Вы находитесь на странице: 1из 18

10 Steps To Take When You Discover

Malware On Your Computer


Viruses are everywhere! And although wed like to think that the Internet is a safe
place to spend our time (cough), we all know that there are risks around every
corner. Email, social media, malicious websites that have worked their way into
search engine results, and ad pop-ups all can pose a threat. Although there are
precautions you can take to limit the risk of infecting your computer, sometimes
you simply have bad luck and get infected anyway. But thankfully, you can do it for
completely free, although removing malware

(http://www.makeuseof.com/pages/download-operation-cleanupcomplete-malware-removal-guide) can be a painful process. And because of


that, Ive laid out all the steps of exactly how to do it.

Its Not Just Viruses Other Kinds Of Malware To


Know About

Because there are so many kinds (http://www.makeuseof.com/tag/types-

computer-viruses-watch/), virus is typically the term used to describe all the


nasty stuff that can infect your computer. But the correct term is actually malware,
and theres lots of it. Chris Hoffman wrote an article differentiating between the

three main types of malware


(http://www.makeuseof.com/tag/difference-worm-trojan-virusmakeuseof-explains/): viruses, trojans and worms. In that same article, he also
briefly explains what spyware and scareware are. Scareware, or ransomware, is
simply a program that infects your computer and then prompts you to pay to get it

fixed. Guy McDowell goes more in depth in what ransomware is and how to

remove it (http://www.makeuseof.com/tag/dont-pay-up-how-to-beatransomware/). Lastly, theres adware, i.e. unsolicited advertising installed on


your computer.

How To Detect The Symptoms That Youre Infected

Why do you need to know how to detect symptoms thats what you have an
antivirus program for, right? Well, thats true they help for sure. There have been
occasions where mine has caught something and Ive been able to get rid of it
before it has been able to cause any harm. However, if an antivirus program isnt
updated with the latest definitions, it might not catch everything. Plus, its always
better to know what to look for, rather than depending on what a program says.
1. Homepage And Search Engine Hijacking
Ever wonder why your homepage, now redirects to some weird website? Or what
about your default search engine now being some other search engine that youve
never heard of or recognize? These are tell-tale signs of malicious activity on your
computer.
2. Youre Redirected To A Different Site Without Warning
Similar to the previous one, another problem you might run into is being taken to
another website, likely malicious, when you typed in or clicked something
completely different that you know hasnt taken you there before.
3. Pop-ups

Ah, yes. The notorious pop-ups we all know what they are.
4. Crashes
This isnt always related to a malware infection, but if this is happening along with
some of the others mentioned here, youve most likely got something.
5. Unfamiliar Programs And Toolbars
Ever wonder how all of those toolbars got there in your browser? They are full of
search boxes and loads of useless buttons. Frankly, no one needs toolbars anymore.
But if one showed up unannounced, it was either your poor program

installation habits (http://www.makeuseof.com/tag/install-freesoftware-junk/), or it snuck its way onto your computer or both.
6. Slow Computer Online And Offline
Internet connectivity issues are one thing, but if your computer is always

running slow (http://www.makeuseof.com/pages/download-windowson-speed-ultimate-pc-acceleration-manual), whether youre online or not,


you better keep reading this article.
7. Browser Cant Load Pages
I hate to be the barer of bad news, but if your browser(s) continue(s) telling you
that pages cant be loaded, yet your Internet connection is fine, Id bet that theres
something fishy going on.

The Steps To Take If You Are Infected


There is a level of panic and worry that can overwhelm you whenever you realize
that your computer has been infected you feel vulnerable and open. However, its
not over for your computer and all of your files that it contains. There are ten
things you need to do to obliterate that virus, trojan, worm, or whatever else may
be infecting your computer and restore it to the state that it was prior to the
infection.

1. Back Up Your Personal Files

Hopefully you have already been backing up your files. But even so, I recommend
that you copy your personal files elsewhere just to be safe. Secondly, you dont
want to back up everything on your computer, as theres a risk that you could save
some infected files along with it.
Ive written several articles on backing up, but the two that you should refer to the
most would be why you need to backup

(http://www.makeuseof.com/tag/why-do-you-need-to-backup-now/)
and recovery tips to help you prepare for a disaster
(http://www.makeuseof.com/tag/disaster-recovery-tips/).

