Support Forums

Full Version: Check Up :)
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Okay so I recently reformatted my computer. I ran a Check Up Procedure and here are the results:

1.My SAS log: http://pastebin.com/rGkqc1De

2.My MBAM log: http://pastebin.com/PUwnA4fQ

3.My ESET log: I had problems with this, I PMed you regarding this Quintus.

4.My HJT log: http://pastebin.com/eXGRecda

5.My DDS log:
Attach: http://pastebin.com/us5tDqSx
DDS: http://pastebin.com/XPuKb9XW
Everything is clean, except your old backup which contained inactive malware.
  • Pre-Step

    Click 'here' to download Temp File Cleaner by OldTimer. Save it to your Desktop.
    • Close any open windows.
    • Double-click TFC.exe and select 'Run' when prompted to execute the program. It will close all open programs itself in order to run.
    • Click the Start button to begin the cleaning process.
    • Please let the program run uninterruptedly.
    • Once the cleaning has been done, your computer should automatically reboot. Otherwise, please do so when it does not.
  • Step 1

    System Restore maintains a backup of your programs however it may also backup infections therefore constant flushing is required to create a clean Restore Point.

    1. On the Start Menu, right-click Computer > Properties > System Protection.
    2. Click Configure.
    3. Click Delete > Continue > OK.
    4. You are now back at the System Protection Tab.
    5. Click Create > <Any Title Here> > Create.
    6. A prompt should tell you that it was successful. Click Close.
    7. Click OK.
    8. System Restore will be working again and will have a new Restore Point.
  • Comments:
    • Would you want to install an Anti-Virus this time?
Okay I did that.
And yes, I'd like to install an Anti-Virus.
  • Step 2

    "An antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and Trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware."

    I noticed that you do not have an anti-virus installed in your system presently. Do understand that you are making yourself defenseless against malware. Though it is plausible that caution can somehow prevent infection, it is still advisable to install an anti-virus. An anti-virus and a firewall are crucial to your system's security. Without both, reinfection is imminent after a clean. Here are lists of well-known and proven softwares.
  • Free Anti-Viruses
    • A-Squared Free
      • Emsisoft's A-Squared boasts two scanners: Anti-Spyware + Anti-Virus. It has topped the detection test performed by the Malware Research Group in June 2009. In addition, considerable performance improvement is possible thanks to the integration of the two engines on the lowest level.
    • Avast! Free
      • Avast! Free anti-virus is perfect for people who send e-mails and surf popular websites. It has a state of the art scanning engine provides reliable protection against viruses, spyware and other forms of malicious software.
    • Avira AntiVir - Personal Edition
      • Avira AntiVir protects your computer against dangerous viruses, worms, Trojans and costly dialers. It is known to have the highest detection presently and it is from a reputable company.
    • BitDefender Free Edition
      • BitDefender Free Edition uses the same ICSA Labs certified scanning engines found in other BitDefender products, allowing you to enjoy basic virus protection for no cost at all.
    • PC Tools AntiVirus Free
      • PC Tools AntiVirus Free provides basic protection against known viruses, worms and Trojans. You are protected against basic cyber threats attempting to gain access to your PC.
  • Paid Anti-Viruses
    • Avast! Pro Antivirus
      • Avast! Pro Antivirus is a full-featured antivirus software. Better than their free anti-virus, especially for web surfing, but without the firewall and anti-spam included in Avast! Internet Security. Also if you wish to customize your security, this is the recommended software.
    • Avira AntiVir Premium
      • Avira AntiVir Premium contains all the things its free version has plus real-time on-access scanning, profile-based on-demand scans and scheduling of full system scanning and updates, it offers premium protection.
    • ESET NOD32 Antivirus
      • ESET NOD32 Antivirus 4 sports the fastest, most effective technology available to protect you from viruses and spyware without slowing you down while you work or play.
    • Kaspersky Anti-Virus
      • Kaspersky Anti-Virus 2010 – the backbone of your PC’s security system - offers protection from a range of IT threats and provides the basic tools needed to protect your PC.
From the list above, choose one, click on the name of the program that suites you best, download it and proceed to the installation. You can either choose the free version or purchase a full version. Regardless, having one is truly an aid to your computer's defense capability. If you are having a hard time choosing, consider looking at 'AV-Comparatives: Anti-Virus Comparative February 2010'. If you'd rather let me pick one for you, please allow me to do so by telling me your Internet usage, computer specifications such as your Operating System, Service Pack version and other relevant details.
Okay I just downloaded Avira AntiVir - Personal Edition.
I see no infections present in your log anymore. If you are not having any further problems, I declare you ALL CLEAN.

