Perfc.dat Virus Removal (Petya Ransomware)

Keep in mind, SpyHunter’s malware & virus scanner is free. To remove the infection, you'll need to purchase its full version. More information about SpyHunter and steps to uninstall.


How irritating is this virus?

This page aims to help you remove Perfc.dat Virus. Our removal instructions work for every version of Windows. This threat has been linked to the Petya Ransomware outbreak.

Trojans are among the nastiest threats one can encounter online and also easily the most common. These masters of disguise are capable of performing a wide variety of tasks, which makes them so invaluable to hackers even to this day. One of the latest variants of this type reported to us is better known as Perfc.dat Virus and is also likely the reason you’ve ended up on in this page. If you have discovered this virus on your computer, it is of utmost importance that you locate and remove it as soon as possible. The longer it remains in your system, the more damage it will probably cause. For the purpose of deleting Perfc.dat Virus we have assembled a detailed, step by step removal guide, which you will find on this page, below the following article. Please be sure to read through the article first before heading over to the guide, as the information presented here will provide you with a better idea of what it is you’re dealing with and what the Trojan may possibly have been up to all this time. It’s also important that you are well informed about the most common sources of infection, which we have also included here.

What Trojans are really capable of

Malware of the Trojan horse type is notorious for its ability to inflict harm in many a different way. You and any affected user would probably be dying to know what exactly it’s up to on your particular machine and that’s more than understandable. However, there’s no way for us to tell you what exactly the virus is after in your specific case, as it could literally be anything. We would like to outline the most common usages of Perfc.dat Virus and other viruses of this type, so you know roughly what to expect.

Perfc.dat Virus Removal


 

Step1

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

Step2

WARNING! READ CAREFULLY BEFORE PROCEEDING!

We get asked this a lot, so we are putting it here: Removing parasite manually may take hours and damage your system in the process. If you want a fast safe solution, we recommend SpyHunter. 

>> Click to Download Spyhunter. If you don't want this software, continue with the guide below.

Keep in mind, SpyHunter’s malware & virus scanner is free. To remove the infection, you'll need to purchase its full version. More information about SpyHunter and steps to uninstall.

Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 

malware-start-taskbar

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at: https://howtoremove.guide/online-virus-scanner/




Scan Results


Virus Scanner Result
ClamAV
AVG AV
Maldet

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 

Step3

Hold together the Start Key and R. Type appwiz.cpl –> OK.

appwiz

You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:

virus-removal1

Step4

Type msconfig in the search field and hit enter. A window will pop-up:

msconfig_opt

Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

  • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.

Step5

WARNING!
To remove parasite, you may have to meddle with system files and registries. Making a mistake and deleting the wrong thing may damage your system.
Avoid this by using SpyHunter - a professional Parasite removal tool.

Keep in mind, SpyHunter’s malware & virus scanner is free. To remove the infection, you'll need to purchase its full version. More information about SpyHunter and steps to uninstall.

Type Regedit in the windows search field and press Enter.

Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

If the guide didn’t help you, download the anti-virus program we recommended or ask us in the comments for guidance!

  • Theft. This is perhaps the most widespread usage of Trojans, as they can silently infiltrate your system and just as silently steal valuable information from it. For example, the hackers behind it can record your keystrokes to get hold of online banking credentials, login details for social media and various other accounts, etc. Professional information that could be very sensitive could potentially also be the target.
  • Destruction. Perfc.dat Virus could be used to simply destroy certain valuable or potentially harmful to others information on your PC. As a matter of fact, the virus could be designed to format your disks and drives, thus wiping them clean of any and all data. Alternatively, your computer could be rendered completely useless and you’d be forced to buy a new one. It’s not likely that this is the case, since you’ve had time to discover the malware, but in case it’s just a ticking time bomb – you’d best hurry.
  • Spying. This is also fairly common and can be used for numerous different reasons. Maybe you’ve become the victim of a stalker, who’s trying to watch you as closely as possible, or someone, who intends to rob your home or harm you. This can be achieved by means of hacking your webcam and tapping into your mic, for example. That way the criminal on the other side will both see and hear you and you won’t even have a clue.
  • Botnets. Your computer could be engaged in a network of bots for the purpose of spreading spam, other viruses or even mining cryptocurrencies, such as Bitcoins. Over 15% of all computers are involved in botnets – let that sink in.
  • Backdoor viruses. Perfc.dat Virus could potentially have been used to sneak some other malicious program inside your computer. Most often these are ransomware viruses – something you do not want to deal with.

These are only very few of the things Trojans are actually capable of. Once you’ve removed Perfc.dat Virus from your computer, be sure to take all the necessary precautions so you don’t contract another one like it anytime soon. Be sure to always have a functional antivirus program running and runs system scans on a regular basis. But most importantly, be mindful of your browsing habits. Most infections can easily be avoided if you simply use your common sense and don’t interact with sketchy content, suspicious incoming messages, illegal downloadable materials, etc. Stick to reputable websites and download sources and be sure to never open emails or other messages or their attachments unless you are absolutely sure they are trustworthy.

SUMMARY:

Name Perfc.dat
Type Trojan
Danger Level High (Trojans are often used as a backdoor for Ransomware)
Symptoms There are usually no symptoms of a Trojan horse attack, but constant sluggishness, frequent crashes and involuntary cursor movements could potentially be signs of an infection
Distribution Method Fake system requests, spam messages, infected downloadable content, including torrents, shareware, etc.
Detection Tool We generally recommend SpyHunter or a similar anti-malware program that is updated daily.

Keep in mind, SpyHunter’s malware detection tool is free. To remove the infection, you’ll need to purchase the full version.
More information about SpyHunter and steps to uninstall.