Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

How to Identify and Repair Malware or Virus Infected Computers

Résumé: This is an article that takes you through identifying and repairing a virus or malware infection on your computer. Dell strongly recommends you recover your system image on the computer instead. ...

Cet article concerne Cet article ne concerne pas Cet article n’est associé à aucun produit spécifique. Toutes les versions du produit ne sont pas identifiées dans cet article.

Instructions

Table of Contents:

  1. What level of support is possible for Malware and Virus infection Issues?
  2. What is the difference between Malware and a virus?
  3. What are the most common symptoms of a Malware of Virus infection?
  4. Malware Detection/system usability steps
  5. Scanning Software
  6. General Removal Guide
  7. Removing the Infection
  8. Other Removal Options
  9. Prevent Re-Infection

What level of support is possible for Malware and Virus infection Issues?

Dell’s standard practice is to recommend a clean install of the Operating System, once Malware or viruses have been detected. This resolves an infection issue 100% of the time.

Under a ProSupport warranty, our Technical support should always investigate and identify the infection has taken place. They should attempt to get the computer to a usable state. So that they can run anti-virus scans or determine if a clean reinstall should take place due to the level of infection on the computer.

NOTE: Some infections are not serious if you use the right tools to remove them. This information is provided for informational and educational purposes. Dell is not responsible for any loss of data from your computer. You run these tools at your own choice and risk.

Back to Top


What is the difference between Malware and a virus?

Malware, or malicious software, has become a catch-all term for several different types of infections. Some install themselves and create a simulated infection, corruption, or hardware failure, tricking you into purchasing their product to resolve the issue. This type is known as hostage-ware, ransom-ware, or scare-ware. There are malware infections that redirect your browser to sites that the creator has chosen. Alternatively, they redirect to a website that they are compensated for, based on the number of hits the site receives. Sometimes these infections can hide your entire root drive and all your subdirectories. Sometimes they capture your personal information and communicate back to the creator of the infection.

A virus, which has become a subset of malware, is a program that replicates and attaches itself to services or specific applications. Many malware payloads contain a virus file, such as a Trojan or a Worm, to help root the infection. Viruses were once an exclusive type of infection, but now they have been combined into infection packages of malware. Many malware packages incorporate rootkits to embed themselves into the kernel level of the operating system, making them stealthy and more difficult to remove.

Many items are often mistaken for computer infection. These can include tracking cookies, search hooks, or browser helper objects (BHOs). Although the presence of these can indicate infection, there must be an accompanying loader (.exe) file or kernel mode driver to present to confirm infection.

Back to Top


What are the most common symptoms of a Malware of Virus infection?

Although today’s malware can contain multiple payloads, here are some of the most common signs of infection:

  • Onscreen Warnings about computer infection from a source other than your anti-virus software
  • It redirects the browser or completely hijacks it
  • You cannot open any exe or Microsoft Installer (MSI) files
  • The inability to change wallpaper or any desktop settings
  • All entries under Start>Programs are empty and/or the C: Drive is blank
  • The anti-virus icon disappears from the system tray or cannot be started
  • Random pop-ups show on-screen either in or out of the browser
  • Unusual icons, erroneous start menu, or Device Manager entries appear

Back to Top


Malware Detection/system usability steps

Here are some steps to perform to confirm infection:

  1. Ask the question: Are there any pop-ups, redirects, or messages that have been experienced on the desktop or from the system tray?

  2. Has a recent virus or malware scan been run? If the anti-virus or malware removal tools do not run, then this is a positive sign that the computer may be infected.

  3. If the Internet or computer is inoperative due to infection, boot to Safe Mode with Networking. (using LAN only.) You can use the Process Explorer and Autoruns programs to test with. Most malware infections show themselves easily in these tools if they Run as Administrator in Windows. (Windows XP is always in kernel-mode in an administrator profile.)

Process Explorer example:

Process Explorer
Figure 1: Process Explorer

Autoruns Example of malware infection

Autoruns
Figure 2: Autoruns

  1. These programs or any other malware removal tools do not open, if the shell extension for .exe is blocked in the registry. Right-click the .exe file and rename the extension to .com. Attempt to run the tool. If it still does not open, boot to Safe Mode and attempt to run the tool again.

  2. If you have an active anti-virus subscription, you can attempt to remove the block on the anti-virus. Clearing any malicious entries in Autoruns and rebooting may allow .exe files to run again and you can update and scan with your anti-virus. Sometimes a kernel mode driver is installed in Device Manager to block the anti-virus software. It usually shows under Plug and Play Devices, and you must set Device Manager to Show Hidden Devices.

If positive malware identification is made, you can use one of the options below. Remember if it does not work, we can take you through a clean operating system reinstall to resolve the issue.

Back to Top


Scanning Software

Sometimes running a scanner is enough to remove most malware infections. You have most likely got an anti-virus program active on your computer, you should use another scanner for this check.

If your current anti-virus software did not stop the infection, you cannot expect it to find the problem now. We would recommend trying a new program.

NOTE: No anti-virus program can detect 100 percent of the millions of malware types and variants.

There are two main types of anti-virus.

Real-time anti-virus programs

They constantly watch for malware.

On-demand scanners

They search for malware infections when you open the program manually and run a scan.

