My procedure..(changes everyday)
Virus Infection this includes mal/scare/bloat/ware. yadda, yadda.
Step 1:
Customer signature on work order next to where it says: BenchTech and/or it workers/contractors are not responsible for loss of data due to unforeseen circumstances due to hardware failure, malicious software infection, or human error. By signing below you agree to be bound to these terms.
Step 1a:
Customer signature on work order next to where it says: BenchTech and/or it workers/contractors are not responsible for programs when backing up/recovering data.
Step 2:
Pull customer hard drive and backup data, slave drive on linux box or windows box
Linux - Grab files and folders common and uncommon (docs, photos, music, email, favorites)
Windows - AutoFab 4 (nothing else unless customer has a specific request)
Step 3:
Put drive back in clients machine, boot into safe mode.
- run rkill
- Combofix
- GMER
- Remover.exe (rootkit detection and removal from cmd)
- TDSSKiller
Reboot into Normal Mode
- MBAM
- SAS portable
- Combofix (yep twice)
- Remover.exe
- MSE v2 (Microsoft Security Essentials XP & 7 only)
If anything exists at this point I start the manual removal process, If the manual process has not been documented I check bleepingcomputer forums
Virus Infection this includes mal/scare/bloat/ware. yadda, yadda.
Step 1:
Customer signature on work order next to where it says: BenchTech and/or it workers/contractors are not responsible for loss of data due to unforeseen circumstances due to hardware failure, malicious software infection, or human error. By signing below you agree to be bound to these terms.
Step 1a:
Customer signature on work order next to where it says: BenchTech and/or it workers/contractors are not responsible for programs when backing up/recovering data.
Step 2:
Pull customer hard drive and backup data, slave drive on linux box or windows box
Linux - Grab files and folders common and uncommon (docs, photos, music, email, favorites)
Windows - AutoFab 4 (nothing else unless customer has a specific request)
Step 3:
Put drive back in clients machine, boot into safe mode.
- run rkill
- Combofix
- GMER
- Remover.exe (rootkit detection and removal from cmd)
- TDSSKiller
Reboot into Normal Mode
- MBAM
- SAS portable
- Combofix (yep twice)
- Remover.exe
- MSE v2 (Microsoft Security Essentials XP & 7 only)
If anything exists at this point I start the manual removal process, If the manual process has not been documented I check bleepingcomputer forums