Solved

how to remove IDP.Program.D1B0A5C0 virus

Posted on 2014-11-12
6
542 Views
Last Modified: 2014-11-16
This looks to be a bad virus (IDP.Program.D1B0A5C0) on a W7 laptop.  I haven't been able to find any good "easy" way to remove it.  Most tools do not do a good job of completely removing it.  Any thoughts?
0
Comment
Question by:tonyadam
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 37

Expert Comment

by:Neil Russell
ID: 40438682
format c:

The only safe way to end up with a stable fully functional computer system after a virus infection of this type is to format your drive and start again.
Removal of the actual infection is one thing but the correcting of the problems that they cause that are deep rooted in the OS, registry, corrupt data etc are another.
If this is a business computer then consider the cost in your time and your users time in spending days trying to A) Remove the virus and B) correct all the problems afterwards.
0
 
LVL 80

Expert Comment

by:David Johnson, CD, MVP
ID: 40438791
This one is a bear to remove.. Manual removal is the only way
follow this guide http://virusremovalguideline.blogspot.ca/2014/06/idpprogramd1b0a5c0-affection-what-is-it.html
0
 
LVL 70

Expert Comment

by:garycase
ID: 40440381
First, the BEST way to remove this is to simply revert your system to an image taken prior to infection.    But of course if you don't have an image, that's not an alternative.

Second, it CAN be removed automatically, but the only time I've done that, I did it by removing the drive from the infected system; attaching it to another system; and then running a full scan on the drive with Malwarebytes, which found the virus and wanted to "quarantine" the associated files -- I changed that to "delete"; then rebooted and ran another full scan against the drive to confirm it was clean ... then reinstalled it in the original system and all was well.

Doing it like this ensures that there are no active processes from the malware that are monitoring and interfering with removal efforts ... something that's often the case with very persistent "bad boys" :-)
0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 37

Expert Comment

by:Neil Russell
ID: 40440692
The Wrong way to remove a virus is to mount it in another system.  The likes of MalwareBytes are spefically designed to and will function best when used as designed. In a full windows boot, not safe mode and not in as a slave disk.
0
 
LVL 70

Accepted Solution

by:
garycase earned 500 total points
ID: 40441614
Actually, Malwarebytes, MSE, Norton, McAfee, etc. work just fine scanning a slave disk -- it's no different than scanning a 2nd, 3rd, 4th, etc. disk in your system.    And it completely eliminates any possibility that the infection can inhibit the scanner, which is often the case when a system is infected.

There are MANY infections you can eliminate by scanning in a different system that will NOT be removed if you try to run the scanner in the infected system.
0
 

Author Closing Comment

by:tonyadam
ID: 40446334
I elected to remove the drive from the system, attach it to a clean system and run Malwarebytes and a virus program against the drive with the virus. Malwarebytes found 4 additional issues and those were removed.  I reinstalled the drive natively into the laptop, ran Malwarebytes again as well as AVG and all seems well.
0

Featured Post

Secure Your Active Directory - April 20, 2017

Active Directory plays a critical role in your company’s IT infrastructure and keeping it secure in today’s hacker-infested world is a must.
Microsoft published 300+ pages of guidance, but who has the time, money, and resources to implement? Register now to find an easier way.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question