How can I fix a computer that is infested with malware and is extremely unresponsive?

103

16

Possible Duplicate:
How do I get rid of malicious spyware, malware, viruses or rootkits from my PC?

I'm troubleshooting a Windows 7 PC for a friend. A couple of days ago it started running 'slow'. It turns out 'slow' is about 15 minutes to the first glimpse of the desktop, and another 30 to show icons. It is possible to open Task Manager, and nothing seems awry, CPU usage at 1-5%, plenty of memory free.

The machine is clearly infested with malware though, in particular a program called 'Optimizer Pro' is demanding money to 'remove 5102 files slowing down my computer'. This seems highly suspicious.

My problem is though, that I can't access msconfig (I left it for a couple of hours after having hopefully typed it into the Start Menu and hit enter - nothing seems to have loaded), or anything at all basically. I can boot from a Linux Live CD, but can I actually do anything useful from there?

System Restore hasn't fixed it either, and Safe Mode exhibits the same behavior.

fredley

Posted 2012-11-26T22:04:22.513

Reputation: 3 197

Question was closed 2012-11-29T22:13:09.767

After typing into the start menu, you need to wait for items to appear. I've experienced that before. The delay you see with, say, cmd is the app itself lauching – Cole Johnson – 2012-11-26T23:26:42.123

5I had this happen on a family member's laptop recently. Once I was able to get into it I scheduled a chkdsk, which would not complete after three attempts, reporting that the disk was so messed up it couldn't fix anything. The disk is getting replaced, and I'm going to mount it on a USB to SATA device to see if I can pull any files from it. This may not be related to your issue, but it wouldn't hurt to "check." – Bratch – 2012-11-27T00:55:17.030

29"Nuke the site from orbit, it's the only way to be sure." - As in all cases of serious malware infection I would suggest to salvage the data you can using a Linux live disc and then reinstalling Windows. Otherwise there is a fair chance that you will not clear very bit of malware and will either have to restart fixing it later OR (and potentially devastating) someone will keep using the machine under the assumption that it is clean although it is not. – fgysin reinstate Monica – 2012-11-27T15:54:08.127

Just use the Live-CD to copy your data on an external driver and re-install the OS. – xavierm02 – 2012-11-27T16:24:09.097

@fgysin recovering arbitrary data from an infected computer and nuking from orbit are mutually incompatible activities because data files can carry an infection to the new computer (ex office macro viruses); even if, in the far too common case, where the user doesn't have a recent backup to restore from it's the closest you can come without massive protest. – Dan is Fiddling by Firelight – 2012-11-27T22:11:04.173

I had to clean up a system infected by ransomware. It had a similar disk performance problem that was caused by the trojan scanning the disk looking for all files/folders and setting the hidden attribute. Do a google search for 'optimizer pro removal' good luck – jqa – 2012-11-28T02:02:11.677

If it's not malware, here's betting there's an issue with the graphics card. – James P. – 2012-11-28T06:34:19.760

If it not the malware slowing things down, check the dust levels in the case. I fixed the speed problems with a computer once by cleaning out the dust. The machine was overheating because of it. – Darryl Braaten – 2012-11-28T15:03:51.667

2try format c:/ – Phillip Schmidt – 2012-11-28T19:50:11.070

Answers

244

I recommend reinstalling Windows

If you try to salvage the existing install you'll end up spending hours or, likely, days working on it and have nothing to show for your efforts. And even if you were able to successfully run all malware removal tools I wouldn't trust that all malware actually had been removed because, by definition, the malware authors are always one step ahead of the malware removal authors. Once a machine is infected this badly it's likely loaded with all kinds of bad stuff.

So...

  1. Format hard drive
  2. Install Windows

And, as one of the commenters suggested, you should assume that all files and data from the old install are infected and should not be trusted.