Required Clean-Ups



★ CleanUp! With OT Move It (OTM) by Old Timer ★

This will remove all temporary files stored in your computer and as well as the files generated by the specialised tools I instructed you to use.
  • For Windows Vista and Windows 7:
    • Download OT Move It (OTM) by Old Timer 'here' and save it to your Desktop. Please click the Go (Arrow Button) or press Enter in the URL address bar to start the download.
    • Please double-click OTM to run it.
    • No programs other than OTM should be running; we will perform a reboot after.
    • On the interface, click the Cleanup! button.
    • Select Yes after the prompt and wait for the reboot.
★ Make Internet Explorer Less Vulnerable ★

I ask that you do not disregard this step whether you are using Internet Explorer or not as your main browser. Please be advised that though you don't seem to be using this, I can assure you that most of your everyday applications uses this browser's technology to update thereby solidifying the necessity to update it. Do not leave a single component of your system vulnerable.
    • At Internet Explorer's interface navigate to Tools > Internet Options.
    • Click once on the Security > Internet > Custom Level buttons.
    • Change the following to the designated modifications.
      • ActiveX Controls and Plug-Ins
        • Download Signed ActiveX Controls > Prompt
        • Download Unsigned ActiveX Controls > Disable
        • Initialise And Script ActiveX Controls Not Marked As Safe > Disable
      • Miscellaneous
        • Installation Of Desktop Items > Prompt
        • Launching Programs And Files In An iFrame > Prompt
        • Navigate Sub-frames Across Different Domains > Prompt
    • When all these settings have been made, click on the OK button.
    • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    • Next press the Apply button and then the OK to exit the Internet Properties page.
★ Set A Clean System Restore Point ★

This is done to prevent possible reinfection. Your System Restore Points need to be constantly flushed the reason being the infections residing in your system once could have been, more or less, saved in one of your Restore Points. System Restore is a protected directory; your tools can not access it to delete these files. Re-infection is imminent if this is left unattended. Now, after successfully cleaning your system, creating a clean Restore Point is essential in case you will ever need a clean backup.
  • For Windows 7
    1. On the Start Menu, right-click Computer > Properties > System Protection link.
    2. Click Configure.
    3. Click Delete > Continue > OK.
    4. You are now back at the System Protection Tab.
    5. Click Create > <Any Title Here> > Create.
    6. A prompt should tell you that it was successful. Click Close.
    7. Click OK.
    8. System Restore will be working again and will have a new Restore Point.

A Quick Summary To Prevent Reinfection


1. Install an anti-virus and keep it updated. Run complete system scans.

"An antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and Trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware".

You have to make sure you have an anti-virus installed. Update your anti-virus everyday to make sure it has the latest signatures. Yes, updating is essential in maintaining your computer. The latest updates will ensure the integrity of your chosen program. Some paid anti-viruses even offer hourly updates and the reason for this is clear - malware gets advanced and new variants are detected in a short span of time. In addition to updating, perform a complete scan weekly. You might think you don't need it however you do. Don't rely on your instincts that your system is clean.


2. Install and maintain a good firewall.

"A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices which is configured to permit or deny computer applications based upon a set of rules and other criteria."

Make sure you have a firewall installed. A firewall helps monitor connections both inward and outbound. If you have not installed a firewall yet, please be advised that the pre-installed firewall that you have is not much of a protection against attacks. A firewall helps monitor connections both inward and outbound therefore having a specialised firewall is essential.


3. Update Java Runtime Environment.

"The Java Runtime Environment (JRE), also known as Java Runtime, is part of the Java Development Kit (JDK), a set of programming tools for developing Java applications. The Java Runtime Environment provides the minimum requirements for executing a Java application; it consists of the Java Virtual Machine (JVM), core classes, and supporting files. "

You must make sure your Java is up to date. Older versions have vulnerabilities that can be exploited. Follow the steps below to update Java.

For Vista and Windows 7:
    • To get the latest version of Java please go 'here'.
    • Go to 'Start' > 'Control Panel' > 'Programs and Features' or 'Uninstall a Program'.
    • Search in the list for all previous installed versions of Java. You currently have:
      • Java™ 6 Update *
      • Java™ SE Development Kit 6 Update *
    • Choose 'Uninstall'.
    • Now install the version(s) you downloaded earlier.

