I learned my lesson as Nick pointed out in bold above via the School of Hard Knocks not to use Linux OS's to scan for threats on my PC.
Fortunately, most all of my OS's are imaged every two weeks at the most, and alternate drives in doing so, therefore was able to recover within 15 minutes. Yet for those who doesn't, better have a recovery media set, working recovery partition or if a full retail install, the media, and depending on OS (the newer, the less time), one to two days & 20+ reboots to reinstall the OS, all of the updates, and don't forget product keys for MS Office & other licensed software.
Even some of the 'official' bootable CD's (like from Bitdefender) has caused some users issues, so am certainly not going to trust a full Linux solution to cleanup Malware.
This is why I always keep the first three backup images, whether new or post reinstall, as well as the last three. Because sometimes going back just one image may have the Malware on it, chances are that the ones before that won't, and after backup, always disconnect the drive used to create the image.
Yet I agree that these are great to rescue important files from, by which chance shouldn't be on the same drive (or 'C' partition). My personal data goes to a secondary drive or separate partition on all of my Windows installs, so most of the time. no need to rescue anything. That is, unless I were to be hit with one of the 'crypto' variants that'll encrypt every drive on the computer, maybe the Linux ones also, if nothing else, the partitions as a whole if can't access each file, though that would take quite a bit of time to encrypt/upload.
Prevention is far better than cure, and anyone who is serious about security cannot leave regular backups out of the picture, these aren't just for hardware failures.
While the idea of a full Malware scan using Linux media is a great one in thought, in reality can cause a lot more damage to an already infected system. Especially if the Recovery partition is scanned & 'cleansed', that can place the user in a serious jam that they can't get out of, especially if no recovery media set was created, nor reinstall media available or the first full disk backup image was created. If a Windows 7 OEM computer, one will have to make sure that the Windows COA is attached & readable (good to place clear packaging tape across this for protection), and find someone with a Retail copy of the OS (don't matter which version as long as the bit version matches), and use the trick of creating an AIO install media, so that the COA won't be blocked, many won't allow to reinstall using Retail media. Am not going to get into great detail over this, yet a Google search will provide the simple instruction to perform the task.
If Windows 8.1/10, the OS ISO can be downloaded, and so can 7, if a Retail (Full) version. Microsoft provides the sites for these when needed.
I know that I'll never scan my Windows OS's with Linux media again, even if it's a Windows AV that creates the Linux bootable ISO to burn to CD, or create a bootable USB stick. If one has a second Windows computer, it's best when possible, to remove the drive & place in a docking station for scanning with one's security on Windows. This removes threats better than when running, and when cleaned, can be placed back when cleaned. Though once infected, I don't trust the OS, no matter what, would rather revert to a backup, even if it was the first created five years ago.
This is one great example of why it's best to run Linux software on these OS's, and Windows equivalents on those, to prevent the OS from being bricked.