HairOfTheDog

Posted 2012-11-26T22:04:22.513

Reputation: 2 102

60While I normally discourage short answers with lack of detail, these four words really say it all. It'll probably be easier. – Shinrai – 2012-11-26T22:18:50.513

6+1 - A reinstall will take less time and be less hassle than trying to deal with a system that frustratingly slow. – afrazier – 2012-11-26T22:44:04.793

34'Nuke it from orbit, its the only way to be sure' - From what's been said it sounds like this would actually be faster. – Journeyman Geek – 2012-11-27T00:43:02.807

1Also, assume that any backups of any data from that computer are also infected. – pgs – 2012-11-27T03:27:55.080

48This is the right approach, regardless of speed. In the last few years, Malware has gotten both sneakier and nastier. Sneakier in that it travels in packs, and using something like Malwarebytes or other tools to remove the obvious symptoms may still leave a less-obvious keylogger or rootkit behind. Nastier in that instead of just showing ads or a toolbar, it's likely to go right for credit card or banking info. Put those two together, and it's just not worth the risk trying to clean a machine anymore. Go right for the backup/reinstall/restore technique at the first confirmed infection. – Joel Coehoorn – 2012-11-27T03:57:37.340

36I posted this below as an answer, but before making that step, I caution you to first see if its a hardware problem. If its a failing hard drive reinstalling windows will do nothing. As the OP stated, it is only running at 1-5% percent and low memory usage. It does the same thing in Safe mode. These are symptoms of faulty hardware also, so it can't hurt to be safe and check to see if the real problem is a hard drive failure before nuking the thing only to find out that its still moving super slow! – Bob – 2012-11-27T04:14:39.203

2I have a PC that one day suddenly went slow. It still runs 5 years later as slow as the day it died, regardless of what operating system I put on it. It is slightly faster with an ultralight Linux like CrunchBang but only just. However, find out first through chkdsk if the problem's with your hard drive and if you do then choose to reinstall, do your homework thoroughly. My own ingenious reinstallation strategy left me without Windows. I am happy on Linux but your girlfriend might not be. – Simon Hoare – 2012-11-27T07:41:50.817

16I would agree with Bob before taking this step. Boot a linux live CD/USB and see if it is usable there. If everything is fine, then it's probably not a hardware issue. Using a linux live CD/USB also allows you to copy whatever data that can be saved (photos, music, etc) into an external drive first before reinstalling. – Mart – 2012-11-27T07:47:32.740

2I wonder if running a linux based disk benchmark will reveal if its a disk error or a OS error. It might be a multipoint failure as was noted. hdparm -tT might be useful here – Journeyman Geek – 2012-11-27T09:21:01.023

1Also, once everything has been reinstalled, save a drive image so the next time it will only take 10 minutes to reinstall everything rather than half a day. – osknows – 2012-11-27T10:30:18.570

Also, make sure to give your friend a whack over the head for getting malware in the first place... -_- Hopefully he won't do that again, and won't waste your time with future OS reinstallations. – Shaamaan – 2012-11-27T12:16:32.880

I would consider this a 'work around' and not a 'fix' - even though it would solve the OP's question, it is not fixing the cause of the slowness. The majority of these comments are answers in their own right and not further steps to this answer (unless it is edited to include). – HaydnWVN – 2012-11-27T12:42:33.730

I would say Format disk first then resinstall Windows, then install a good protection like "Microsoft security essentials" or other not too intrusive antivirus/antimalware. Also update browsers. – bokan – 2012-11-27T14:51:15.773

+1 for reinstalling Windows. The time spent reinstalling will be a lot less than trying to diagnose why it is running slow. – 8bitjunkie – 2012-11-27T16:26:13.713

1I'd vote for this as well, although I'd prefer "Uninstalling Windows" because it will probably just happen again. Linux tends to degrade less and is a bit more resistant to infection. I've used qutie a few OSes from DOS 2.1 or so on and am comfortable with most and at this point I refuse to use Windows unless absolutely necessary (Work, gaming) and even then I try not to load anything important onto windows systems in case I have to reload it. – Bill K – 2012-11-27T17:11:39.253

