Hi Vivid_Please take note of the following
1. Please do not run any other tools unless instructed.
2. Please don't install or uninstall anything unless asked.
3. The cleaning process is not instant. Please continue to review my answers until I tell you that your computer is clean.
4. If there's anything that you don't understand, please ask your question(s) before proceeding with the fixes.
5. Please reply to this thread. Do not start a new topic.
6. Please follow steps in the correct order.P2P Warning
Please note that as long as you're using any form of Peer-to-Peer networking ( Frostwire, Bearshare, Bit Torrent etc.) and downloading files from non-documented sources, you can expect infestations of malware to occur.
P2P programmes form a direct conduit onto your computer, their security measures are easily circumvented, and Malware writers are increasingly exploiting them to spread their wares onto your computer. Further to that, if your P2P programme is not configured correctly you may be sharing more files than you realise. There have been cases where people's Passwords, Address Books and other personal, private, and financial details have been exposed to the file sharing network by a badly configured programme.
Many of the programmes come bundled with other unwanted programmes, but even the ones free of any bundled software are not safe to use.
When you use them you are downloading software from an unknown source directly onto your computer, bypassing your Firewall and Anti-Virus software. Hardly surprising then that many of these Downloads are being targeted to carry infections.
You may decide to continue P2P sharing, but keep in mind that this practice may be the source of future malware infestation.
If we clean your computer of infection, and you return to us a short time later with an infection contracted by the use of P2P programmes, we may refuse to help you.
If you do decide (unwisely) to keep these programs, please refrain from using them until we have finished cleaning your system.MsConfig Overuse
Many people frequently use MSconfig as a long term solution to control startup processes and services.
You will also see many websites condoning use of MSconfig and teaching you how to use it for controlling startups.
This is a very bad idea for many reasons.
- MSconfig was designed to be used only as a temporary debugging/troubleshooting tool.
It was not meant to be used for long term solutions.
- MSconfig does not show all startups anyway.
- If you uninstall programs while they are being disabled with MSconfig, they will not be uninstall properly and you will have to resort to manual registry editing to properly get everything removed.
MSconfig will leave orphan entries if/when installed software is uninstalled while under the control of MSconfig .
When/if MSconfig is turned back to normal startup, it will give errors on boot due to those orphan entries.
- When you uncheck a service in msconfig, you completely disable it.
If you uncheck the wrong one, you may not be able to restart your computer.
- You can lock malware items into your registry that you may not see anymore until some point in time where you switch back to Normal Startup mode and now you can cause total reinfection of your PC with the malware
Please uninstall Quicktime for Windows.
It is now a security risk:
Apple is deprecating QuickTime for Microsoft Windows.
They will no longer be issuing security updates for the product on the Windows Platform and as such they recommend users uninstall it.
And because Apple is no longer providing security updates for QuickTime on Windows, the present vulnerabilities are never going to be patched.Ashampoo WinOptimizer
We do not recommend the use of 'Optimizers' or 'Registry Cleaners' they have been know to cause more problems than they cure.
I recommend you uninstall this programStep 2
Please download the attached fixlist.txt
file (bottom of this post) and save it to C:\Users\Francis\Downloads.NOTE.
It's important that both files, FRST
are in the same location or the fix will not work.NOTICE: This script was written specifically for this user, for use on that particular machine.
Running this on another machine may cause damage to your operating system
(which ever is installed ) and press the Fix
button just once and wait.
The tool will make a log in the Download folder (Fixlog.txt). Please post this in your next reply.Step 3
Please download RogueKiller Anti-malware (Free)
onto your desktop.
- Close all open programs and internet browsers.
- Double click on RogueKiller Anti-malware to install the tool.
Vista/Windows 7/8/10 users right-click and select Run As Administrator.
- Select Accept the User Agreement then continue to click Next then finally click Install
- Click Finish
- When the program opens..... click Scan
- Click Start Scan
- Double check anything found and tick to select items to be removed
- Click Remove Selected
- When the items have been removed.... Click Open Report >> Open TXT.
- Copy and paste that report into your next reply.
In your next reply, please submit: