I am sorry about the delay in my reply.
i was on 2 weddings (2 of my friends had married this weekend) and I was unable to reply sooner.
I did indeed forgot the first fix log.
Unfortunately, while running this new fix, chrome closed down and I lost my copied text of the fixlog. I did think everything was OK (as in succesfully moved), if I remember correctly.
Ok, this is not a problem. It seems that all went fine.
As for the defragging, I do indeed have a SSD, so that won't be an option.
That's ok. Unfortunately Windows 7 Disk Defragmenter is not recommended for SSD disks and should be disabled indeed. Windows 8.1 Disk Defragmenter send TRIM commands when an SSD disk is detected when running in AHCI mode so it can be left alone there. In your case you can use the software provided by the disk manufacturer to send Trim commands from time to time.
After the fix yesterday, I did experience some small 'stuttering' of my programs once I restarted my PC.
They went away after about 5 minutes though and I haven't experienced the problem since. Might've been something else that I didn't notice (maybe a scanner in the background).
It was probably just a coincidence unrelated to the fix above.
I've just been called up by work for an assignment abroad (for about a month), leaving today.
Thus I won't be able to follow this thread any more (I can still read any posts when I get home).
Seems you helped me get rid of the problem and some extra malware in the process, which helped me immensely.
No problems. Since we are done here I am ready to give you my final recommendations.
Thank you for following my instructions perfectly!
Now that we are at the end of our journey I have some final words for you.
All Clean !
Your machine appears to be clean, please take the time to read below on how to secure the machine and take the necessary steps to keep it Clean.
STEP 1 - CLEANUP
Here are a few additional steps on how to remove all of the tools we used as promised:
Download the following file => and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.
Run FRST/FRST64 and press the Fix button just once and wait.
It's no needed to post the log this time.
- Next please download Delfix.exe by Xplode and save it to your desktop.
- Please start it and check the box next to "Remove disinfection tools" and uncheck the rest and click on the run button.
- The tool will delete itself once it finishes.
Note: If any tool, file, log file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.
STEP 2 - SECURITY ADVICES
Change all your passwords !
Since your computer was infected for peace of mind, I would however advise you that all (or as much possible) your passwords be changed including those for bank accounts, credit cards and home loans, PIN codes etc) just in case.
Many of the modern malware samples have backdoor abilities and can steal confidential information from the compromised computer. Also you should check for any suspicious transactions if such occur. If you find out that you have been victim to fraud contact your bank or the appropriate institution for assistance.
Use different passwords for all your accounts. Also don't use easy passwords such as your favorite teams, bands or pets because this will allow people to guess your password.
You can use Password Generator - Norton Identity Safe to create random passwords and then install an application like KeePass Password Safe or LastPass to store them for easy access. If you do Online Banikng please read this article: Online Banking Protection Against Identity Theft
If you're storing passwords in the browser to access websites than they are non encrypted well. Only if you use Firefox with master password protection, this provide better security. You can add Secure Login to prevent Java and other exploits when log-in.
Keep your antivirus software turned on and up-to-date
- New viruses come out every minute, so it is essential that you have the latest signatures for your antivirus program to provide you with the best possible protection from malicious software.
- Note: You should only have one antivirus installed at a time. Having more than one antivirus program installed at once is likely to cause conflicts and may well decrease your overall protection as well as impairing the performance of your PC.
- Note: You should scan your computer with an antimalware program like Malwarebytes' Anti-Malware on a regular basis just as you would an antivirus software.
- Be sure to check for and download any definition updates prior to performing a scan.
- Also keep in mind that MBAM is not a replacement for antivirus software, it is meant to complement the protection provided by a full antivirus product and is designed to detect the threats that are missed by most antivirus software.
Visit Microsoft's Windows Update Site Frequently
- It is important that you visit Windows Update regularly.
- This will ensure your computer has always the latest security updates available installed on your computer.
- If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.
- It is possible for other programs on your computer to have security vulnerability that can allow malware to infect you.
- Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities.
- You can check these by visiting Personal Software Inspector or you can use the following application for this purpose PatchMyPC
Be prepared for CryptoLocker and similar threats:
Check the article below for more information:
The ascension of Crypto-Ransomware and what you need to know to protect yourself
Since the prevention is better than cure you can use CryptoPrevent (described in the link above) to secure the PC against these lockers. Keep in mind that if you choose high protection level in CryptoPrevent then you can encounter some problems with the installed applications. You may need to lower the protection level if you encounter such problems or to add the entries to the whitelist:
I would not recommend you to use the latest option which is still in BETA. Many programs will not work when the Maximum Protection + Program Filtering (BETA) setting is activated...
Also you may need to disable the protection sometimes before you can install new software or apply updates and when you are done then you need to re-apply the protection. It can be very annoying, but still better than losing all of the documents because of Cryptolocker and his variants.
Also a new tool was created to help prevention of ransomware called CryptoMonitor. You can take a look at it if you want.
Comodo Firewall/Internet Security can protect the data if you add all local disks to Protected Files and Folders but if you decide to use it then keep in mind to uninstall Microsoft Security Essentials first!
Panda have an option (similar to this offered by Comodo) called Data Shield which can help you to protect your data against ransomware.
What is the Data Shield protection of Panda 2015? but if you choose to stick to Panda then you should uninstall Microsoft Security Essentials first and also keep in mind that the software is shareware.
However using such programs on business computers can be very difficult since the users will receive a lot of pop-ups with questions and probably will be impossible for them to work in a efficient way...