2@Mart - A live cd running fine doesn't necessarily indicate that it's not a hardware issue. Not only are you bypassing the hard drive (which is often the culprit in hardware-related slowness like this), but the drive may still be in good enough shape to be mounted as purely a data drive without triggering Linux's disk self-checking alarms. – Shauna – 2012-11-27T18:33:48.960

The problem with reinstalling Windows that I have faced is that certain peripherals like the webcam and microphone do not work right off the bat. Even things as simple as keyboard filters require additional work. Have you guys managed to streamline this process without a custom image (kind of prohibitive for home users)? – kush – 2012-11-27T18:34:40.473

5It would be nice if the answer also explained WHY this is the way to go. – Ivo Flipse – 2012-11-27T20:27:57.650

I started taking this approach after the story of some senior MS exec asking for a friends PC to cleaned up by MS engineers and they admitted that it wasn't easy to prove that all traces were gone, and all of windows configuration was correctly reinstated. Save my self hours in family support time. – Preet Sangha – 2012-11-28T00:31:58.167

1reinstalling windows is practically an annual maintenance item, just normally registry buildup seems to reduce the speed by ~10-20% per year. Just don't do like me and forget your linux live cd in the tray or they will ask "Its way better now, but where the heck is solitaire?" – technosaurus – 2012-11-29T03:10:42.907

1If you try to salvage the existing install you'll end up spending hours or, likely, days working on it and have nothing to show for your efforts. You waste a lot more time re-installing; since re-installing doesn't just stop when you are doing re-installing the OS, it continues because you need to re-install the rest. Since the amount of start-up locations, services, drivers and modules are limited and you use a virus scanner for the rest, it's viable to do an off-line clean which only takes some minutes and have an extremely high change of having a clean setup again. But well, YMMV... – Tamara Wijsman – 2012-11-29T17:15:56.803

@technosaurus: normally registry buildup seems to reduce the speed by ~10-20% per year Where are you pulling these numbers from? I'm pretty sure those aren't from proper statistics based on proper measurements. – Tamara Wijsman – 2012-11-29T17:34:00.333

I didnt keep a database but yes, it was based on real world usage by a variety of users. It ranged from no noticeable change to over 50% for users that tried out a lot of garbage software. The 10-20% was an estimate of ~1 standard deviation, but feel free to commission a study if you need precise results. – technosaurus – 2012-11-29T17:51:57.183

@technosaurus Would be nice to see where you got that from - other than your opinion! – HaydnWVN – 2012-12-03T15:31:36.867

57

Various anti-virus vendors have bootable rescue/scan CDROMs available. Two free ones are:

Kaspersky Rescue Disk 10

Kaspersky Rescue Disk 10 is designed to scan and disinfect x86 and x64-compatible computers that have been infected.

The application should be used when the infection is so severe that it is impossible to disinfect the computer using anti-virus applications or malware removal utilities (such as Kaspersky Virus Removal Tool) running under the operating system.

AVG Rescue CD

AVG Rescue CD Get your business back up and running rapidly in case of system crashes.

Removes infections, repairs files and recovers systems.

Brian

Posted 2012-11-26T22:04:22.513

Reputation: 8 439

@pratnala Use both. Neither's any good, but together they'll catch what each other misses. – wizzwizz4 – 2016-09-25T17:24:20.400

5I highly recommend the Kaspersky bootable anti-virus. Ideally, have a wired Internet connection available to update the virus definitions without having to worry about setting up the WiFi connection. – David Schwartz – 2012-11-26T22:56:31.093

1Good suggestion! First try to clean the system with the free tools described above. If this doesn't help, then re-installing the Windows system might be the only choice left. Don't forget to backup, safe bet would be to disassemble the HDD and connect it as external drive in another computer. – GregD – 2012-11-27T01:23:13.937

