
Full & Complete Windows PC Clean-up Guide
Overview
This guide provides a systematic approach to cleaning, securing, and optimizing a Windows PC using both built-in tools and trusted third-party utilities. Follow these steps in order for best results.
Prerequisites
- Administrator access to the Windows PC
- Stable internet connection for downloads and updates
- Create System Restore Point before beginning
Phase 1: Initial Assessment & Software Management
Step 1: Uninstall Obvious Bloatware
Target Programs for Removal:
- "Free Trial" software that's expired or unwanted
- Obvious junk programs and toolbars:
- One Search, Driver Support, One Bar
- PC optimization "scareware"
- Fake antivirus programs
- Browser hijackers and toolbars
- Outdated or redundant software
Removal Process:
- Control Panel: Programs and Features
- Windows Settings: Apps & Features (Windows 10/11)
- Review Carefully: Research unfamiliar programs before removing
- Use Browser Hijack Reference: Consult reputable sources for malicious adware identification
Step 2: Install/Update Essential Programs
Use Ninite.com for Efficient Installation: Visit ninite.com to create a custom installer package for:
Essential Browsers (Update if installed):
- Chrome
- Firefox
- Microsoft Edge (built-in, check for updates)
Required Runtimes:
- Java Runtime Environment (latest version)
- Microsoft .NET Framework (latest version)
- Microsoft Visual C++ Redistributables
- Adobe Flash alternatives if needed
Security Tools:
- Malwarebytes Anti-Malware
- Malwarebytes ADWCleaner
- BleachBit
Phase 2: Security Scanning & Malware Removal
Step 1: Malicious Software Removal Tool (MRT) Scan
Running MRT Scan:
- Open Run Dialog: Press
Win + R
- Launch MRT: Type
mrt
and press Enter - Choose Full Scan: Select comprehensive scan option
- Start Scan: Click "Next" and let the scan complete
- Review Results: Check summary and follow removal recommendations
- Restart if Required: Reboot the system if prompted
Step 2: Windows Defender Full System Scan
Performing FULL Scan (Not Quick Scan):
- Open Windows Security: Press
Win + I
→ Update & Security → Windows Security - Virus Protection: Click "Virus & threat protection"
- Scan Options: Click "Scan options" under Quick scan button
- Select Full Scan: Choose "Full scan" radio button
- Start Scan: Click "Scan now"
- Wait for Completion: Full scan may take 1-3 hours
- Address Threats: Follow Defender's removal recommendations
Step 3: Malwarebytes Anti-Malware (MBAM) FULL Scan
Installation and Setup:
- Download: Visit malwarebytes.com
- Install: Run installer with administrator privileges
- Update Definitions: Allow MBAM to download latest signatures
Running FULL MBAM Scan with Rootkit Detection:
- Launch MBAM: Open from desktop shortcut
- Scan Settings:
- Click "Scan" tab
- Select "Threat Scan" or "Custom Scan"
- Enable Rootkit Scanning (Critical):
- Check "Scan for rootkits" checkbox
- This significantly increases scan time but improves detection
- Configure Custom Scan (if selected):
- Click "Configure Scan"
- Enable "Rootkit Detection"
- Select all drives for comprehensive coverage
- Start Full Scan: Click "Start Scan"
- Scan Duration:
- Standard scan: 15-45 minutes
- With rootkit scanning: 1-3 hours
- Quarantine All Threats:
- Review detected items carefully
- Click "Quarantine" to remove threats
- Restart when prompted (required after rootkit removal)
Step 4: ADWCleaner for Adware and Browser Hijack Removal
Running ADWCleaner:
- Download: Get from malwarebytes.com/adwcleaner
- Run as Administrator: Right-click and select "Run as administrator"
- Accept License: Agree to terms of use
- Start Scan: Click "Scan Now"
- Wait for Completion: Scan typically takes 5-15 minutes
- Review Results: Examine detected adware and PUPs
- Clean & Repair: Click "Clean & Repair" to remove all detected items
- Restart System: Reboot when prompted to complete removal
Step 5: Rootkit Check for Heavily Infected Systems
When to Use TDSKiller:
- System shows signs of heavy infection
- Multiple security tools detect persistent threats
- System behaves erratically despite previous cleaning attempts
TDSKiller Usage:
- Download: Get TDSKiller from Kaspersky Rescue Disk
- Run as Administrator: Launch with full privileges
- Scan: Perform full rootkit scan before other cleaning procedures
- Remove Threats: Follow removal recommendations
- Restart: Reboot system before continuing with main cleanup
Phase 3: Browser Cleanup & Optimization
Comprehensive Web Browser Cleanup
For Each Installed Browser (Chrome, Firefox, Edge):
1) Check Extensions/Add-ons:
- Chrome: Menu → More Tools → Extensions
- Firefox: Menu → Add-ons and Themes
- Edge: Menu → Extensions
- Remove Suspicious Items:
- Unknown or unrecognized extensions
- Toolbars and search helpers
- Extensions from untrusted developers
- Anything installed without your knowledge
2) Check Browser Settings:
