My Threat Removal Process

Gnosis

Level 5
Thread author
Apr 26, 2011
2,779
For what it is worth, I like to first scan with HitMan Pro. If it finds something ugly, I then use HijackThis and check every box and click fix (I can do that because I always make sure any non-threatening line items are marked as safe so when I do get an infection I can check all boxes without fear--restore points and backups intact).

After those two steps I go to safe mode with networking and update MBAM, SAS, Dr. Web, and Avira. I scan with their on- demand scanners and remove any threats.

Then I reboot and run TDSS Killer and Norton Power Eraser with its rootkit scan.

I finish up with GMER. Then I utilize SpyDll Remover or Process Hacker 2 to make sure there are no unusual processes running.


You might ask, "Why doesn't that lunatic scan with GMER right out of the gate?". The simple answer is that I want rapid intelligence pertinent to the most serious threat to my system, followed by a quick disable of some of its activities, and then retreat to a safe haven in SAFE MODE to start hammering on the pest(s).

It sounds like a lot, but the Safe Mode operations are the only slow part of the process.

By the way, sometimes I like to use the AutoRuns EVERYTHING tab to complement Process Hacker 2 and SpyDll Remover.

If I have a BROKEN ARROW, I call it in to the appropriate techs so we can break out ComboFix together. Hooyah!!!

Note: I am in no way criticizing the MRGW, as it is much more thorough than my method would be for the typical user. I think MRGW is fine and gracefully evolving. I just wanted to share.
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
That process will performed when a highly infected occurs then surely no more traces/malware will be exist.
 

Gnosis

Level 5
Thread author
Apr 26, 2011
2,779
Well, thanks for your approval, but I admit that it may not be for everyone. It is just a routine that I have used many times and I am comfortable with it. I guess the crucial aspect must be that you do not damage your system more than the malware does when you attempt to remove said malware. Preferably, you do not damage your system at all. LOL
 

moonshine

Level 7
Verified
Apr 19, 2011
1,264
I usually use my SARDU bootable disc immediately even though its I should use MBAM,SAS and HMP first :p, I tried it on one of our school's heavily infected PCs and the PC was usable again after running Kaspersky Rescue CD, DrWeb LiveCD and Avira Rescue System, :D
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Actually in case the computer cannot boot up due to the infection a bootable CD is a way to go.
 

moonshine

Level 7
Verified
Apr 19, 2011
1,264
A Bootable disc is always the way to go because malware won't be able to interfere with the scans,
 

Ink

Administrator
Verified
Staff Member
Well-known
Jan 8, 2011
22,442
Don't forget netbooks and some laptops do not have a CD/DVD drive.
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Yes agree stormgtr. if you have money you can buy an external CD/DVD and plug into laptop but if not a usb can use it for bootable.
 

Gnosis

Level 5
Thread author
Apr 26, 2011
2,779
Point definitely taken on bootable scanning with a USB stick or CD. That is the way to go. I am a little behind the times with respect to that. I need to get up to date.
 

212eta

Level 9
Verified
Well-known
May 11, 2011
444
I use the following Tools:
-Avira Rescue CD, F-Secure Rescue CD, and Dr.Web Live CD/Dr.Web LiveUSB.
-MBAM, SAS, Hitman Pro, and ComboFix.
-GMER, Kaspersky TDSSKiller, UnHackMe, and Teazer Rootkit Razor.
-Avast MBR Scanner, MBR rootkit detector, and MBRCheck.
 

Gnosis

Level 5
Thread author
Apr 26, 2011
2,779
Updated: For my final step (BROKEN ARROW), replace ComboFix with Bootable Kaspersky Rescue on Sardu, etc., where applicable.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top