2. Disconnect From The Internet

A virus will try to call home via your Internet connection. Disconnecting from the
Internet should be one of the first things you do in order to battle any form of
malware. If youre on a desktop, simply unplugging the Ethernet cable is the most
certain way. If you are on a laptop, you can disconnect by unplugging the Ethernet
cable, or if youre wirelessly connected, disabling the WiFi by a physical button on
your keyboard or in the Taskbar.

3. Boot In Safe Mode Or With A Live Antivirus Rescue Disk

By booting in Safe Mode (http://www.makeuseof.com/tag/start-

windows-safe-mode/), youre able to prevent any non-core components from


running, allowing you to isolate problems easier. To do this, restart your computer,
and press and hold the F8 key while your computer starts up. The first option, Safe
Mode, should be already selected, but if not, you can navigate to it with your
arrow keys. Then press Enter. Once youre in Safe Mode, you can continue the
malware-removal process.

If Windows wont start at all, you can use an antivirus rescue disk. These are
available for free from many antivirus companies such as Kaspersky

(http://support.kaspersky.com/8093), Avira
(http://forum.avira.com/wbb/index.php?
page=Thread&threadID=82163), AVG (http://www.avg.com/usen/226386), and others. Justin Pot has written several articles on this, including
one on three live CD antivirus scanners
(http://www.makeuseof.com/tag/live-cd-antivirus-scanners-windowsstart/), and two more detailed posts on how to create a BitDefender
(http://www.makeuseof.com/tag/bitdefender-rescue-cd-removesviruses-fails/) and Kaspersky rescue disks
(http://www.makeuseof.com/tag/kaspersky-rescue-disk-savesreinstalling-windows/). Lastly, you have the option of using a Linux Live CD
(http://www.makeuseof.com/tag/kill-windows-viruses-ubuntu-live-cd/).

4. Get Another Computer With Internet Access

You will more than likely need the aid of another reliable computer connected to
the Web in order to resolve your malware problems. This is because you will need
to research the problems and symptoms of the specific infection, as well as
download various programs to remove the infection. If you dont have another
computer, you might talk to a good friend or family member and explain your
situation. Of course, if you are going to school at a college or university, or if you
have access to a computer lab at a library, you might be able to use a public
computer to do this as well.
When you download any executable programs on the clean computer, you will of
course need a way to transport them to the infect computer. What I find best is a
flash drive with no other valuable files on it. You might also use an SD card or
portable hard drive.

5. Try To Identify The Actual Malware And Search For Fixes

Often times when malware infects your computer, it isnt just some generic virus,
but a specific kind that needs to be removed with a certain procedure. There are
articles and forums all over the Web that address all kinds of malware infections.
Start with a basic search based on the little information you know about the
infection. For instance, if its in the form of a fake antivirus program, what is its
name? Once you have somewhere to start, you can keep searching and gathering
more information about what to do. Ideally, youll find instructions to walk you
through the entire process from start to finish.
In case you are completely lost at this point, you can also ask MakeUseOf

Answers (http://www.makeuseof.com/answers/ask) and we will point you


in the right direction.

6. Scan With Multiple Programs Until No Infections Are Found

If you cant find anything specific about the infection, dont worry there are a

variety of tools you can use to remove infections


(http://www.makeuseof.com/tag/make-sure-youre-clean-with-thesefree-one-time-scan-antivirus-tools-windows/). These tools range from
antivirus to rootkit removers to anti-adware and antispyware to general
antimalware programs.
On our Best Of Windows Software page, we have sections for antivirus

(http://www.makeuseof.com/pages/best-windows-software#antivirus),
malware removal (http://www.makeuseof.com/pages/best-windowssoftware#malware) and firewall
(http://www.makeuseof.com/pages/best-windows-software#firewall)
applications.
Some tools I recommend are the Kaspersky TDSSKiller

(http://support.kaspersky.com/5350?el=88446) for removing rootkits,


Malwarebytes Anti-Malware
(http://www.malwarebytes.org/products/malwarebytes_free/) and
HitmanPro (http://www.surfright.nl/en/hitmanpro/) for removing all kinds
of malware, and AdwCleaner
(http://www.makeuseof.com/tag/adwcleaner-makes-adware-removaleasier-than-ever-windows/) for removing adware. All of these tools are free
and can be used in conjunction with one another.