3@GregD You certainly don't want to try to disassemble the hard drive if you don't have a proper cleanroom and appropriate tools. You may want to remove it from the computer and install it in another (or in an external enclosure), but that is far from the same thing. – a CVn – 2012-11-27T09:57:39.087

3Kaspersky yes. AVG No! – pratnala – 2012-11-27T10:00:04.243

I tried Kaspersky, it didn't find anything... – fredley – 2012-11-27T14:20:59.087

@PratyushNalam - Can you quantify why not to use AVG or why Kaspersky is better? – Freiheit – 2012-11-27T15:23:01.033

2When I tried in a similar situation, AVG said the system is clean. Not even hint of a virus. But Kaspersky caught the culprit. Lost trust in AVG after that. Used it for 2+ years. Now on Kaspersky from the past 3 years. KIS not KAV – pratnala – 2012-11-27T17:08:33.540

@MichaelKjörling - yes, that's exactly what I had in mind. Use the removed hard drive as an external one for restoring data only. – GregD – 2012-11-28T00:26:37.867

a remaster of Puppy linux + fprot and/or clamav is a nice tool to keep on your usb stick. The various antivirus solutions all tend to miss a subset others might find and vice versa and it will tend to fluctuate over time, so running 2 different checks is a good idea... (not actual values - just example) 90% detection + 90% detection ~= 99% detection ... and the law of diminishing returns-> 99% detection + 99% detection from ultra-uber-commercial-AV ~= 99.99% – technosaurus – 2012-11-29T03:24:30.827

31

I'm going to hop in here and ask more about this first, and then post my assumptions about the computer. You said that its using only 1-5% of the CPU, but its still moving slowly? While I'm not saying that it isn't riddled with viruses or anything because it could very be, I do want to point out that this is screaming faulty hardware to me. Next time you get the Task Manager open, Go check out the resource monitor. Here is a simple guide to using the resource monitor.

http://www.pcworld.com/article/241677/how_to_use_resource_monitor.html

Open up task manager and go to the Performance tab. At the bottom is a button for the resource monitor. Once its open, check out the Disk Tab at the top and look and see how long requests are taking. Looking at my computer and the computer image found on that site, I'm going to guess that for a non SSD drive, sub 100 millisecond response times seem to be what you are looking for. If the computer has more than 1 second response times for everything, your computer is going to be slow no matter HOW you boot it. Comment back on here and let us know if the disk response time is slow. If it is, you can try to run a Check disk on the drive and wait forever for it to finish and see if that fixes the problem.

Remember that this may not be the problem, but if it is, then reinstalling windows or running a virus scan won't fix the problem.

Bob

Posted 2012-11-26T22:04:22.513

Reputation: 403

2Thats assuming he can open it. His computer does seem too slow for... anything from what he reports, and he'd have to wait a week or two when he answers. – Journeyman Geek – 2012-11-27T10:51:43.367

4A good indicator within Resource Monitor is the Disk Queue depth -if this is consistently high then the hard drive is being thrashed (ie bus speed 'bottleneck'). This will cause slowdowns without impacting the RAM or CPU usage much (check it during a virus scan on a good PC) . – HaydnWVN – 2012-11-27T11:10:32.063

1This may be easier to check in a Live CD since the current install is so slow. I'm not sure which program you would run though. – Brendan Long – 2012-11-27T19:00:32.380

These are all good points. I mentioned using the Resource monitor because he said that he was able to get the Task Manager open, so I was just assuming that he could get the Resource Monitor also. – Bob – 2012-11-27T19:08:24.513

30

To add my ideas to the mix...

Try taking the offending hard drive out and plugging it in to an external caddy, then plug this in to a working PC. You can then check the disk, run anti-virus/malware checks, defrag, etc.

Also, salvage what you can of the files you need (taking care not to copy anything that could potentially infect another PC. Obviously, make sure that the host PC has got good protection before doing this.

