Vista, Win 7, Win 8 and Win 10 Malware Removal/Cleaning ProcedureNotes: Some programs (like MGtools mentioned later and maybe other tools too) may not run on restricted user accounts so you may need to temporarily change the user account to an admin type account and then complete the scans. If you are a Spybot Search and Destroy user, make sure that you do not have Teatimer enabled. If you already have Teatimer enabled, see this to disable it: How to disable Spybot's TeaTimer Step 1: Downloading Tools In this step we are going to download tools we will use. We will install and configure the programs and then run scans in later steps so please only download right now during step 1. Make sure you download the tools to the exact locations specified below in the procedures to avoid problems later. It is not a good idea to download them to any folder within C:\Documents and Settings.) It is also a bad idea to download and save anything you need into any kind of Temp folder. Malware hides in Temp folders and standard cleaning practices will delete everything from Temp folders. Now download the below tools ( PLEASE only download at this point ). If your protection software blocks downloading because it calls these malware then shutdown your protection software because it is mistaken and is just getting in the way. Malwarebytes Anti-Malware - See the download links under this icon Important: Rename the downloaded mbam-setup.exe file to mb.exe to help work around certain malware that will block it from being run. RogueKiller - Save to your Desktop. See the download links under this icon HitmanPro - Save to your desktop. See the download links under this icon MGtools - Recent bugs in many antivirus programs are detecting this as malware. Disable your AV while you download and run MGtools if you have this problem. Rest assured that it is clean. Your AV is incorrect. We prefer that you download this file to the root folder of the drive where you have installed Windows (Typically the root folder would be C:\ and thus you would have a C:\MGtools.exe file after downloading). If you use FireFox and still have it set to defaults, it will not let you choose where to download files to. To change FireFox, run FireFox and Click Tools, Options, and on the Main tab select Always ask me where to save files. If for some reason you still have a problem trying to save MGtools.exe properly which can happen with Vista, Win7, 8 and 10, you can download and run it from your Desktop as long as your Desktop folder is located on the same drive that you boot Windows from. Note if you have problems just trying to complete the download of MGtools, it may be due to your browser especially if you are using Chrome or Firefox. See the Using MGtools link for help with these browser issues. Now that you have download all the tools and saved them as requested, you are ready to start the next steps below. Step 2: Disabling User Account Control For Vista users - to turn off UAC ( UAC = User Account Control ) Click Start, and then click Control Panel. In Control Panel, click User Accounts. In the User Accounts window, click User Accounts. In the User Accounts tasks window, click Turn User Account Control on or off. If UAC is currently configured in Admin Approval Mode, the User Account Control message appears. Click Continue. Clear the Use User Account Control (UAC) to help protect your computer check box, and then click OK. If it is already uncheck, then you should also notice a red shield with an X in it located in your system tray. Ignore any mesages about UAC being disabled. Click Restart Now to apply the change right away. (Restart even if you did not make the above change, we need to be sure that a reboot has occurred since the first time that UAC was disabled.) Keep UAC disabled until malware cleanup is complete and you have been given the okay to enable it. NOTE: DO NOT CONTINUE UNTIL UAC has been disabled and you have rebooted. For Windows 7 and Win 8 users - to turn off UAC ( UAC = User Account Control ) Click Start, and then click Control Panel. In Control Panel, look under System and Security and select Review your computer's status. In the Action Center window, select Change User Account Control settings in the left column Then move the Slider all the way to the bottom to Never Notify Click OK and then Yes to the popup warning that you are turning off UAC If it is already unchecked, then you should also notice a red shield with an X in it located in your system tray. Ignore any mesages about UAC being disabled. Click Restart Now to apply the change right away. (Restart even if you did not make the above change, we need to be sure that a reboot has occurred since the first time that UAC was disabled.) Keep UAC disabled until malware cleanup is complete and you have been given the okay to enable it. For Windows 10 users - don't worry about UAC. Just remember to use Right Click select Run As Administrator for all the tools. NOTE: DO NOT CONTINUE UNTIL UAC has been disabled and you have rebooted. Step 3: Installing Tools and Running Scans - please only run one scan at a time and only run each scan one time. Also try to complete all scans before attaching any logs! Malwarebytes Anti-Malware Instructions Please carefully follow the instructions in the below link to most effectively run it and obtain