Again, you will have to download these on the clean computer connected to the
Internet and transfer their executable files to the infected computer. Programs like
Malwarebytes Anti-Malware often need Internet access to get the latest
definitions, so I often use it to make one last swipe once Im able to connect to the
Internet once more and download the updates. I then return to Safe Mode to run
the scans.
NOTE: You should know that although you can use multiple malware removal
programs, you cant use multiple antivirus programs, as they can conflict.

7. Clean Up Temporary Files And Worthless Programs

Once youve removed the nasty infections, its time to clean up any remaining files.
The recommended program to do this is CCleaner

(http://www.makeuseof.com/tag/optimize-system-run-ccleaner/). Its not


considered a security program by any means, but it can help during this process.
However, CCleaner isnt the only good cleaner available

(http://www.makeuseof.com/tag/cleaners-compared-ccleaner-vsslimcleaner-vs-iobit-advanced-systemcare/). IObits AdvancedCare


(http://www.makeuseof.com/tag/advanced-systemcare-6-beta-20-pcdoctor-windows/), System Ninja
(http://www.makeuseof.com/tag/computer-tidier-free-portablesystem-ninja/), as well as others like Xleaner and DriveTidy
(http://www.makeuseof.com/tag/2-lesserknown-portable-alternativesccleaner-windows/), are several good alternatives.
This might also be a good time to comb through your programs list with an app like

GeekUninstaller (http://www.makeuseof.com/tag/geekuninstalleruninstall-programs-thought-windows/) to remove unneeded or potentially

risky software that snuck its way into your computer.

8. Remove System Restore Points

Although System Restore can be very helpful

(http://www.makeuseof.com/tag/windows-system-restore-works/) and
has proven to help me many times, system restore points do have the potential to
contain malware, so its recommended that you delete those to ensure that all
traces of malware are removed from your computer. If you know for sure when you
contracted the malware, you can remove the restore points up to that time.
However, to be safe, I recommend you remove all of them.
To do this in Windows Vista and 7 (and Windows 8 if you have a Start Menu

tool (http://www.makeuseof.com/tag/make-a-start-menu-on-windows8/), like Classic Shell (http://www.makeuseof.com/tag/make-windows-8suck-less-with-classic-shell/)), click the Start button, right-click Computer, and
then Properties.

Click System protection in the left panel, which may then prompt you for an
administrator password or confirmation. Under the System Protection tab click
Configure, then click Delete and OK.

If youre using Windows 8 without a Start Menu tool, navigate your mouse cursor
to the lower right-hand corner to display the Charms bar. Click Search (magnifying
glass), type recovery and click Settings. You should then see a result that says
Recovery, for me it was the second result down in the right panel.

Once you click it, youll be taken to a window with Recovery tools, where you will
click the link that says Configure System Restore. Then follow the previous
instructions.

If you use Windows XP, follow these instructions provided by Microsoft

(http://support.microsoft.com/kb/555367).

9. Fix Post-Malware Removal Problems


There may be some problems that you encounter after you remove the infections
from your computer. A couple quick options you might try would be Microsofts

Fix It tool (http://www.makeuseof.com/tag/is-the-microsoft-fix-itservice-really-any-good-si-x2/) and a tool called Re-Enable II


(http://www.tangosoft.co.uk/re-enablev2.html). Below are some common
problems and how you might be able to fix them.
Cant Connect To The Internet
This guide by Select Real Security

(http://www.selectrealsecurity.com/fix-internet-connection) is invaluable
and can suggests many steps you might take to fix this problem.
Search Engine Redirecting To Random Website
One of the primary reasons for this, if you have Java (which you likely dont

need (http://www.makeuseof.com/tag/is-java-unsafe-and-should-youdisable-it/)), is the Java cache hasnt been cleared yet, which Java shows you
how to do (http://www.java.com/en/download/help/plugin_cache.xml).
If your primary search bar still goes elsewhere, that can be changed in the Settings

of your browser (http://www.makeuseof.com/tag/anvi-browser-repairtool-restore-browser-settings-fix-dns-problems-caused-malware/),


whether you use Chrome, Firefox, Internet Explorer or others.

