Posted on 2014-02-21
Medium Priority
Last Modified: 2014-02-24
I recently download Efix software (utility to clean Windows) and now I don't know how to get rid of this sh...garbage.
Periodically a window open asking to upgrade to the payed version. Unsinstall this software is not enough. It acts like a malware. I tried without success Malwarebytes and Bitdefender internet security. Niet.

I read a few tricks online but it is so complicated that I gave up.

Somoday at Experts exchanga has an Idea?

Question by:Marcheblanc
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
  • 2
  • +1

Expert Comment

by:Jeffery Hayes
ID: 39877777
What I would do is first remove and uninstall as noted.

Open Msconfig and see what files are set to launch on Start up.

Then run Malwarebytes and restart.

If that doesn't work just follow these steps.


The steps are a bit long but it's a sure fire way to get rid of the Malware.

Author Comment

ID: 39877809
Hi Jeffrey Hayes,
Are you sure that AdwCleaner, Junkware Removal Tool, HitmanPro are all SAFE. I read somewhere that, for exemple, ADWCLEANER is not quite safe.

If you are certain, I will to what you suggest.


LVL 11

Expert Comment

by:David Kroll
ID: 39877866
You can use CCleaner and run a registry scan to get rid of anything left behind.
Percona Live Europe 2017 | Sep 25 - 27, 2017

The Percona Live Open Source Database Conference Europe 2017 is the premier event for the diverse and active European open source database community, as well as businesses that develop and use open source database software.


Accepted Solution

Jeffery Hayes earned 750 total points
ID: 39877870
Yes probably on Cnet.


Just make sure you don't install the Cnet installer.
LVL 29

Assisted Solution

by:Thomas Zucker-Scharff
Thomas Zucker-Scharff earned 750 total points
ID: 39878018
Did you try running RogueKiller and then without rebooting running MBAM?  If that didn't work try one of the utilities from this site


I particularly like SpyBHORemover - it gets rid of all Browser Helper Objects (BHOs)

SpyDLLRemover is pretty good too.

Check out all the tools on the site for windows malware removal:


Author Closing Comment

ID: 39883065
I did certain things that Jeffrey and Thomas suggest and use regedit to delete every instance of EFIX directly in the register and it seems that everything is fine now. I say "it seems" because this kind of rogue sometimes come back after a few days.

LVL 29

Expert Comment

by:Thomas Zucker-Scharff
ID: 39883092

Have you run any antirootkit software on the machine?  Be careful with these on 64 bit machines.


Author Comment

ID: 39883114
Hi Thomas,
The question is:

 "is Efix Pro" a Rootkit?
LVL 29

Expert Comment

by:Thomas Zucker-Scharff
ID: 39883167
Not one I had heard of.  But you may want to read this discussion about it:


Check out the second comment especially.  It may not be a rootkit, but it seems to be more malicious than your average malware.  I would use CCleaner and continue to do MBAM scans on a daily basis for the next week or so.  

I always suggest getting additional layers of security.  For instance, MBAM Pro works alongside most antimalware apps.  Winpatrol Plus is also a great addition.  Everyone should be using an alternate hosts file (the one from MVPS is excellent).

Featured Post

Learn how to optimize MySQL for your business need

With the increasing importance of apps & networks in both business & personal interconnections, perfor. has become one of the key metrics of successful communication. This ebook is a hands-on business-case-driven guide to understanding MySQL query parameter tuning & database perf

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article we have discussed the manual scenarios to recover data from Windows 10 through some backup and recovery tools which are offered by it.
Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses
Course of the Month7 days, 21 hours left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question