a log: Using Malwarebytes Anti-Malware RogueKiller instructions Note: If you have any questions/issues not answered by the below see this link >> Official RogueKiller tutorial Right click RogueKiller.exe or Roguekillerx64.exe (Note: If running Vista or Win 7 use right-click and select Run as Administrator) It will open up on the HOME tab. Click across the the SCAN tab and click the blue Start Scan button. Then click "Start scan" again. The scan will begin, be patient it can take a little while to run. When the scan is finished, you will see a window of results. Similar to this: Do NOT click on the REMOVE SELECTED button. Simply click on the OPEN REPORT button. Now click on EXPORT TEXT button (see screenshot below) Save the file as something appropriate like RK or Roguekiller log to your DESKTOP for easy retrieval, and upload to the forum with your other attachments. How to attach items to your posts. HitmanPro Instructions Now run this procedure HitmanPro - How to scan and obtain a log to get a HitmanPro log MGtools Instructions Now follow the directions in the below link for running MGtools. It also explains possible reasons for not being able to run MGtools Using MGtools Step 4: Do You Still Have Problems Yes, I’m still having problems DO NOT run the READ ME again!!!! And DO NOT move on to Step 5 below!!! Please just attach your logs as given below and tell us what problems you are still having. PLEASE ATTACH ALL REQUESTED LOGS whether the find anything or not!!!!! We must check that proper updated versions were run. If you do not already have a thread started, start a new thread otherwise post the following in your original thread. Clearly describe in detail the problems you are having and how long ago they started. Think about what you were doing at the time. Now you need to attach (See: HOW TO: Attach Items To Your Post ) ( Or View: How to Attach Items to Your Posts) the below logs created while running the above scans. Malwarebytes' Anti-Malware log RKreport.txt from RogueKiller HitmanPro log MGlogs.zip - normally it is C:\MGlogs.zip (but you may also find a copy on your Desktop if it ran properly ) - only attach this log from MGtools.exe Please DO NOT attach any logs seen in the MGtools folder unless requested by a helper. Be patient after posting your logs and wait for one of the helpers to get to you. It can take a while to read thru all of the logs and to create individual fixes for you. Also DO NOT BUMP your thread to try and get a faster answer. This will actually significantly delay getting an answer. See this: Don't Bump! It Only Hurts You!!! No, I’m not having any problems If you are sure everything is okay ( give it a couple days to be sure ) and that you do not need to request any help, then jump to the next step below. Step 5: Enable User Account Control (UAC) While running the MGtools procedure, we had you disable UAC. Now we need to enable it again to help keep you safe. You can either respond to the security notice in the System Tray alerting you to enable UAC or you can do the below. navigate into the \MGTools folder just created in the root of your Windows boot drive. locate the EnableUAC.reg file and double click on it and allow it to be added to the registry. This registry patch is used to enable the User Account Control feature You should reboot after applying the registry patch so that it works properly. You can wait to do this reboot in step 6 below if you are going to immediately perform step 6. Now continue on to step 6 Step 6: Toggle System Restore Before you toggle System Restore, make sure that you are no longer having any malware or other problems as specified above in step 3. If necessary, run your PC for a few days to make sure that everything is working well. You only need to Toggle system restore if malware had been found during the cleaning procedures. If no malware was found, there are no infected restore points to worry about, thus you can skip to the next step. Once you are sure all malware problems have been removed follow the below steps: Disable System Restore For Vista or Win 7 see Disable And Enable System Restore For Win 8 or Win 10 see Win 8 Or Win 10 System Restore - How To Enable/disable Now reboot your PC Now Enable System Restore using the same link as above Why we toggle System Restore! If you have been infected with any trojans, spyware, etc, they could have been saved in System Restore and are waiting to re-infect you. Since System Restore is a protected directory, your tools can not access it to delete files that may contain viruses. Even though your tools may say they are deleting them, they are not! The reason for doing this after your system has been completely cleaned of problems, is so we can remove possible infected restore points. When you disable system restore, it removes restore points! We only toggle System Restore after you are clean because keeping even infected restore points around while we are fixing things may prove useful if something goes wrong during the process. An infected restore point could be better than none at all! Now continue on to the next step below! Step 7: Keeping your computer safe and secure See the following thread and complete the steps: How to Protect yourself from malware! Step 8: Alternative Scans - If still having problems, see: Alternative Scans Now surf safely!