Homepage Is Still Different


If your homepage, like your search engine, was changed, you can go into your
browser settings and change what this is too.
Programs And Files Wont Open

Select Real Security has another great guide


(http://www.selectrealsecurity.com/fix-programs) on how to fix this as well
and uses four different methods: a Registry file, an INF file that fixes executable file
association, CleanAutoRun by Kaspersky, and Creating a new user account.
Missing Desktop Icons
If none of your icons are on your Desktop anymore, try the Unhide

(http://www.bleepingcomputer.com/download/unhide/) or Re-Enable II
(http://www.tangosoft.co.uk/re-enablev2.html) tools.
Windows Update And Firewall Wont Work
If Windows Update and/or your Firewall arent working properly, you might try a
tool called Windows Repair by Tweaking.com

(http://www.techspot.com/downloads/5314-tweaking-windowsrepair.html). It can do a lot, so when you use it, uncheck all of the options except
for the following five:
Repair WMI
Repair Windows Updates
Repair Windows Firewall
Reset Registry Permissions
Reset File Permissions
Windows Repair comes in both portable and non-portable versions.
Computer Is Still Slow
If your computer is still slow, there are several things you can do.
Removing more temporary files
Fix Windows system files by typing sfc /scannow in the Run Window (Start key
+ R) and the restart the computer
Ensure you have only one antivirus program installed and running on your
computer
For more advice, take a look at Bakaris article on why you might have a slow

computer (http://www.makeuseof.com/tag/cant-stand-the-slownesstop-10-reasons-for-poor-pc-performance/) or Tinas guide on speeding


up Windows (http://www.makeuseof.com/pages/download-windowson-speed-ultimate-pc-acceleration-manual).

Still Having Problems? Try MakeUseOf Answers


If none of these options help, you might turn to the MakeUseOf Answers forum

(http://www.makeuseof.com/answers/), which has proven helpful for many,


including myself a time or two.

10. Change Your Passwords

Lastly, you should change your passwords to ensure that no information that was
potentially obtained while your computer was infected can be continued to be used
against you and cause even more harm.
I personally recommend using a password management strategy

(http://www.makeuseof.com/tag/use-a-password-managementstrategy-to-simplify-your-life/) and Yaara wrote an excellent article on how to


create strong, yet easy to remember passwords
(http://www.makeuseof.com/tag/7-ways-to-make-up-passwords-thatare-both-secure-memorable/), as well.

Conclusion: Preventing Further Infections

With so much on the Internet today, preventing every single thing can be pretty
difficult, but there are ways to be safe. Weve covered many of these in the
following articles already:

The Complete Malware Removal Guide


(http://www.makeuseof.com/pages/download-operation-cleanupcomplete-malware-removal-guide)
7 Common Sense Tips to Help You Avoid Catching Malware
(http://www.makeuseof.com/tag/7-common-sense-tips-avoidcatching-malware/)
Are Your Social Friends Infecting You With Malware?
(http://www.makeuseof.com/tag/are-your-social-friends-infectingyou-with-malware/)
9 Easy Ways To Never Get A Virus
(http://www.makeuseof.com/tag/9-easy-ways-virus/)
3 Top Ways People Get Infected by An Email Virus
(http://www.makeuseof.com/tag/top-ways-people-infected-emailvirus-case-wondering/)
Have you had the pleasure of removing malware from your or someone elses
computer? If so, do you have any additional insight or success stories to share?
Wed love to hear them!

Image Credits: Vintage Computer via Shutterstock

(http://www.shutterstock.com/pic.mhtml?id=103492934), Laptop With Stethoscope via


