Source: malwaretips.com
run a scan with Farbar Recovery Scan Tool. You will need a USB (Flash) pendrive.
For x32 (x86) bit systems download Farbar Recovery Scan Tooland save it to a flash drive.
For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.
Plug the flashdrive into the infected PC.
Enter System Recovery Options.
To enter System Recovery Options from the Advanced Boot Options:
On the System Recovery Options menu you will get the following options:
Startup Repair
System Restore
Windows Complete PC Restore
Windows Memory Diagnostic Tool
Command Prompt
Now please download this file and save it to your Flash Drive.
fixlist.txt (Size: 1.9 KB / Downloads: 19)
Then, boot to system recovery, plug in your flash drive, open FRST and click fix. Post the generated log. Then attempt to boot to normal mode.
STEP 1: Run a HitmanPro scan
Add to your next reply, any log that HitmanPro might generate.
You should be able to run both scans while in Normal mode...
STEP 2: Run a scan with Malwarebytes Anti-Malware in Chamelon mode
Please add both logs in your next reply.
STEP 3: Run a scan with AdwCleaner
STEP 4: Run a scan with Junkware Removal Tool
Please download Junkware Removal Tool to your desktop from here
Download avenger.zip... © by Swandog46
Code:
Folders to delete:
C:\Users\john\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\AVASoft Professional Antivirus
C:\$Recycle.Bin\S-1-5-21-1952303879-2284333571-2840854797-1000\
Please post the contents of the avenger.txt log, in your next reply.
STEP 2: Run a scan with ESET Online Scanner
STEP 1: Run a scan with OTL by OldTimer
Settings You need to Select in OTL
Note: If OTL.exe will not run, it may be blocked by malware. Try these alternate versions: OTL.scr, or OTL.com.
STEP 1: Run the below OTL fix
Code:
:OTL
[2010/08/05 17:07:32 | 000,000,000 | ---D | M] (No name found) -- C:\Users\john\AppData\Roaming\mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}
[2010/08/05 17:15:39 | 000,000,000 | ---D | M] (No name found) -- C:\Users\john\AppData\Roaming\mozilla\Extensions\This email address is being protected from spambots. You need JavaScript enabled to view it.
[2011/10/09 17:05:15 | 000,627,675 | ---- | M] () (No name found) -- C:\Users\john\AppData\Roaming\mozilla\firefox\profiles\6tcizlt8.default\extensio ns\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi
:Files
C:\Users\john\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\AVASoft Professional Antivirus
C:\$Recycle.Bin\S-1-5-21-1952303879-2284333571-2840854797-1000\
:commands
[emptytemp]
[reboot]
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system
Double click on OTL to run it
Now that your PC is clean, I recommend you to create a new System Restore point then purge the old ones after.
For XP
How to create a Restore Point in XP
Delete all restore points except the most recent one
For Vista
Create a restore point
Delete all but the most recent restore point
For Windows 7
Create a restore point
Delete all but the most recent restore point - Click the Delete all but the most recent restore point link
Keep your system updated
I also recommend you to switch your antivirus program to a better one. Here are some suggestions:
In addition to your antivirus, you need additional protection such as a firewall and behavioural blocker.
Here are only a few suggestions that will improve your system security. Should you wish to allow us to make full recommendations and set your PC up with maximum security, please start a thread here. Our community of PC enthusiasts and experts will give you feedback and help you secure your system from future malware infections.
Internet Explorer may be the most popular browser but it's definitely not the most secure browser. Consider using other browsers with addition add-ons to safeguard your system while browsing the internet.
Firefox is a more secure, faster browser than Internet Explorer. Firefox contains less vulnerabilities, reducing the risk of drive-by downloads. In addition, you can add the following add-ons to increase security.
Google Chrome is another good browser that is faster and more secure than Internet Explorer by having a sandbox feature. Additionally, you can add the following add-on to Chrome to heighten security.
Lastly, it is important to perform system maintenance on a regular basis. Here are a few tools and on-demand scanners that you should keep & use every 1-2 weeks to keep your system healthy.
