Who here actually knows how to cleanup spyware and viruses?

Do you cleanup by hand or rely on scanners?

  • By Hand

    Votes: 23 21.7%
  • Scanners

    Votes: 12 11.3%
  • Mostly scanners, some by hand at the end.

    Votes: 71 67.0%

  • Total voters
    106

greggh

New Member
Reaction score
3
Location
Boston, MA
I have been reading a lot of posts lately about malware that has someone stumped. Usually they start off by listing the scanners they have tried and the ones that helped or didnt. Its a bit strange to me since scanners are a last measure and really slow down the simple process. Good techs should be able to remove most viruses, including rootkits and other nasties, by hand with no scanner needed until the very end.

The one thing I have noticed in response to my comments like that is a lack of confidence. The big answer, even in real life when I am talking to a local tech, seems to be that they dont feel comfortable deleting files from system directories by hand. They fear messing the system up worse. It is an ok fear to have. But after a couple months of doing it the right way you should have a very good idea of what stays and what goes.

Most viruses, spyware, rootkits, malware, and so on can be removed by hand in about 15 minutes time. A lot of that time is actually boot time into PE based environments to do the actual work. In many years of doing it this way I have only run into a virus that I could not remove without a scanner or some other crutch once. Thousands of systems. And in the end that system was actually corrupt beyond simple repair and Reimage from www.reimage.com fixed the problem for me.

My typical process on xp:
1. Boot into their environment if it will. Just to get a view of the problem. at this point 9 times out of 10 its a fake antivirus or something similar.

2. Boot into a custom windows pe environment, but ubcd4win could be used just as easily.

3. EZ-PC-FIX to list off the startup items and registry key entries that I need to focus on first.

4. Remove everything from within EZ-PC-FIX then go find all the files it was listing and make sure they are deleted, if not then I delete them.

5. Go through the registry startup locations, there is a great list of them here in a thread. This takes only a couple minutes. Delete any entries that dont belong and if needed delete the associated file.

6. Go into the program files directory, look for bad directories such as "Home Antivirus 2009" or any of the 63256325 others that will be in there. Delete those directories.

7. Go into the windows directory, sort by date. Check for any files newer than a few weeks. Some are amazingly easy to tell that they are bad like "asdfkjhasdfhjkasdf.dll" and so on. Others might not be, load up a web browser and search for those few files. Good ones keep, bad ones, make a directory at the root of C and put them in there.

8. Repeat #7 for windows\system32 and windows\system32\drivers

9. Also in windows\system32 in explorer add the company column so each file shows what company it came from. Sort by this column and look at all the files (very few) that dont have a company. Ignore the .nls files and look at the rest. Those are usually suspicious files. Go through a process like #7 again with those files.

10. Use any registry and file cleaner (I use EZ-PC-FIX from PE for temp file cleaning, but there are many others like Avasts tools.) This should get any leftover entries that pointed to the bad files you already deleted. This should also get any bad files sitting in your temporary directories.

11. Reboot. At this point I am about 15 minutes in and probably done. If everything looks good I will start some simple optimization to get the system running faster.

12. At the very end I will run malwarebytes full scan just to make sure nothing sneaky got by. But it is very much just a final check to make sure things are clean. It will usually find useless leftover files sitting at the root of C:\ or in c:\documents and settings\user\ and whatnot. Things that arent active or where the malware install files. Nothing that is actually running anymore. But its good to let it cleanup the rest of the mess.

13. Remeber that directory you made on C to backup any files you were removing from windows, system32 and drivers? If everything is working fine then those files were not needed. Delete that directory as you were probably right and those were indeed bad files. If something is going wrong such as a broken driver then you have some investigation to do. But usually this is not the case.

14. While malwarebytes is running, if the customer is there we can then talk about everything that happened, what was wrong and what I have done. We can also talk about backup solutions and other upsells.



That simplified it a bit, but that is the basic procedure and it fixes things a LOT faster than relying on a few scanners to do the work. It also keeps me from staring at the screen while tools do the work for me. So the customer sees more value in what I am doing.
 
