The PC

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, March 27, 2011

How to Remove Malware

Posted on 3:11 PM by Unknown
Today's post will demonstrate the method for removing malware the I have developed over the past couple of years. Malware includes virus, spyware, scareware, worm, root kit, or trojan infections.

First, boot the PC into Safe Mode. I always do this--no matter the type or severity of the infection. Booting into Safe Mode accomplishes two things. One, it disables services upon which the malicious software relies. Most of the pop-ups and the 'self defense mechanisms' associated with malware are crippled in Safe Mode. 'Self defense mechanisms' include blocking antivirus software from being installed, detecting the infection, or removing the infection. Two, booting into Safe Mode simply allows the scans to run much faster.

After you have booted into Safe Mode, run the portable version of CCleaner. This will remove a lot of junk and speed up scan times. Start up CCleaner, configure what you want removed by checking or un-checking the various boxes, and click Run Cleaner.


Next, click on the Registry tab and then click Scan for Issues. I have never run into any problems, but go ahead and back up the registry before fixing the issues that it will find. I usually back up the registry to the root of the C:\ drive or somewhere that the client won't find it and mistakenly reinstall it.

Next, install MalwareBytes AnitMalware. MalwareBytes is an excellent malware remover. After you have it installed, update it. If you have just downloaded the installer minutes before installing the software, update it anyway.



Next, return to the Scanner tab and run a Quick Scan. I have never found it necessary to do a Full Scan.




When the scan completes, close the text file that pops up and press the 'Remove Selected' button. Reboot, as instructed. Make sure to reboot into Safe Mode, again.

If you removed several hundred infections. It's a good idea to run the scan again after rebooting.

Next, run the portable version of SuperAntiSpyWare. Yes, it's a horrible name for software(or anything for that matter.) It sounds like something from a Japanese monster movie, but it's also an excellent malware removal tool.

Again, update first.



After updating is complete, click the Scan you Computer... button. Choose Perform Quick Scan and then click the Next Button.



SuperAntiSpyWare takes considerably longer to perform it's scan than MalwareBytes does. Be patient, remove the selected infections, and reboot as instructed. If the system is a x86 (i.e. a 32-bit system) reboot into Safe Mode. We have one more step to perform.

If it is a x64 system, you should be done. Boot the computer normally and check it out. Make sure that everything behaves as it should. Make sure that no proxies are set that shouldn't be set. Browse a few antivirus sites and Microsoft.com. If you can't browse these sites, start the process over from the beginning, the system is still infected. Also try scanning with whatever antivirus software your client already has installed. That is, assuming that it is up to date.

If you are working on a 32-bit system, run ComboFix from Bleeping Computer. Be forewarned, the developers of this software do not want you to run it with out their supervision. That being said, I have run ComboFix countless times and never had any problems. Again, be sure to read the disclaimer.

If ComboFix tells you that it needs an update, update it. If it tells you that the recovery console needs installing, install it. Otherwise, let it run. If ComboFix finds root kits, it may need to reboot the system. Don't do it yourself and don't worry about Safe Mode. Let the software do it's thing.


That should do it. Again, check the system out to see that it behaves as it should. Make sure that no proxies are set that shouldn't be set. (Internet Options>Connections Tab>LAN Settings Button>Proxy Server Section.) As above, browse Microsoft's site and a few big name anti-virus software companies' web sites.

If after performing the above process you find the system still infected, remove the hard drive from the system, slave to another clean system and run MalwareBytes and SuperAntiSpyWare on the infected drive. Also, scan the slaved drive with software like AVG or Microsoft Security Essentials.

Be sure to see an earlier post on how to keep your system from getting infected. After cleaning a system, it is a good idea to go through that process as well.

