome/security/s...re/default.mspx
This also provides realtime protection.
Microsoft Malicious Software Removal Tool (Win XP and Win 2000):http://www.microsoft.com/security/malwareremove/default.mspx
A˛ - Free from http://www.majorgeeks.com/download4281.html
. Run it, click Search for Updates, then click Scan.
Run the following web based scans using IE.Web based online Antivirus and anti-malware scans:
(these can be run regardless of whatever else you are using. You must use Internet Explorer to run these.)
Kaspersky Anti-Virus Web Scannerhttp://www.kaspersky.com/service?chapter=161739400#betatest
Panda Activescan http://www.pandasoftware.com/activescan/co...n_principal.htm
Trend Micro antivirus and malware scan:http://housecall-beta.trendmicro.com/en/st...orp.asp?id=scan
Etrust Anti-virus web scannerhttp://www3.ca.com/securityadvisor/virusinfo/scan.aspx
online trojan scans here - http://scan.sygatetech.com/pretrojanscan.html
Windows Security Trojanscanhttp://windowsecurity.com/trojanscan
See instructions for it here:http://www.windowsecurity.com/trojanscan/trojanscan.asp
After you do that follow the directions in the following and post a HJT log in the HJT Forum:
Read the pinned post in our “HijackThis” forum, herehttp://www.bleepingcomputer.com/forums/t/34773/preparation-guide-for-use-before-using-malware-removal-tools-and-requesting-help/ Carefully read and follow all directions explicitly.
Following instructions run a log, and post it in following HJT forum, at this linkhttp://www.bleepingcomputer.com/forums/posthjtlog.htmlDo not as yet attempt to fix anything by yourself using Hijack This as even what may seem to be a small mistake can render your op system inoperable.
Some files when in one folder may be fine while in another may be malware.
A member of our HJT Team will analyze your log, make recommendations and offer assistance.
It may take a period of time to get a response to the log you posted because the members of our HJT Team are kept very busy. Please
be patient as this team is manned by volunteers. They will help you as soon as possible.NOTE
Once you have posted your HJT log, please DO NOT make any additional posts in the HJT forum thread you created until you get a response from a member of our HJT expert team.
The first criteria they have when looking for logs that need replies are posts showing 0 replies
. If you make an additional post, it will show as having 1 reply
A team member, looking to see if a reply has been made might well assume another HJT Team member is already assisting you and might not open the thread to respond.
So, make your post and wait for a response from a team member.