Last edited:
Finally, greggh, someone that has actually taken the TIME to post HOW they remove this stuff manually. Every frickin' time I've seen folks post things like this before, about how it's better to remove stuff manually vs. with scanners, no one has ever said exactly how to do it. I'm guessin' people are trying to protect their business, i.e. don't want to give away their trade secrets.

Kudos to you for the post, greggh. Most of the locations you mention I was already aware of, but to have something in a nice, neat tidy checklist is great.

Two questions though; One, how do you go about wrestling the gators in either Vista or 7? And two, what about fighting rootkits? Only thing I've seen that will put the smackdown on rootkits is Unhackme, to this point.

Again, thanks for the info, greggh. I appreciate it.

PS And exactly how do you use EZ PC FIX? I know that I've loaded up the registry for it before, but do you end up having to load the registry for each user, or how do you use it?
 
That's an excellent post Greg. I basically follow what you listed in your post. When I first started out a few years ago I depended mostly on scanners to do the work. As I became more comfortable I started to do things more by hand because like you said it's a lot quicker. Plus by doing it by hand like you mentioned, you don't have to sit there and hope that the scanner is going to take care of it for you.
 
Finally, greggh, someone that has actually taken the TIME to post HOW they remove this stuff manually. Every frickin' time I've seen folks post things like this before, about how it's better to remove stuff manually vs. with scanners, no one has ever said exactly how to do it. I'm guessin' people are trying to protect their business, i.e. don't want to give away their trade secrets.

Kudos to you for the post, greggh. Most of the locations you mention I was already aware of, but to have something in a nice, neat tidy checklist is great.

Two questions though; One, how do you go about wrestling the gators in either Vista or 7? And two, what about fighting rootkits? Only thing I've seen that will put the smackdown on rootkits is Unhackme, to this point.

Again, thanks for the info, greggh. I appreciate it.

PS And exactly how do you use EZ PC FIX? I know that I've loaded up the registry for it before, but do you end up having to load the registry for each user, or how do you use it?


EZ-PC-FIX loads up all the registry entries for every user all on its own. When you startup EZ-PC-FIX make sure that the directories listed at the bottom of the windows are right for windows and documents and settings. Then when you tell it to load them, it will load every user.

As for vista and windows 7, well windows 7 hasnt been around enough for me to actually run into it yet in the wild. Vista on the other hand is a bitch. Most of the same work. The only major difference for vista is that EZ-PC-FIX doesnt work and I have to do most of the stuff it does by hand. So it adds 5-10 minutes of extra time.

Rootkits are 7 times out of 10 sitting in the drivers directory. If you delete the file the thing is gone. Doing it from a booted environment like a bartpe disc will let you see the files that are hidden normally in windows. Using a registry cleaner from this type of environment will also let you clean all the keys the rootkit was hiding/protecting. So it normally isnt much different than getting rid of the other spyware and viruses. The times they arent in the drivers directory they are usually in system32, and doing the other various things I listed normally gets them.
 
Last edited:
I don't really find malware removal that difficult, probably because infections are much more common these days I get alot of practise. Of course, you can't always get everything so once I'm finished I run some quick scans with some antivirus/antispyware software.
 
Last edited:
Great post Greggh! I've gotten lazy and depend too much on a boot disc scan using Avira Rescue CD, once I determine it's a rootkit or something intransigent.

I also clean up temp and TIF files using UBCD4Win if the thing's really slow, and maybe run AntVir from it. I'll definitely try out EZ-PC-FIX next time and manual clean up Windows, System32 and Drivers directories.
 
Thanks for the thread, greggh.

I've mentioned before other methods for baddie removal including editing sysvol, but no one seems interested.

I have not tried EZ PC FIX so I wonder how it would get on with malicious registry instructions hidden by the method described here

http://www.technibble.com/forums/showthread.php?t=8272.