Email ThisBlogThis!Share to XShare to Facebook
Posted in Malware, Virus, Windows | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • 30 Years in Review: My Experience With The History of Violence in Video Games
    For as long as I can remember playing video games, there has always been violence, whether it be inconsequential or direct, or merely abstra...
  • The Dark Knight Rises: A Worthy and Satisfying Conclusion
    I've  seen a lot of movies based on comic books over the years, and I've learned to spot the good stuff from the crap pretty easily....
  • Protecting Your PC From Malicious Software
    New threats are unleashed upon the internet each day. In this article, threats or malicious software (or malware) refer to a computer virus,...
  • Why Windows 8 Will Fail, at Least In the Desktop Market...
    Well many of you are probably windows users, in fact estimates are that around 90% of all computers are running Microsoft Windows . Of that,...
  • The Right of The People To Not Be Shot: An Examination of The 2nd Amendment.
    "A well regulated militia, being necessary to the security of a free state, the right of the people to keep and bear arms, shall not be...
  • Ulcers, Ulcers, Ulcers, I Hate Them.
    As some of you know I have Crohn's disease . If you're interested in knowing what it is just click on that link. But rather than com...
  • Backup Windows Part 1 -- Backup and Restore
    A couple of days ago was National Backup Day. Okay, we are a little late. Plus, a quick Google search will reveal several National Backup Da...
  • Why I am an Atheist (part four)
    This is part four of this article, here you can find parts one , two and three . Part IV: The Elegant Universe When I was a boy, I ...
  • Some of The Strangest Things in The Universe
    I thought in honor of Halloween, I might blog a little bit about the strange but true. I figured it might be fun to discuss some of the wack...
  • Changing Forgotten Window's Passwords
    Often times a user will forget their Windows login password. Of course, often times that user will be using the sole administrator account o...

Categories

  • 0-day
  • 2000
  • ACTA
  • Add-ons
  • Adele
  • Alanis Morissette
  • Amy Lee
  • Anonymous
  • antitrust
  • anycast
  • art
  • assholes
  • atom
  • Avril Lavigne
  • backbone
  • Backup
  • Batman
  • Bill Maher
  • biology
  • bittorrent
  • blood
  • Boot Problems
  • botnet
  • browser
  • censorship
  • children
  • clone
  • comic
  • congress
  • conservative
  • constitution
  • consumer
  • copy protection
  • copyright
  • corporatocracy
  • crack
  • crohn's
  • data-mining
  • DDOS
  • democracy
  • disease
  • DMCA
  • DNA
  • DNS
  • documentary
  • DRM
  • emotion
  • evolution
  • Facebook
  • FBI
  • federal
  • female
  • film
  • firewall
  • FISA
  • freedom
  • galaxy
  • games
  • God
  • government
  • hacker
  • higgs boson
  • Homeland Security
  • homosexuality
  • intellectual property
  • interface
  • internet
  • Internet Explorer
  • intestines
  • ipad
  • ISO
  • ISP
  • Jewel
  • kernel
  • Keyboard
  • Keyboard Shortcuts
  • liberal
  • loss aversion
  • mac
  • male
  • Malware
  • MegaUpload
  • meme
  • metro
  • microsoft
  • movie
  • MPAA
  • nature
  • NT
  • Office
  • open source
  • OS
  • oscdimg
  • Outlook
  • pain
  • particle
  • passwords
  • patent
  • PIPA
  • piracy
  • Poe
  • poetry
  • President
  • Printers
  • privacy
  • programming
  • progress
  • public domain
  • quantum mechanics
  • Recovery Console
  • red flag
  • religion
  • remix
  • replication
  • reproduction
  • RIAA
  • ribbon
  • rootkit
  • script
  • security
  • sex
  • singer
  • software
  • songwriter
  • SOPA
  • spore
  • spyware
  • star
  • supernova
  • Supreme Court
  • the big bang
  • tracking
  • trojan horse
  • tyranny
  • UBCD
  • ulcer
  • unintuitive
  • universe
  • upgrade
  • USB
  • violence
  • Virus
  • Vista
  • VPN
  • wars
  • White House
  • Windows
  • Windows 7
  • wiretapping
  • women
  • xcopy
  • xerox
  • XP

Blog Archive

  • ►  2013 (8)
    • ►  October (1)
    • ►  August (1)
    • ►  May (2)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)
  • ►  2012 (42)
    • ►  December (2)
    • ►  November (4)
    • ►  October (2)
    • ►  September (2)
    • ►  July (3)
    • ►  June (4)
    • ►  May (4)
    • ►  April (4)
    • ►  March (7)
    • ►  February (10)
  • ▼  2011 (7)
    • ►  April (4)
    • ▼  March (3)
      • How to Remove Malware
      • Changing Forgotten Window's Passwords
      • Back up and Restore Network Printers
  • ►  2010 (3)
    • ►  July (2)
    • ►  June (1)
  • ►  2009 (5)
    • ►  November (1)
    • ►  October (4)
Powered by Blogger.

About Me

Unknown
View my complete profile