Manually Cleaning Computer Viruses!

This guide is important when the going gets tough, after trying all the conventional ways of cleaning your machine but to no avail, this should help you out!
Previously, we dealt exclusively on how to scan and perform basic system recoveries from a virus ravaged computer. Those tips should help you recuperate your computer from the most common virus attacks but like we always say, in the real world scenario, virus behavior is never predictable. There are no rules for it to follow.
If the first part did not bring any significant results, then you are not dealing with an ordinary type of a virus, this could be a serious malware like rootkit, crimeware, spyware or Trojan horse. For these types of sinister attacks, more technical ammunition would need to be released. This advice level is for the technical acquainted people and those who have guts to take this bull by the horns otherwise take your computer to your good technician.
Your computer might be overheating, continuously restarting, freezing, redirecting you to undesired websites or denying you log on attempts, when you no longer can access files you could before, these are among signs that you are under malware attack and have lost control of your computer.
When you cannot install your executable antivirus from flash drive or removable device, a good trick is to fool the virus. Because most viruses can predict antivirus packages, they will first disable any effort by attacking every .exe file. To smartly fool this attack you should rename your antivirus installer to a different file which is not .exe. I have successfully renamed my .exe files to .bat and although .bat files will not work in windows vista, you can rename to any different file system, installing from a cd or DVD is a better option since the virus cannot alter CD/DVD Rom content.
Confronting a malware infected machine always brings unpredictable results, you can reduce the impact buy forcing your windows machine to operate at minimum system resource and this usually suppresses virus behavior. You can boot into safe mode to regain direct access to your machine by pressing the F8 button during boot up, this will give you back access to your computer but with very limited resources. You may not install some package from there or clean your machine but you can probably back up your important files to somewhere safe and work on your system registry or start up.
Safe mode may fail to boot up the computer, this shows that some boot up files have been affected, In Windows XP you will be prompted with a blue screen of death, Windows 7 may give you continuous restarts. The quick remedy is to fix the booting up files. By running your operating system disk, choose the restore option by pressing R when you boot up using the system disk, you will be then prompted to a DOS screen, type the command “fixboot” or “fixmbr” then hit enter. Either of these commands will work like a charm for you. Your computer can now boot up
After booting up in safe mode, you should disable all automatically running programmes, this is how malwares take over control of your computer, they self execute as soon as you boot up your computer. To deactivate them click the start button, then run or on your search bar type word “msconfig”, click the startup tab and deactivate all programmes except those you are fully aware of like your antivirus, otherwise these programmes should not unnecessarily auto startup.
Restart your computer and you should be noticing a change at this stage, go straight for a system restore, this will make your windows system revert back to its last known good working status. If the bug was not pernicious this process will wipe away all system changes and malware attacks. This can be done by right clicking my computer, click properties, then system protection and hit the system restore tab. This will take some minutes before it brings back a smile to your face. It is very important remember to disable system restore soon after a restoration as it has the capacity to restore all system changes even deleted viruses.
This stage should give you back some form of control. You should be able to run your anti malware package first before your antivirus, most antivirus packages may miss some root kits or Trojan horses. Malwarebytes will do you this job easily, some colleagues recommend super anti spywares, multi virus cleaner, Ccleaner but I’m still yet to personally try them.
Most malwares should be deleted by now, hence it is now much safer to install your antivirus software and try to clean your files instead of selecting the delete option unless otherwise. Updated antivirus packages will find it easier to clean your files than deleting them, the best bet to try is Bitdefender and Eset`s Nod32 or smart security. There are many good packages out there to try but results may vary with type of attack you are fighting. After these scans your computer should be clean and remember to set back system restore for a new clean restore point.
Some viruses have a tendency to hide personal files, if you can no longer locate your files or when you are able to scan them yet you can’t view them, then they are obviously hidden. In your folder and search options click view hidden files including system files. You should be able to access your files now, change back the attributes to normal or move them to a new folder ad remember to hide back system files.
Yet an antivirus may fail, is time to manually delete these viruses by running DOS command prompt, press the window logo key + r, the type cmd. To view all hidden files including the virus type dir /ah while in the root file of the infected drive. To know the name of the virus open its auto run file using notepad by typing at prompt, c:\> notepad c:\autorun.inf. To unhide the file you type attrib –s-h filename /s/d because you can not delete files when they are hidden, then now delete the file by simply typing del {filename}. You should repeat the same process in the system32 folder to be squeaky clean.
While the best but desperate way to deal with malwares is simply formatting the hard drive and starting afresh on a clean page, this is the last thing to do and any technicians who opts for this first is not worth working on your system, recommend him a good college to practice on, even after a format some virus are BIOS or master boot record( MBR) residing which means they will still appear after the restart.
Often, spywares like adware comes along with a free software application, such as a game or a supposed productivity booster. Once it’s downloaded to your computer, the functional element of the software works exactly as promised, In many cases, the hidden activities of the software are clearly described in the end-user license agreement (EULA) that pre warns us during the installation process alas, most of us, however don’t read EULAs because they are long, boring and written in hard-to-understand legalese.
This battle is meant to be won and to cede up control to viruses via hard drive format is just retrogressive, malicious softwares are written by human beings, if studied well they can be easily overcome by all human beings and always remember to back up your files.

Quiz Of The Day

Previous article

Tech Jobs: Information Systems Analyst (Web based)

Next article


Leave a reply

Your email address will not be published. Required fields are marked *