Baddies often invite their friends round to lunch once they get in.
I regularly see pcs that have been taken to another firm and 'cleaned' only to find that only the outer 'layer' had been removed and the badies are flocking in again.

You are correct in that if you can knock out the cloaking file/process the rest are easy by many methods, but surely the definition of a rootkit is that it is in the root, not the driver folder and could exist even if Windows was deleted from the pc?

No human can compete with an automated scan of the entire registry it's just too huge. You can get lucky or use educated guesswork to pick off many baddies, but you will inevitably miss some that way.
 
but surely the definition of a rootkit is that it is in the root, not the driver folder and could exist even if Windows was deleted from the pc?

Very wrong. A rootkit is merely something that gets into the system and runs at a low enough level that it can stop other running processes from seeing it. The name has nothing to do with the physical location of the file. There are rootkits for every major OS. File location is pretty meaningless. Almost every rootkit I have seen on windows that was a true rootkit was sitting in the drivers directory.

As you put it "the cloaking file/process". That is the rootkit.

You mention the long value problem with regedit in the other thread. From what I have seen EZ-PC-Fix works fine with that. There are also multiple other registry editors for the PE environment, I have only ever seen microsofts tool have the problem.
 
When I run into virus/malware I use autoruns and process explorer to find and stop the infection so I can delete it. Then use scanners and tools like combofix to clean up the left overs. I find this does very well for me and is my preferred method.
 
When I run into virus/malware I use autoruns and process explorer to find and stop the infection so I can delete it. Then use scanners and tools like combofix to clean up the left overs. I find this does very well for me and is my preferred method.

This is also the bones of my method. There are other steps but just variation on a theme. I struggle with rootkits. I haven't failed to remove one yet but I reckon it's only a matter of time.
 
I just outsource to geek squad. How they get those pesky things removed ill never know.

+1, They're great and remarkably quick. They usually have it done and back to the customer within 10 days. Talk about great service ;)
 
Speaking of which has any actually seen the GS cd in action? I friend of mine downloaded it and showed me just how ridiculously easy it is. It is literally, press a button, insert memory stick with updates, choose full/quick scans, come back in 5 hours and check it out, give pc back to customer
 
As I understand Rootkit action (in Windows) something has to load very very early in the boot process.
This can only happen from the root of the boot drive. (This is how the Sony and Symantec ones work).
I have always known this component as the 'rootkit', though maybe I am wrong about the name.
This is why something like 'RootkitNo' is useful to prevent this action.
This little program is a sort of rootkit itself and loads straight after Windows is detected and before it is loaded and suppresses illegitmate processes.

Process Explorer is also very good, has anyone been to the Russinovich lectures on how to use it to hit viruses, along with Regmon?
 
This can only happen from the root of the boot drive. (This is how the Sony and Symantec ones work).

Again, just like it was stated earlier in the thread. The location of the rootkit itself doesnt matter. It could be 50 directories deep, or sitting at the root of the c:\ drive. The word root in rootkit has nothing to do with the file or its location. Sony and Symantecs rootkits were/are not at the root of the drive. Both live under the windows directory.

Specifically this page will show you that the sony one is in the windows\system32 directory, and then in a hidden directory under that.
 
Last edited:
Im actually quiet embarrassed to post this but,,here goes.

So i was messing abound on my system practicing manual virus removal b4 going to work on a customers pc. Anyways i ended up using dial a fix to remove some registry components relating to the display on my network adapter and my battery indicator in task manager. I also checked the option to remove file associated with the process.

I tried using dial a fix to do a SFC purge and scan but this didnt help.
Any advice would be helpful.
 
Im actually quiet embarrassed to post this but,,here goes.

So i was messing abound on my system practicing manual virus removal b4 going to work on a customers pc. Anyways i ended up using dial a fix to remove some registry components relating to the display on my network adapter and my battery indicator in task manager. I also checked the option to remove file associated with the process.

I tried using dial a fix to do a SFC purge and scan but this didnt help.
Any advice would be helpful.

Have you tried running a System Restore?
 
Back
Top