Advice Request Method to disinfect removable memories

Please provide comments and solutions that are helpful to the author of this topic.

Cast

Level 1
Thread author
Verified
Feb 13, 2018
45
5a356c8b3a8925.0415509615134506352398.png
I am creating this post so that we share the methods that are implemented to disinfect or show hidden files modified by viruses in removable usb memory.

1. From file explorer> view> show hidden files> scan with antivirus

2. Scan directly with antivirus

3. Adwcleaner to usb

4. Malwarebytes to usb

I would like to know what method they implement to make this type of scene.

Someone uses bat, or something like that. Thank you.
 

struppigel

Moderator
Verified
Staff Member
Well-known
Apr 9, 2020
656
Since you know you are dealing with malware, I'd recommend to either use a VM as already suggested or use a Live Linux, e.g., Puppy Linux, to access and scan the drive.
I would not risk putting this into a machine that is used for anything else than malware analysis. E.g. if you find a USB drive on the parking lot or similar, don't do this.

It's a different thing if your machine is already infected by the same malware and you are in the process of disinfecting everything.
In that case you clean the main machine first (otherwise it will just infect the USB drive again). Then you clean the infected USB flash drives. Inserting them while keeping SHIFT key pressed will suppress autorun.
Then you can scan with AV and, e.g., USBFix which is specialized on detecting and removing worms from removable media.
Since the machine was already infected by the same malware, you are not making things worse at that point if anything goes wrong.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top