Looks good then. Please purge a system restore point now.Create a New System Restore Point<- Very Important
Now you should Create a New Restore Point to prevent possible reinfection from an old one
. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back
" to a clean working state. The easiest and safest way to do this is
- Go to Start > Programs > Accessories > System Tools and click "System Restore".
- Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
- Then use Disk Cleanup to remove all but the most recently created Restore Point.
- Go to Start > Run and type: Cleanmgr
- Click "Ok"
- Disk Cleanup will scan your files for several minutes, then open.
- Click the "More Options" Tab.
- Click the "Clean up" button under System Restore.
- Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
- Click Yes, then click Ok.
- Click Yes again when prompted with "Are you sure you want to perform these actions?"
- Disk Cleanup will remove the files and close automatically.
Vista Users can refer to these links: Create a New Restore Point
and Disk Cleanup
Preventing Infections in the Future
Please also have a look at the following links, giving some advice and Tips to protect yourself against malware and reduce the potential for re-infection:
Disable Autorun on Flash-Drive/Removable DrivesWhen is AUTORUN.INF really an AUTORUN.INF?
- Avoid gaming sites, underground web pages, pirated software sites, and peer-to-peer (P2P) file sharing programs. They are a security risk which can make your computer susceptible to a smörgåsbord of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites. Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and Flash ads that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users.
Keeping Autorun enabled
USB worms work by creating a file called AUTORUN.INF on the root of USB drives. These INF files then use Autorun or Autoplay (not the same thing!) to execute themselves either when the stick is inserted, or more commonly, when the user double-clicks on the USB drive icon from My Computer (Windows Explorer)...
on USB and other removable drives has become a significant security risk
due to the increasing number of malware variants that can infect them and transfer the infection to your computer. Read USB-Based Malware Attacks
and Please disable Autorun asap!
If using Windows Vista, please refer to:
"Disable AutoPlay in Windows Vista
"Preventing AutoPlay with Local Group Policy Editor or AutoPlay options panel
"Note: When Autorun is disabled, double-clicking a drive which has autorun.inf in its root directory may still activate Autorun so be careful.Vist the WindowsUpdate Site Regularly
I recommend you regularly visit the Windows Update Site
Update Non-Microsoft Programs
- Lots of Hacking/Trojans use the methods found (plugged by the updates) that have not been stopped by people not updating.
- Update ALL Critical updates and any other Windows updates for services/programs that you use.
- If you wish to turn on automatic updates then you will find here is a nice little article about turning on automatic updates.
- Note that it will download them for you, but you still have to actually click install.
It is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector
and Calendar of Updates.Update all programs regularly
- Make sure you update all the programs you have installed regularly. Without regular updates you WILL NOT
be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically. Finally
, and definitely the MOST IMPORTANT
step, click on the following tutorial and follow each step listed there:
Simple and easy ways to keep your computer safe and secure on the Internet
Glad I was able to help and thank you for choosing Bleeping Computer as you malware removal source.
Don't forget to tell your friends about us and Good luck With Regards,