A modern, flat design illustration of a computer on a desk with an alert on the screen.

11 Steps to Fully Remove Malware (By an IT Pro)

When Jamie and I ran our IT services business, we frequently dealt with computers infected by malware. To thoroughly clean them and restore their performance, we always followed a specific set of steps. In this guide, we’ll walk you through the exact process we used to effectively remove malware and ensure the system runs smoothly again.

 

 

Clean Out Temporary and Junk Files with CCleaner

One of the first steps in cleaning up a computer is to remove unnecessary files that can slow down the system or even hide malware. Using CCleaner is a quick and effective way to do this.

Stop Browsing Our Website!

Unless the newsletter brought you here ;)

Our site contains only a fraction of what we share. Defragg is a newsletter built for a community of tech enthusiasts, sharing curated tech tutorials, productivity tips, life hacks, retro games, nostalgia, and a dash of humor, all delivered to your inbox.

An image of a floppy disk with "The Defragg Newsletter" written on it followed by "Tech Tutorials, Productivity Tips, Life Hacks, Retro Games, and Nostalgia".

Become a Defragger like thousands of others. Obey the floppy and join today!

  • Step 1: Download and install CCleaner from its official website. Make sure you get the latest version to ensure the best results.
  • Step 2: Once installed, run CCleaner to scan your computer for temporary files, browser cache, and other junk files. These unnecessary files take up space and can sometimes be used by malware to hide. Deleting them not only frees up storage but also helps remove any leftover traces of malware.
  • Step 3: CCleaner also offers a Registry Cleaner feature, which can fix or remove invalid registry entries left behind by uninstalled programs, including malware. Use this feature with caution, though, as the registry is critical to your system’s functionality. Only clean entries that are clearly unnecessary or related to programs you’ve already removed.

 

Scan for Malware with Malwarebytes

After cleaning out temporary files, the next step is to scan for malware. Malwarebytes is a trusted tool for detecting and removing different types of malware, including viruses, spyware, and adware.

  • Step 1: Download and install Malwarebytes from the official website. The free version is enough for a thorough scan.
  • Step 2: Once installed, run a full system scan. This will check every file on your computer for potential threats. Depending on the size of your hard drive, this may take some time, but it’s important to let the scan finish.
  • Step 3: After the scan is complete, Malwarebytes will show you a list of any threats it found. Carefully review the list, then quarantine and remove any detected malware. Quarantining isolates the files so they can’t harm your system, and removing them ensures they are gone for good.
  • Step 4: Restart your computer after the removal process is complete. This ensures that any changes made during the cleanup take effect.

 

Run a Secondary Scan with SuperAntiSpyware

Even after using Malwarebytes, it’s a good idea to run a secondary scan with another tool to catch anything that might have been missed. SuperAntiSpyware is another reliable program that specializes in detecting spyware, adware, and other unwanted software.

  • Step 1: Download and install SuperAntiSpyware from its official website. The free version works well for scanning and removing threats.
  • Step 2: Once installed, run a full scan of your computer. Like Malwarebytes, this scan will look through all the files on your system. It may take some time, but it’s important to let it complete the scan thoroughly.
  • Step 3: After the scan is finished, SuperAntiSpyware will show a list of any threats it found. Review the list carefully, then choose to quarantine or remove any detected spyware or adware.
  • Step 4: Restart your computer after removing the threats to make sure the system is completely clean.

 

Check System Integrity with Tweaking.com’s Windows Repair Tool

After removing malware, your system may still have issues caused by the infection. Malware can corrupt important system files or change settings, which can lead to poor performance. To fix these problems, you can use Tweaking.com’s Windows Repair tool.

  • Step 1: Download and install Windows Repair from the official Tweaking.com website.
  • Step 2: Open the program and start by running a Pre-Scan. This feature will check your system for common problems like corrupted files or missing registry entries.
  • Step 3: Once the scan is complete, the tool will show any issues it found. You can then use the repair options to fix these problems. Windows Repair can reset permissions, repair Windows updates, and fix various system errors that might have been caused by malware.
  • Step 4: After the repairs are done, restart your computer to apply the changes.

 

Review Network Activity with TCPView

Malware often tries to connect to the internet without you knowing, which can compromise your privacy or steal your data. To see if any suspicious applications are accessing the web, you can use TCPView, a tool that shows you real-time network connections on your computer.

  • Step 1: Download TCPView from Microsoft’s Sysinternals website and run the program. You don’t need to install it—it works as a portable application.
  • Step 2: When you open TCPView, you’ll see a list of all the active network connections on your computer. This includes details like which processes are connecting to the internet and what ports they’re using.
  • Step 3: Look through the list and check for any suspicious or unknown programs that are accessing the internet. If you see something unfamiliar, you can search online to find out if it’s a legitimate process or potential malware.
  • Step 4: If you find any suspicious connections, right-click on the process and select End Process to stop it immediately.
  • Step 5: Make a note of the name of the suspicious process or program. You’ll need this information later when reviewing installed applications, so you can uninstall any software related to that process.

 

Identify Background Processes with Process Explorer

Sometimes, malware or unwanted programs can hide by running in the background, where you might not easily notice them. To get a detailed view of all running processes on your computer, you can use Process Explorer, a tool that provides more information than the standard Task Manager.