4. Clear Temporary files.
  • Click 'here' to download ATF-Cleaner by Atribune. Save it to your Desktop.
    • Double-click ATF-Cleaner.exe and select 'Run' when prompted to execute the program.
    • Under the 'Main' tab, please check the 'Select All' box.
    • Press the 'Empty Selected' button.
      • If you are using Firefox as your browser:
        • Click the 'Firefox' tab at the top and check the 'Select All' box.
        • Press the 'Empty Selected' button.
        • Note: If you wish to keep your saved passwords, click 'No' at the next prompt.
      • If you are using Opera as your browser:
        • Click the 'Opera' tab at the top and check the 'Select All' box.
        • Press the 'Empty Selected' button.
        • Note: If you wish to keep your saved passwords, click 'No' at the next prompt.
    • Click 'Exit' on the 'Main' tab to close the program.

5. Keep your computer updated.

You may currently have an outdated Windows Operating System. It is highly recommended you install the latest updates as these are extremely important which contain fixes for several bugs and security issues that attackers exploit. Always make sure that you are protected on all sides. Microsoft offers these updates free of charge. I present to you the option to perform the update.
    • Running Windows Update
      • Go to the 'Official Microsoft Windows Update' site using the latest version of Internet Explorer.
        1. On the Tools menu in Internet Explorer, click Internet Options.
        2. Click the Security tab.
        3. Click the Trusted Sites icon, and then click Sites....
        4. Uncheck the Require Server Verification checkbox.
        5. Make sure the following URLs are listed in the Web Sites list box:
          Code:
          http://*.windowsupdate.microsoft.com
          http://*.windowsupdate.com
        • A pop-up will automatically open.
        • If the pop-up failed to open, click the Start button, click All Programs, and then click Windows Update.
        • Install the Important Updates and reboot as required.
6. Prevention is better than any cure.

Constant vigilance is your number one tool. Aside from keeping in mind safe surfing habits, specific tools are there to further enhance your security. The good thing is that they are free, reliable and low on system resources. Even having them running together won't slow down your system. To download, simply click on the name of each software.

CCleaner

CCleaner is a freeware system optimization, privacy and cleaning tool. CCleaner is the number-one tool for cleaning your Windows PC. It protects your privacy online and makes your computer faster and more secure. Easy to use and a small, fast download.
  • Run CCleaner regularly, suggestively after you are done browsing or using your system for the day as it cleans temporary files such as cookies that may prove harmful.
    • Open CCleaner.
      • On the CCleaner tab, select Analyze and wait for the analysation.
        • Click on the Run Cleaner button.
      • On the Registry tab, select Scan For Issues and wait until it finishes.
        • Select Fix Selected Issues > No > Fix All Selected Issues > Close.
MVPS Hosts

MVPS Hosts helps to protect your Privacy and Security by blocking sites that may track your viewing habits. In many cases using a well designed HOSTS file can speed the loading of web pages by not having to wait for these ads, annoying banners, hit counters, etc. to load. This also helps to protect your Privacy and Security by blocking sites that may track your viewing habits, also known as "click-thru tracking" or Data Miners. Simply using a HOSTS file is not a cure-all against all the dangers on the Internet, but it does provide another very effective "Layer of Protection".
  • Make sure to check the MVPS Hosts 'site' for updates monthly.
SpywareBlaster

Spywareblaster prevents the installation of ActiveX-based spyware and other potentially unwanted programs. SpywareBlaster can help keep your system secure, without interfering with the "good side" of the web. And unlike other programs, SpywareBlaster does not have to remain running in the background. It works alongside the programs you have to help secure your system.
  • Update SpywareBlaster everyday as it adds a list of restricted sites and cookies.
    • Open SpywareBlaster.
    • Click Updates > Check For Updates.
    • If updates are available, refresh the entries by going to Protection Status > Enable All Protection.
WinPatrol

WinPatrol's Host-based Intrusion Prevention System (HIPS) takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge. WinPatrol was the pioneer in using a heuristic behavioral approach to detecting attacks and violations of your computing environment. It continues to be the most powerful system monitor for its small memory footprint.
  • Watch for WinPatrol alerts. It will monitor any unwanted changes to your system, such as startup programs and Active X additions.
7. Ask questions.
  • If you have any other questions, please post them on this thread.
Thank you,
Quintus
Thanks for your help Quintus. Smile
Much appreciated.