Other than that, stay safe out there! If you have any other questions or concerns, feel free to ask
What's next?
Source: malwaretips.com
This is a comprehensive guide to removing a lot of malware infections. Please perform all the steps in the correct order. If you have any question or doubt at any point STOP and ask us for our assistance in our Malware Removal Assistance forum.
STEP 1 : Start your computer in Safe Mode with Networking
STEP 2: Check your internet connection for proxy servers
This infection may add a proxy server which prevents the user from accessing the internet,follow the below instructions to remove the proxy.
For Firefox users, go to Tools > Options > Advanced tab > Network > Settings > Select No Proxy
STEP 3: Download and scan with Kaspersky TDSSKiller
Kaspersky TDSSKiller is a utility that was created in order to provide you with a simple means of disinfecting any system that suffers a rootkit infection.A rootkit is a program or a set of programs designed to obscure the fact that a system has been compromised.
Code:
iexplore.exe
WARNING: After you have rebooted your computer,please start again in 'Safe Mode with Networking' before proceeding to the next step.You can find details on how to start in 'Safe Mode with Networking' in Step 1.
STEP 4 : Download and scan with RKill to terminate known malware processes.
RKill is a program that attempts to terminate known malware processes so that your normal security software can then run and clean your computer of infections. When RKill runs it will kill malware processes and then import a Registry file that removes incorrect file associations and fixes policies that stop us from using certain tools.
As RKill only terminates a program's running process, and does not delete any files, after running it you should not reboot your computer as any malware processes that are configured to start automatically will just be started again.
RKill is a program that attempts to terminate known malware processes so that your normal security software can then run and clean your computer of infections. When RKill runs it will kill malware processes and then import a Registry file that removes incorrect file associations and fixes policies that stop us from using certain tools.
As RKill only terminates a program's running process, and does not delete any files, after running it you should not reboot your computer as any malware processes that are configured to start automatically will just be started again.
WARNING: Do not reboot your computer after running RKill as the malware process will start again , preventing you from properly performing the next step.
STEP 5: Download and scan with Malwarebytes Anti-Malware
STEP 6: Download and scan with Emsisoft Emergency Kit
As an addition step it's recommended that you download other free anti-malware software from the list below and run a full system scan :
Removing the residual damage from ZeroAccess rookit
STEP 3 : Check yourDNS settings
Check Windows 7 DNS
Check Windows Vista DNS
Check Windows XP DNS
STEP 4 : Check your Windows HOSTS file
The hosts file is one of several system facilities to assist in addressing network nodes in a computer network. It is a common part in an operating system's Internet Protocol (IP) implementation, and serves the function of translating human-friendly hostnames into numeric protocol addresses, called IP addresses, that identify and locate a host in an IP network.
Because of its role in local name resolution, the hosts file represents an attack vector for malicious software. The file may be hijacked, for example, by adware, computer viruses, trojan horse software, and may be modified to redirect traffic from the intended destination to sites hosting content that may be offensive or intrusive to the user or the user’s computer system.
Code:
# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
127.0.0.1 localhost
Default Host file Windows Vista
Code:
# Copyright (c) 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
127.0.0.1 localhost
::1 localhost
Default Host file for Windows 7
Code:
# Copyright (c) 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
# localhost name resolution is handle within DNS itself.
# 127.0.0.1 localhost
# ::1 localhost
You can find more details on how to reset your host file at Microsoft Support Center.
STEP 3 : Remove the residual damage
If you still are experiencing residual damage after removing this infection, you can download and use the Windows Repair tool from tweaking.com to fix the problems.
Windows Repair is an all-in-one repair tool to help fix a large majority of known Windows problems including registry errors and file permissions as well as issues with Internet Explorer, Windows Update, Windows Firewall and more. Malware and installed programs can modify your default settings. With Tweaking.com - Windows Repair you can restore Windows original settings.
Use the bellow button to download Windows Repair (All In One) :
If you are still experiencing problems on your machine, please start a new thread here.