- Homepage Settings: Verify startup page hasn't been hijacked
- Default Search Engine: Ensure it's your preferred choice
- New Tab Page: Check for unwanted modifications
- Download Settings: Verify download location is secure
3) Reset if Necessary:
- Chrome: Settings → Reset and Clean Up → Restore settings to original defaults
- Firefox: Help → Troubleshooting Information → Refresh Firefox
- Edge: Settings → Reset Settings → Restore settings to default values
4) Additional Browser Security:
- Clear browsing data (cache, cookies, history)
- Update to latest version
- Enable automatic security updates
- Review and update saved passwords
Phase 4: System Cleanup and Optimization
Step 1: BleachBit Junk File Cleanup
Installation:
- Download: Visit bleachbit.org
- Install: Run installer as administrator
- Runtime Requirements: Install Visual C++ 2010 Redistributables if needed
BleachBit Configuration (Specific Settings):
- Launch as Administrator: Essential for system-wide cleaning
- Enable These Cleaning Options:
- System → Temporary files
- System → Recycle bin
- System → Prefetch
- Web Browsers → Cache (for all installed browsers)
- Windows Defender → Quarantine files
- Windows Defender → Log files
- Windows Explorer → Thumbnails
- System → Memory dump files
Running Cleanup:
- Preview First: Click "Preview" to see what will be cleaned
- Review List: Examine files to be deleted
- Execute Cleanup: Click "Clean" to proceed
- Monitor Progress: Watch cleanup process complete
Step 2: Paging File Optimization
Setting Virtual Memory:
- Access Settings: Settings → System → About → Advanced System Settings
- Performance Settings: Advanced tab → Performance section → Click "Settings"
- Virtual Memory: Advanced tab → Virtual Memory section → Click "Change"
- Configure Paging File:
- Uncheck "Automatically manage paging file size"
- Select "Custom size"
- Set Initial and Maximum Size:
- Option 1: 1.5 times your RAM amount (e.g., 16GB RAM = 24GB paging file)
- Option 2: Set to 4096MB (4GB) for most systems
- Apply Changes: Click "Set" → "OK" → "Apply"
- Restart Required: Reboot to apply changes
Step 3: System Performance Optimization
Visual Effects Optimization:
- Access Performance Options: Right-click "This PC" → Properties → Advanced System Settings → Advanced tab → Performance Settings
- Custom Settings: Select "Custom"
- Enable Only These Visual Effects:
- ✅ "Use visual styles on windows and buttons"
- ✅ "Smooth scroll list boxes"
- ✅ "Smooth edges of screen fonts"
- ✅ "Show translucent selection rectangle"
- ✅ "Use drop shadows for icon labels on the desktop"
- Disable All Others: Uncheck remaining options for better performance
- Apply Settings: Click "Apply" → "OK"
Startup Program Management:
- Open Task Manager: Press
Ctrl + Shift + Esc
- Startup Tab: Click "Startup" tab
- Review Startup Items: Examine all programs
- Keep Essential Programs:
- OneDrive/Microsoft Office applications
- iCloud Drive (if using Apple devices)
- Printer software
- Wi-Fi management software
- Audio/Video drivers and software
- Specialty applications (Garmin, Fitbit, etc.)
- Antivirus software
- Disable Unnecessary Items:
- Gaming software (unless frequently used)
- Update checkers for non-critical software
- Bloatware and trial software
- Unknown or suspicious programs
Phase 5: System Analysis &Advanced Security
Step 1: Autoruns Analysis with VirusTotal
Download and Setup:
- Download: Get Autoruns from Microsoft Sysinternals
- Extract and Run: Launch autoruns.exe as administrator
VirusTotal Integration:
- Enable Scanning: Options → Scan Options → Check "Check VirusTotal.com"
- Submit Unknown: Optionally enable "Submit unknown executables"
- Accept Terms: Agree to VirusTotal terms of service
Analysis Process:
- Wait for Results: Allow VirusTotal scanning to complete
- Review Color Coding:
- Red/Pink: High risk detections
- Yellow: Medium risk or unsigned files
- Green: Clean files
- Focus on Key Areas:
- Logon tab: Startup programs
- Services tab: System services
- Network Providers: Network-related startup items
- Investigate Suspicious Items: Research unknown or unsigned executables
Step 2: Process Explorer Monitoring
Setup and Configuration:
- Download: Get Process Explorer from Microsoft Sysinternals
- Run as Administrator: Launch procexp.exe with admin privileges
- Enable VirusTotal: Options → VirusTotal.com → Check "Check VirusTotal.com"
Active Monitoring:
- Real-time Process Analysis: Monitor running processes
- VirusTotal Checks: Right-click processes → "Check VirusTotal.com"
- Investigate Anomalies:
- High CPU usage from unknown processes
- Processes in unusual locations
- Network activity from unexpected programs
- Unsigned executables with suspicious behavior
Phase 6: Windows Updates & Final Optimizations
Step 1: Complete Windows Updates
Update Process:
- Access Windows Updates: Settings → Update & Security → Windows Update
- Enable Microsoft Updates:
- Click "Advanced options"