Shutterstock (http://www.shutterstock.com/pic.mhtml?id=38552605&src=), backing up
securely via Shutterstock (http://www.shutterstock.com/pic.mhtml?id=88346206),
Ethernet cable with forbidden sign via Shutterstock
(http://www.shutterstock.com/pic.mhtml?id=145864694), High wireless signal via
Shutterstock (http://www.shutterstock.com/pic-82565107/stock-photo-high-wirelesssignal-icon-in-red-on-isolated-white-background-d-render-image-and-part-of-icon.html),
Red forbidden sign via Shutterstock (http://www.shutterstock.com/pic-80330140/stockphoto-red-forbidden-sign-d-render-illustration.html?), Rescue Usb Flash Drive via
Shutterstock (http://www.shutterstock.com/pic.mhtml?id=145008019), Infected
computer next to non-infected computer via Shutterstock (
http://www.shutterstock.com/pic.mhtml?id=111036551), internet email is open with
various computer virus icons via Shutterstock (http://www.shutterstock.com/pic.mhtml?
id=96510325), Scan for viruses via Shutterstock (http://www.shutterstock.com/pic130775102/stock-photo-scan-for-viruses.html), Virus Cleaned By Programmer via
Shutterstock (ttp://www.shutterstock.com/pic.mhtml?id=134271377), note pinned to a
cork board with the text Change Passwords via Shutterstock
(http://www.shutterstock.com/pic.mhtml?id=136402646), Checklist for computer security
via Shutterstock (http://www.shutterstock.com/pic.mhtml?id=129183803)

(http://blazwuatr.com/wc/446/10236/1709/1709,2574,1320,2760,2235,1460,1497,300
Nutritionist's Breakthrough Muscle Building Formula

(http://blazwuatr.com/wc/446/10236/1709/1709,2574,1320,2760,2235,1460,1497,300

(http://blazwuatr.com/wc/446/10236/1709/1709,2574,1320,2760,2235,1460,1497,300

(http://blazwuatr.com/wc/446/10236/2574/1709,2574,1320,2760,2235,1460,1497,300
A Seduction Technique Women Can't Resist

(http://blazwuatr.com/wc/446/10236/2574/1709,2574,1320,2760,2235,1460,1497,300

(http://blazwuatr.com/wc/446/10236/2574/1709,2574,1320,2760,2235,1460,1497,300

(http://blazwuatr.com/wc/446/10236/1320/1709,2574,1320,2760,2235,1460,1497,300
How To Make Any Woman Obsess Over You

(http://blazwuatr.com/wc/446/10236/1320/1709,2574,1320,2760,2235,1460,1497,300

(http://blazwuatr.com/wc/446/10236/1320/1709,2574,1320,2760,2235,1460,1497,300

(http://blazwuatr.com/wc/446/10236/2760/1709,2574,1320,2760,2235,1460,1497,300

How To Make $4,000 In One Week


(http://blazwuatr.com/wc/446/10236/2760/1709,2574,1320,2760,2235,1460,1497,300

(http://blazwuatr.com/wc/446/10236/2760/1709,2574,1320,2760,2235,1460,1497,300

(http://blazwuatr.com/wc/446/10236/2235/1709,2574,1320,2760,2235,1460,1497,300
Weight Loss System Melts Fat Like Butter

(http://blazwuatr.com/wc/446/10236/2235/1709,2574,1320,2760,2235,1460,1497,300

(http://blazwuatr.com/wc/446/10236/2235/1709,2574,1320,2760,2235,1460,1497,300

(http://blazwuatr.com/wc/446/10236/1460/1709,2574,1320,2760,2235,1460,1497,300

Men Urged To Change Their Diets Immediately


(http://blazwuatr.com/wc/446/10236/1460/1709,2574,1320,2760,2235,1460,1497,300

(http://blazwuatr.com/wc/446/10236/1460/1709,2574,1320,2760,2235,1460,1497,300

(http://blazwuatr.com/wc/446/10236/1497/1709,2574,1320,2760,2235,1460,1497,300

1 Simple Rule To Get Rich Trading Stocks


(http://blazwuatr.com/wc/446/10236/1497/1709,2574,1320,2760,2235,1460,1497,300

(http://blazwuatr.com/wc/446/10236/1497/1709,2574,1320,2760,2235,1460,1497,300

(http://blazwuatr.com/wc/446/10236/3002/1709,2574,1320,2760,2235,1460,1497,300

"Easy Way" To Make $7,500 A Month Sitting At Home


(http://blazwuatr.com/wc/446/10236/3002/1709,2574,1320,2760,2235,1460,1497,300
(http://blazwuatr.com/wc/446/10236/3002/1709,2574,1320,2760,2235,1460,1497,300

Copyright 2014, MakeUseOf. All Rights Reserved .

Вам также может понравиться