If after placing the hard-drive back and it still runs poorly then I'd consider reinstalling Windows. The time taken to try to solve any other issues will not be worth it.

Lee Taylor

Posted 2012-11-26T22:04:22.513

Reputation: 1 259

7This has done me well before, I would amend it to suggest using a Linux live disc and run scans throughout the process across the data. Using the live disc, you could just do it all on the infected device. – nerdwaller – 2012-11-27T05:07:44.580

1Why isn't this the best answer here? It clearly wins against the approach of a plain reinstallation. – stefan – 2012-11-27T14:05:45.037

1Because the approach would be to save your documents and photos, then re-install. – WindowsEscapist – 2012-11-27T18:36:00.523

3This is dangerous because the drive could easily infect the new computer. It's much better to boot from a Linux Live CD and save things off that way, then nuke it and re-install. – Omnifarious – 2012-11-28T00:16:04.140

12

If you can boot into safe mode I would do that.

  • Malwarebytes antimalware is an excellent free program as mentioned above and they have just released an Antirootkit program as well although in beta release

  • I am also a fan of DR Web Cureit Free Antivirus (on demand scanner)

  • Hiren's Boot CD is probably one of the most comprehensive boot malware CDs available

  • It could be the case that your computer is severely fragmented and may need defragmenting in which case I recommend Ultradefrag Free Edition

  • Ccleaner to clean out all the rubbish on your system

All the above wont cost you a penny either.

There is an excellent article written recently on November 6th 2012 by Whinston Gordon for Lifehacker which I think would be beneficial to all, entitled "The Assumptions You Make About Your Slow PC (and Why They're Probably Wrong)". Hope you find it an interesting read !

Simon

Posted 2012-11-26T22:04:22.513

Reputation: 4 193

6The OP states that Safe Mode is still as slow as normal so this wouldn't really help. – ChrisF – 2012-11-26T22:49:35.357

Boot CDs like Hiren's Boot CD won't boot from windows, so the speed of safe mode isn't relevant to that option. – Zoot – 2012-11-27T21:06:20.617

11

Download and boot any linux live distro to check if the machine is somehow handicapped (faulty RAM, bad hard drive, ...) or it's just too-old-windows installation (maybe virus attack). In case of virus attack you can download http://free.drweb.com/ bootable live cd with virus scanner to be sure that your PC is clean. The free drweb scanner us updated several times per day so it is able to detect and cure even newest malicious code.

andrej

Posted 2012-11-26T22:04:22.513

Reputation: 422

8

The best tool I have used is Malwarebytes. I used it when I worked in IT a few years ago. Additionally, Kaspersky is good as is AVG (as suggested above), or a combination of all.

Another great option, that includes the live Malwarebytes image, is Hiren's BootCD (direct link to download).

nerdwaller

Posted 2012-11-26T22:04:22.513

Reputation: 13 366

And how exactly are they supposed to install, let alone run it if it takes >45 minutes just to boot? – Synetech – 2012-11-27T03:18:03.680

1Live disc. There is a standalone or one on Hiren's BootCD. – nerdwaller – 2012-11-27T03:34:30.993

2

You should have said that before; now it’s too late.

– Synetech – 2012-11-27T03:52:35.347

1Hence why I added it to help. – nerdwaller – 2012-11-27T04:13:51.757

@nerdwaller - a year or so ago I had a client with a similar problem (some stupid "Optimize your PC" malware got in and brought the PC to it's knees). The PC had a fully up-to-date version of Norton A/V. Norton did nothing to protect the PC, and nothing to fix it. MalwareBytes, however, worked like a charm. Malwarebytes is definitely a good recommendation! – paulsm4 – 2012-11-28T05:34:35.700

1

@paulsm4 In my experience, 90% of the AV suites miss nearly all of the infections (outside the stupid Tracking Cookies, which are harmless when you realize how people use Facebook to login everywhere). Sadly, the pay-for ones are the worst offenders... Amazing! On the rare occasion I run Windows - it's MSE for me.