- Enable "Receive updates for other Microsoft products"
- Enable "Show a notification when your PC requires a restart"
- Check for Updates: Click "Check for updates"
- Install All Updates:
- Download and install all available updates
- May require multiple update/restart cycles
- Some updates may fail initially but resolve in subsequent cycles
- Verify Completion: Ensure all current updates and upgrades are installed
Update Best Practices:
- Allow automatic restarts during maintenance hours
- Don't obsess over failed updates - they often resolve themselves
- Prioritize security updates and cumulative updates
- Keep checking until no new updates are available
Step 2: System File Integrity Check
Running System File Checker:
- Open Command Prompt: Run as administrator
- SFC Scan: Type
sfc /scannow
and press Enter - DISM Check: If SFC finds issues, run
DISM /Online /Cleanup-Image /RestoreHealth
- Review Results: Address any system file corruption found
Phase 7: Final Cleanup & Maintenance Setup
Step 1: Final Disk Cleanup
Windows Disk Cleanup:
- Run Disk Cleanup: Type
cleanmgr
in Run dialog - System Files: Click "Clean up system files"
- Select Categories:
- Windows Update Cleanup
- System error memory dump files
- Temporary files
- Downloaded Program Files
- Execute Cleanup: Proceed with deletion
Step 2: Performance Verification
System Check:
- Boot Time: Verify faster startup
- Application Loading: Check improved response times
- Available Storage: Confirm freed disk space
- Task Manager: Review CPU and memory usage
- Network Performance: Ensure stable connections
Ongoing Maintenance Schedule
Weekly Tasks
- Windows Defender quick scan
- Empty Recycle Bin
- Check Windows Updates
- MBAM threat scan (without rootkit scanning for speed)
- Review running processes in Task Manager
Monthly Tasks
- Full antivirus scan (Defender + MBAM with rootkit scanning enabled)
- BleachBit comprehensive cleanup
- ADWCleaner scan
- Review and manage startup programs
- Browser maintenance and extension review
Quarterly Tasks
- Full system analysis with Autoruns
- Process Explorer security review
- System file integrity check (SFC scan)
- Paging file optimization review
- Performance settings verification
As-Needed Tasks
- Immediate rootkit scan if system behaves unexpectedly
- Browser reset if hijacking is suspected
- TDSKiller scan for persistent threats
- System restore if cleanup causes issues
Safety Guidelines and Best Practices
Before Starting Cleanup- Create System Restore Point: Control Panel → System → System Protection
- Backup Critical Data: Ensure important files are backed up
- Document System State: Note current performance issues
- Close Running Programs: Minimize interference during scans
During Cleanup Process
- Don't Rush: Take time to review scan results
- Research Unknown Items: When uncertain, investigate before removing
- Keep Detailed Notes: Document what you remove for future reference
- Monitor System Stability: Watch for unusual behavior during process
Red Flags to Investigate
- Processes running from temporary directories
- Unsigned executables with network activity
- Unexpected high CPU or memory usage
- Browser settings changing without permission
- Multiple security programs running simultaneously
- System performance degrading after cleanup
Troubleshooting Common Issues
False Positives:
- Research flagged items with multiple sources
- Check software vendor websites for verification
- Use multiple security tools for confirmation
- Restore from quarantine if legitimate software affected
System Instability:
- Boot to Safe Mode if necessary
- Use System Restore to previous checkpoint
- Check Windows Event Viewer for error details
- Reinstall accidentally removed legitimate software
Persistent Threats:
- Run TDSKiller for advanced rootkit removal
- Use Windows Defender Offline scan
- Consider professional malware removal services
- Factory reset as absolute last resort
Additional Security Recommendations
Browser Hardening
- Install reputable ad blockers (uBlock Origin)
- Enable automatic security updates
- Use secure DNS providers (Cloudflare, Quad9)
- Regularly review and clean saved passwords
- Enable two-factor authentication where available
System Security
- Keep all software updated automatically
- Use Windows Defender or reputable antivirus
- Enable Windows Firewall
- Regular security-focused maintenance scans
- Avoid suspicious downloads and email attachments
Performance Maintenance
- Monitor startup programs quarterly
- Clean temporary files monthly
- Defragment traditional hard drives (not SSDs)
- Monitor disk space usage
- Keep system drivers updated
This comprehensive guide combines reactive cleanup with proactive maintenance to ensure optimal system performance, security, and stability. Regular application of these procedures will keep Windows systems running efficiently and securely.
No comments:
Post a Comment