  • Step 1: Download and run Process Explorer from Microsoft’s Sysinternals website. Like TCPView, it’s a portable tool, so there’s no need to install it.
  • Step 2: When you open Process Explorer, you’ll see a list of all the processes running on your computer. Each process will show details such as its name, location, and the resources it’s using.
  • Step 3: Carefully look through the list for any unfamiliar or suspicious processes. If you find something you don’t recognize, right-click on the process and select Search Online. This will help you find information about the process to determine if it’s safe or potentially malicious.
  • Step 4: If you confirm that a process is related to malware or unwanted software, you can right-click on it and choose Kill Process to stop it.
  • Step 5: Make a note of any suspicious processes. This will help when you review installed programs later, so you can uninstall the software associated with those processes.

 

Manage Startup Applications with Autoruns

Malware and unwanted programs often configure themselves to start automatically when you turn on your computer. This can slow down your system or even allow malware to run again. To take control of what starts when your computer boots up, you can use Autoruns, a powerful tool that shows you all the programs set to run automatically.

  • Step 1: Download and run Autoruns from Microsoft’s Sysinternals website. Like other tools in this guide, it doesn’t require installation.
  • Step 2: When you open Autoruns, it will display a list of all the programs and services set to start when your computer boots up. This includes drivers, startup programs, scheduled tasks, and more.
  • Step 3: Look carefully through the list for any suspicious or unnecessary programs. Malware often hides here, so make sure to check for unfamiliar names. If you’re unsure about any entry, you can right-click on it and choose Search Online to find more information.
  • Step 4: Once you identify unwanted or unnecessary programs, uncheck the box next to them to prevent them from starting up automatically.
  • Step 5: Make a note of any suspicious startup programs, as you’ll want to uninstall them later when reviewing installed applications.

 

Review and Uninstall Unnecessary Programs

After identifying suspicious processes and startup applications, the next step is to remove any unnecessary or potentially harmful programs from your computer. Uninstalling unwanted software can help improve performance and ensure that malware or unwanted programs don’t remain on your system.

  • Step 1: Open the Control Panel and go to Programs > Uninstall a Program (or Settings > Apps > Apps & Features on Windows 10/11).
  • Step 2: You’ll see a list of all the programs installed on your computer. Review this list carefully, looking for any software that you don’t recognize or no longer need. Pay special attention to programs that you noted earlier when using TCPView, Process Explorer, and Autoruns.
  • Step 3: If you find any suspicious or unwanted programs, select them and click Uninstall. Follow the prompts to fully remove the software from your system.
  • Step 4: Be cautious when uninstalling programs. If you’re unsure whether something is necessary, search online for more information before removing it. Some programs may be essential for your system’s functionality.
  • Step 5: After uninstalling unnecessary software, restart your computer to complete the process and ensure that the changes take effect.

 

Install a Reliable Antivirus: Bitdefender Free

Before installing Bitdefender, it’s important to remove any other antivirus programs, as having multiple antivirus tools can cause conflicts and slow down your computer. Malwarebytes and SuperAntiSpyware are fine to keep since they are not traditional antivirus programs, but other antivirus software should be uninstalled.

  • Step 1: Go to Control Panel > Programs > Uninstall a Program (or Settings > Apps > Apps & Features on Windows 10/11). Review the list of installed programs and uninstall any other antivirus software except for Malwarebytes and SuperAntiSpyware.
  • Step 2: Download Bitdefender Free Edition from the official website. Make sure to get the latest version for the best security.
  • Step 3: Follow the installation instructions and set up Bitdefender on your computer. During installation, you may be asked to create an account or log in.
  • Step 4: Once installed, Bitdefender will automatically perform a quick scan of your system to check for any remaining threats. Allow it to finish the scan.
  • Step 5: After the initial scan, Bitdefender will continue to protect your computer with real-time protection, which monitors your system for any new malware or suspicious activity.
  • Step 6: To ensure continued protection, schedule regular scans through Bitdefender’s settings. This will help you stay on top of any potential threats in the future.

 

Run a Final Malware Scan and Post-Cleanup Check

After installing Bitdefender, it’s a good idea to run one final scan to make sure your system is completely clean. This final check ensures that no hidden malware or unwanted files remain on your computer.

  • Step 1: Open Bitdefender Free Edition and navigate to the Scan option.
  • Step 2: Run a full system scan. This will thoroughly check all files, folders, and applications on your computer for any remaining threats. A full scan may take some time, but it’s important to let it finish to ensure nothing is missed.
  • Step 3: Once the scan is complete, review the results. If Bitdefender detects any remaining threats, follow the prompts to remove or quarantine them.
  • Step 4: Restart your computer after removing any detected threats. This ensures that all changes are applied and the system is fully cleaned.
  • Step 5: After the scan, check if your computer is running smoothly. Look for signs of improved performance, such as faster startup times, fewer pop-ups, and no unusual background processes.

 

Update Windows to the Latest Version

After cleaning up your computer and removing any malware, it’s important to make sure your operating system is up to date. Windows updates often include security patches that protect your computer from new threats, so keeping your system updated is a crucial step in staying safe.

  • Step 1: Open Settings by clicking the Start menu and selecting the gear icon, then go to Update & Security.
  • Step 2: In the Windows Update section, click Check for updates. Windows will now look for any available updates.
  • Step 3: If updates are found, download and install them. This might take some time depending on the number of updates and the speed of your internet connection.
  • Step 4: Once the updates are installed, restart your computer to apply them.
  • Step 5: After rebooting, repeat the process to check for any additional updates. Sometimes multiple rounds of updates are needed, so keep checking until there are no more updates available.

 

Conclusion

By following these steps, you can effectively clean your computer from malware and protect it from future threats. Regular updates, scans, and safe browsing habits will help keep your system secure and running smoothly.

If you have any other tools or processes that you find useful for cleaning computers, feel free to share your recommendations!

 

Leave a Comment

Your email address will not be published. Required fields are marked *