– nerdwaller – 2012-11-28T05:58:04.517

8

At the end of the day, I still think that @hair of the dog's answer is probably the 'best' solution.

On the other hand, leaving a problem as it is, is probably not the way to do things.

This is really a condensed version of some of the previous answers, with a few more observations.

In my experience harddrives are a big reason for computers to slow down. They're quirky devices with many failure and error modes. There's other reasons worth looking at too

Booting into a generic linux live cd is pretty useful in this case. There's two things you want to do when looking into possible drive problems. Firstly you want to ask the drive if its ok - smartmontools (or its graphical front end, gsmartcontrol) is pretty good here. You want generally 'healthy' results. While you're at it, you may also want to run hdparm -Tt /dev/sdXx a few times to get a benchmark result of the disk speed. Run the same command on a healthy and similar enough disk to see if its really slower.

I'd also suggest doing file level recovery at this point. A drive that was uncleanly mounted won't mount automatically in linux - you will need to do a mount -f /dev/SDXx /mount/point to force it to mount. If the disk is obviously damaged according to smartmontools, use a recovery centric DD varient to do a backup - Gnu ddrescue is a good bet. This will create an image skipping bad sectors

Assuming the disk is ok, it gets tricky. You could probably run an offline AV scan to try to clean it up, then pop it into another system in order to do some maintainance.

You can also mount the registry hive of another windows system to edit startup entries manually (great time to do a virus check from a windows system, and a defrag) or use the registry editor from the offline password changer disk assuming you know what you're looking for.

If we're doing recovery/repair related activities using windows tools - you might want to consider building a PE disk (bartpe if you don't mind a XP based live disk), or using a seperate, 'disposable' install for these tasks to reduce the risk of malware cross contamination.

At this point you SHOULD have worked out if the disk is slow, whether its malware, and if you think its worth your time fixing it. You should have also gotten your data out. If its malware, and the offline scans and regedits failed, you can run shred from the livecd to wipe the disk. If its hardware failure, you can restore from that dd backup. If its none of the above, things get interesting

Journeyman Geek

Posted 2012-11-26T22:04:22.513

Reputation: 119 122

5

Hiren is your friend.

http://www.hirensbootcd.org/download/

Download it, burn it, boot it from the slow computer.

There's a series of tools there, to check for errors including Hard Drive, CPU, Memory, etc.

Run a couple of those to see what you find.

It also has some security programs there to allow you to do an AV/Malware scan.

Highly recommended.

Luiz Angelo

Posted 2012-11-26T22:04:22.513

Reputation: 1 297

2

Have you checked your hard drives? Maybe it has some bad sectors, causing a long delay whenever certain files are accessed. Try running chkdsk /r in Safe Mode (or use other disk repair tool).

yinch3ng

Posted 2012-11-26T22:04:22.513

Reputation: 19

1

Reinstalling is recommended. However, if there is data on the device you cannot afford to lose, then you might want to try out Microsoft Defender Offline.

Basically it allows you to bypass the operating system and then you can perform a scan of the harddrive. Make sure to download a fresh copy so that you have recent antivirus definitions.

If the PC is still slow after that, you can try booting with a Linux CD/USB to copy your data and then reinstalling Windows. But make sure to scan the backup harddrive on another (protected) machine before copying it back to the old machine.

codinguser

Posted 2012-11-26T22:04:22.513

Reputation: 196

1

At least this malware slows down the PC in an environmentally friendly way and doesn't max the CPU!

The short answer to the original question is to reinstall as previously mentioned. These days though, malware authors know most people simply reinstall instead of attempting removal, so most only take countermeasures against automated tools and not a knowledgeable person at the terminal. So if a reinstall is not desirable and you don't mind wasting a couple of hours (or more), it is usually not too hard to remove most malware.

However you need to be familiar with the command prompt, and be able to distinguish malware from legitimate software. There is no substitute for experience here, but I've found the approach below to be effective.

