Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

how to remove IDP.Program.D1B0A5C0 virus

Posted on 2014-11-12
6
540 Views
Last Modified: 2014-11-16
This looks to be a bad virus (IDP.Program.D1B0A5C0) on a W7 laptop.  I haven't been able to find any good "easy" way to remove it.  Most tools do not do a good job of completely removing it.  Any thoughts?
0
Comment
Question by:tonyadam
6 Comments
 
LVL 37

Expert Comment

by:Neil Russell
ID: 40438682
format c:

The only safe way to end up with a stable fully functional computer system after a virus infection of this type is to format your drive and start again.
Removal of the actual infection is one thing but the correcting of the problems that they cause that are deep rooted in the OS, registry, corrupt data etc are another.
If this is a business computer then consider the cost in your time and your users time in spending days trying to A) Remove the virus and B) correct all the problems afterwards.
0
 
LVL 80

Expert Comment

by:David Johnson, CD, MVP
ID: 40438791
This one is a bear to remove.. Manual removal is the only way
follow this guide http://virusremovalguideline.blogspot.ca/2014/06/idpprogramd1b0a5c0-affection-what-is-it.html
0
 
LVL 70

Expert Comment

by:garycase
ID: 40440381
First, the BEST way to remove this is to simply revert your system to an image taken prior to infection.    But of course if you don't have an image, that's not an alternative.

Second, it CAN be removed automatically, but the only time I've done that, I did it by removing the drive from the infected system; attaching it to another system; and then running a full scan on the drive with Malwarebytes, which found the virus and wanted to "quarantine" the associated files -- I changed that to "delete"; then rebooted and ran another full scan against the drive to confirm it was clean ... then reinstalled it in the original system and all was well.

Doing it like this ensures that there are no active processes from the malware that are monitoring and interfering with removal efforts ... something that's often the case with very persistent "bad boys" :-)
0
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

 
LVL 37

Expert Comment

by:Neil Russell
ID: 40440692
The Wrong way to remove a virus is to mount it in another system.  The likes of MalwareBytes are spefically designed to and will function best when used as designed. In a full windows boot, not safe mode and not in as a slave disk.
0
 
LVL 70

Accepted Solution

by:
garycase earned 500 total points
ID: 40441614
Actually, Malwarebytes, MSE, Norton, McAfee, etc. work just fine scanning a slave disk -- it's no different than scanning a 2nd, 3rd, 4th, etc. disk in your system.    And it completely eliminates any possibility that the infection can inhibit the scanner, which is often the case when a system is infected.

There are MANY infections you can eliminate by scanning in a different system that will NOT be removed if you try to run the scanner in the infected system.
0
 

Author Closing Comment

by:tonyadam
ID: 40446334
I elected to remove the drive from the system, attach it to a clean system and run Malwarebytes and a virus program against the drive with the virus. Malwarebytes found 4 additional issues and those were removed.  I reinstalled the drive natively into the laptop, ran Malwarebytes again as well as AVG and all seems well.
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Share and Advanced Sharing permissions 8 119
svg file 10 104
Lenovo Helix Laptop: Bitlocker appears to be preventing boot 7 101
Gpora virus - GPO  lockdown on RDS/TS server 6 26
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question