You may want to check Malwarebytes Anti-Exploit and add install it to be safe when surfing the net. It work with the most popular browsers and it is very effective. See the article here.
There are other programs worth checking like Sandboxie, HitmanPro.Alert, SecureAplus (offer ClamWin - be sure to uncheck it during install if you have another AV installed), VoodooShield (similar to SecureAplus but does not offer ClamWin antivirus), Emet, Toolwiz Time Freeze, KeyScrambler Personal etc, but they are too complicated for the average user. However, you can take a look at them if have the time to learn how to use them.
Keep in mind to choose carefully in order to avoid conflicts or instability caused by incompatible security programs.
Also having more than one "real-time" program can be a drain on your PC's efficiency so please refrain doing so.
Practice Safe Internet
One of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will. Below are a list of simple precautions to take to keep your computer clean and running securely:
- If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that. Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
- .zip, .exe, .com, .bat, .pif, .scr, .cmd, .cab or .vbs do not open the attachment unless you know for a fact that it is clean. For the casual computer user, you will almost never receive a valid attachment of this type.
- If you receive an attachment from someone you know, and it looks suspicious, then it probably is. The email could be from someone you know infected with a malware that is trying to infect everyone in their address book.
- If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of popups, or Foistware, you should read this article:
Foistware, And how to avoid it. There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams. For a list of these types of programs we recommend you visit this link: About Malwares, Rogues, Scarewares, SmitfraudFix
- Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you. We suggest that you close these windows by clicking on the X instead of the OK button. Alternatively, you can check to see if it's a real alert by right-clicking on the window. If there is a menu that comes up saying Add to Favorites... you know it's a fake.
- Do not go to adult sites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do.
- When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link, message back to the person asking if it is legit before you click on it.
- Stay away from Warez and Crack sites! In addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections. Avoid using cracks and unknown programs from sources you don't trust. There are MANY alternative open-source applications. Malware writers just love cracks and keygens, and will often attach malicious code into them. By using cracks and/or keygens, you are asking for problems. So my advice is - stay away from them!
- Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download a piece of software a from a site, and are not sure if they are legitimate, you can use Bitdefender TrafficLight or Avira Browser Safety to look up info on the site. Note: skip this advice if your antivirus have a Web Guard.
- DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.
- You may want to install unchecky to prevent adware bundled into many free programs to install. Please keep in mind that this program is a beta version of a product and not completely tested to ensure its stability or reliability.
Tweak your browsers
To prevent further infections be sure to install the following add-ons AdBlock Plus
Adblock Plus hides all those annoying (and potentially dangerous) advertisements on websites that try and tempt you to buy or download something. AdBlock not only speeds up your browsing and makes it easier on your eyes, but also makes it safer.
Adblock Plus can be found here.
Do not add to many filters subscriptions because it will slow down your browser startup time. Also keep in mind to uncheck the box beside "Allow some non-intrusive advertising" as well.
You can take a look at NoScript as well but NoScript is only for advanced users as it blocks all the interactive parts of a webpage, such as login options. Obviously you wouldn’t want to block your ability to log on to your internet banking or your webmail, but thankfully you can tell NoScript to allow certain websites and block others. This is very useful to ensure that the website you’re visiting is not trying to tempt you to interact with another, more dangerous website.
You can download it from here
You can find the optimal settings here
A tutorial on how to use it can be found here
Ad-Muncher is now free so you can give it a try as well.
If you like Google Chrome there are many similar extensions for this browser as well. Since I am not a Google Chrome user I can't tell you which of them are good and how they work. You should find out by yourself.
However Google Chrome can block a lot of unknown malware because of his sandbox.Beware of the fact that Google Chrome doesn't provide master password protection for your saved in the browser passwords. Check this out: Google Chrome security flaw offers unrestricted password access
For Internet Explorer read the article below:
Security and privacy features in Internet Explorer
Also you can change your DNS settings with these 184.108.40.206 and 220.127.116.11 to use Comodo Secure DNS for free (to prevent phishing attacks). Sometime the DNS servers may be overloaded by the traffic coming from other networks and then you can lose your internet connection. In that case you can switch back to your ISP DNS again.
Make the extensions for known file types visible:
Be wary of files with a double extension such as image.jpg.exe. As a default setting, Windows often hides common file extensions, meaning that a program like image.jpg.exe will appear to you as simply image.jpg. Double extensions exploit this by hiding the second, dangerous extension and reassuring you with the first one.Check this out - Show or hide file name extensions.
Disable Autorun and Windows Scripting Host:
It's a good idea to disable the Autorun functionality to prevent spreading of the infections from USB flash drives.
Check the article here for more information.
If you don't use any script files then you can go ahead and disable Windows Scripting Host using the tool provided by Symantec - NoScript.exe. Simple download and run it and click on the Disable button and reboot the computer. If you need to run any js. or vbs scripts at a later stage you should run NoScript again and select Enable, then reboot the computer.
Create an image of your system (you can use the built-in Windows software as well if you prefer)
- Now when your pc is malware free it is a good idea to do a backup of all important files just in case something happens it.
- Macrium Reflect is very good choice that enables you to create an image of your system drive which can be restored in case of problems.
- The download link is here.
- The tutorial on how to create an system image can be found here.
- The tutorial on how to restore an system image can be found here.
- Be sure to read the tutorial first.
Follow this list and your potential for being infected again will reduce dramatically.
Safe Surfing !