Firstly prep the environment:

  1. From another clean PC, download a copy of the Sysinternals suite, and copy it to a USB stick (or to the PC's hard drive directly if possible).
  2. Rename two of the utilities, procexp.exe and autoruns.exe to random file names (but make a note so you can recognise them!)
  3. Disconnect any network connections.
  4. Boot the computer in safe mode, get to the desktop. Safe mode is not essential, but it helps as there will be less running processes to wade through and malware should stand out more easily. Using a clean user profile can also help for the same reason, but this can obscure the infection from you as there are probably entries in the user's registry.
  5. Open up a command prompt as administrator and run taskkill /F /IM explorer.exe to kill explorer. This stops a fair amount of malware in its tracks, making removal easier. If you're prevented from running the command prompt, a renamed copy from another PC can be effective (sometimes you can get away with simply making a copy on the same machine).
  6. From the command prompt launch procexp and autoruns via the renamed executables. Note that it's possible malware could detect the hashes or other characteristics and prevent you from launching these tools, but hashing at least wouldn't be a reliable approach as they're updated fairly frequently. Usually any countermeasures against these tools look for the file name.

From here you can use autoruns and procexp to remove the malware, but it's as much art as science. Procexp shows you what's currently running, and autoruns shows you how it launched. Patterns to look for are:

  • Filenames that look randomly generated
  • Sofware running from temporary directories
  • Software running in the user's profile. With Vista and later versions, running software from the profile has become more common to avoid elevation prompts, but most legitimate software will still install to Program Files. Given that this one clearly has root access you're going to be hunting for it in system directories, but there could be a watcher in there and usually the infection originates from somewhere in the user profile (Downloads, temporary internet files).
  • Recently modified files in C:\Windows and System32
  • Names that are close to legitimate windows binaries such as cmd.exe, services.exe (or the same filenames but in the wrong location). I have seen cnd.exe, service.exe. explore.exe in my time.
  • Rundll32.exe entries. Many are legitimate but inspect the processes to see which DLLs are loaded.

Removal tips:

  • It can be helpful to simply gather information before attempting to kill processes and delete entries - this gives you a more holistic overview, and taking multiple steps in quick succession is going to be more effective than doing things in isolation, as watcher processes can very quickly take you back to step 1.
  • For anything obvious use procexp's kill and delete function. If this fails, sometimes using echo > "c:\path\to\malware.exe" on the command prompt to blank it's file followed by kill and delete can work.
  • Use autoruns to find where it's hooked in. I use this tool because it seems to be complete, short of a rootkit or modifying system executables there aren't many other ways for malware to launch, if any. To save yourself time use the "Hide Microsoft entries" option, which is disabled by default.
  • If you find a hook in autoruns that loads a DLL with every exe, your running processes (including your detection tools) are going to be keeping the malware alive. In this case you need to blank the offending DLL with echo as above, kill and relaunch all your software (should result in a DLL error every time you run a program), then reboot. But make sure you've removed any other hooks first.
  • There may be a watcher process which looks for modifications to the malware and restores it. If this is the case you may have to perform multiple actions simultaneously, and the only reliable way to do this is to use a batch script. But depending on the check interval it can be enough to perform the steps quickly in sequence.
  • If you can't find anything and it turns out to be a rootkit, finding and removing it becomes much harder - you need tools that bypass the higher level windows apis. This is probably a bit beyond the scope of what can be covered in a Superuser answer, but using RootkitRevealer followed by a linux boot cd to delete the actual files can be effective (remember to rename the exe).
  • If you need to reboot before you're confident of complete removal, cutting the power instead of doing an orderly reboot removes one more opportunity for reinfection. Just make sure you've backed up their data first.

Given that this particular malware demands money to fix your computer and slows it down, the DLL load approach is likely. It probably doesn't modify system files or install a rootkit, as this carries a greater risk of breaking the system entirely. So you should be able to remove it using the general approach above, but if you miss just one hook you're likely to be back to square one on next boot.

If this sounds like a lot of effort, it is. Reinstalling is usually easier, and you can never fully trust a computer again once it's had malware on it. But personally I find it kind of fun - it's you vs the malware writer, and you have the clear advantage of being the human at the console!

Alex Forbes

Posted 2012-11-26T22:04:22.513

Reputation: 978

0

You could have a look at Windows Defender Offline, it scans for malware and give you the option to fix.

deveneyi

Posted 2012-11-26T22:04:22.513

Reputation: 1 254

1This is clearly not a viable solution on a machine running this slow. How would you even get it open? This guy needs a way to fix it from OUTSIDE the broken environment, whatever that is. Something that has to be installed and run inside the current windows installation is not what this question is about. – Caleb – 2012-11-27T13:43:35.550

1Which is what it does. It is OFFLINE, boot a CD or USB drive with the it installed to scan the not running system for malware (it's detailed on the link i posted) – deveneyi – 2012-11-27T13:48:56.087

@Caleb: I don't see what's wrong with this answer. – user541686 – 2012-11-27T21:36:43.280

0

To simplify, you either have a problem with the hardware, a problem with the software, or both.

Figure out if your computer has boot from CD or boot from USB enabled, and the steps to boot from external media if it's disabled by default. A quick Google search often speeds this process along.

Use a live cd like the Ultimate Boot CD to check the RAM and hard drive for errors. Test the RAM with Memtest86+, and use your hard drive manufacturer's test suite, such as DLG for WD hard drives. This will rule out most problems with memory and hard drive issues. You could also check system temperatures if you wanted to rule out thermal issues.

Next, run a Linux live CD or boot a Linux distribution from USB. If this exhibits no problems and runs much faster than the installed system without any stability issues, it's boot and nuke time. Transfer any "can't lose" items from the hard drive to some sort of external media at this point. You'll want to scan these files for malware before you get them anywhere near a clean PC. It's preferable to scan these in some sort of live environment.

If you hadn't already tried the restore partition, you could choose to perform a "destructive restore" from here, but I don't have a lot of faith in restore partitions, as they can be infected by malware just like the normal partitions. This is where being a Linux user is nice, because you don't have to sweat about license keys and install media.

If your mind is set with staying in Windows, here are your steps:

Locate a system restore disc or a legitimate version of the operating system that you wish to install. Verify that it is a "full" version, and is not an "upgrade" version that requires a previous version of the OS present in order to install. Make sure you have the license key and input it correctly. Be prepared to call the manufacturer if the restore doesn't work right, or Microsoft if the OS install goes wrong.

Take the previously mentioned "Ultimate Boot CD" and run Darik's Boot and Nuke. It will take a while to erase the drive. Since you plan on reinstalling, you can use one of the quicker format modes. A "quick erase" or "DoD short" should do the trick.

Install the operating system from scratch on the (now blank) hard drive.

If necessary, transfer the old files that have been scanned multiple times for viruses back to the fresh operating system install. Enjoy the process of installing software and system updates.

Curse yourself for not having a more recent backup or implementing a system image backup routine. Vow to be better at it, and hope that there won't be a next time. There probably WILL be a next time.

Zoot

Posted 2012-11-26T22:04:22.513

Reputation: 435

-1

The proper solution is to nuke it and re-install windows. If that simply isn't a solution, the only other proper solution is to use a live cd/usb linux setup to run anti-virus software packages from outside your windows installation.

I've looked through the given answers and am surprised to see that Trinity Rescue Kit has yet to be mentioned!

This software suite is my goto solution when I'm trying to remove malware/viruses/rootkits from an infected computer. It has 3-4 different software solutions that will go out to the net and fetch its latest definitions before it starts its scanning/cleaning process.

g19fanatic

Posted 2012-11-26T22:04:22.513

Reputation: 1 251