NOTE: Ideally, only run one real-time anti-virus program on your computer simultaneously. However, you can keep a few on-demand scanners stored to run scans with multiple programs.

The best course of action is to use an on-demand scanner first and then follow up with a full scan by your real-time anti-virus program. There are several free and effective on-demand scanners available. You can find a list of the most common ones in the last section of this article.

Back to Top


General Removal Guide

Disconnect your computer from the Internet and do not use it until you are ready to remove the malware.

Think of it like cutting off all communications or putting a patient into a suspended state.

Boot your computer into Safe Mode. Only the minimum required programs and services are loaded in this option. If any malware is set to startup when Windows starts, booting in safe mode should prevent it.

To boot into Windows Safe Mode, follow whichever guide below matches your Operating System. This should bring up the Advanced Boot Options menu. Select Safe Mode with Networking and press the Enter key.

Your computer may run faster in Safe Mode. If it does, it could be a sign that your computer has a malware infection. It could also mean that you have a lot of legitimate programs that start up with Windows.

Delete your temporary files before starting any other steps. Doing this could speed up the virus scanning, but it clears the downloaded virus files and lessen the amount that the scanners have to check. You can do this through the Disk Cleanup utility or from the Internet options menu.

NOTE: Are you using Windows 11, Windows 10? Instead of seeing the safe mode screens, does the computer give a prompt asking for the Windows 10 product code? Use the link below to troubleshoot Windows 10 Black Screens.

The following link takes you to an article with general steps to take you through a removal of the most often encountered Malware types:

Back to Top


Removing the Infection

Note: Microsoft offers an intergrated Malware tool: Windows Comprehensive Security Information.

This guide uses Malwarebytes. I am using this piece of software as it is the software I am most used to and is freely available. You can find another program to do the same job if you prefer in Section 9 below. If you are following this guide, then go to their Support Site This hyperlink is taking you to a website outside of Dell Technologies. and install the Malwarebytes program. You must reconnect to the Internet for this. However, once the download is complete, disconnect from the Internet again. If you cannot access the Internet, or you cannot download Malwarebytes on your computer. You can download it on another computer and save it to a USB flash drive or CD/DVD and transfer it to the infected computer.

Run the setup and follow the on-screen InstallShield wizard. Malwarebytes checks for updates and then launches the user interface (UI).

NOTE: If it reports the database being outdated, choose Yes to download the updates and then click OK when prompted that they have been successfully installed.

Keep the default scan option 'Perform quick scan' and click the Scan button.

malwarebytes scan
Figure 3: Malwarebytes Scan

This program offers a full-scan option, however it is recommended that you perform the quick scan first. Depending on your computers specifications, the quick scan can take anywhere from 5 to 20 minutes. However, the full scan could take up to 60 minutes or more. You can see how many files or objects the software has already scanned. It shows how many of the files it has identified either as being malware or infected by malware.

If Malwarebytes disappears after it begins scanning and does not reopen, then the infection could be more serious and stopping the scanner from running. There are ways around this if you know the type of infection. However, you might be better off reinstalling Windows after backing up your files. It could be quicker, easier, and is guaranteed to resolve the infection.

If Malwarebytes' quick scan comes up empty, it displays a text file with the scan results. If you still think that your computer may have acquired some malware, consider running a full scan with Malwarebytes. You can use other scanners - such as one of the others above. If Malwarebytes finds the infection, it shows a warning box. To view the suspect files, click the Scan Results button. It should automatically select the ones that are dangerous for removal. If you want to remove other detected items, select them as well. Click the Remove Selected button to get rid of the selected files.

malwarebytes removal
Figure 4: Malwarebytes Removal

After removing the infections, Malwarebytes will open a log file listing the scan and removal results. Check to confirm that the anti-virus program successfully removed each item. Malwarebytes may also prompt you to restart your computer in order to complete the removal process, which you should do.

Do your problems persist even after you have run the quick scan and it has found and removed unwanted files? Follow the advice above and run a full scan with Malwarebytes or with the other scanners mentioned earlier. If the malware appears to be gone, run a full scan with your real-time anti-virus program to confirm that result.

If you cannot seem to remove the malware or if Windows is not working properly, you may have to reinstall Windows. See the appropriate link below for a guide to suit your particular situation.

Back to Top


Other Removal Options

Once an infection is identified, you have to decide on your next step.

There are several options for resolution:

  1. We can offer a Dell Solution Station for a technician to do the work for you, but this is a 'pay at point of need' service.

  2. We can always reinstall the operating system as well.

  3. If the infection is obvious, and can be located quickly then you may be able to attempt a removal.

If you can get online or use another computer with Internet, then you check out the following article and tools for more information:

Links to Dell's Knowledge Base Articles
Link to Microsoft's online Tool
Links to the various publishers security software uninstall tools from the manufacture.

Publishers list of Scanners, Cleaners, and other Security Utilities

Note: Dell does not support third-party tools. We are not responsible for any results from using these tools. Dell agents cannot stay on the line and take you through using these tools on the computer. You use these tools at your own risk.
Utility Link
VT Hash Check .zip This hyperlink is taking you to a website outside of Dell Technologies.
Utility Link
Free Edition Link This hyperlink is taking you to a website outside of Dell Technologies.
Utility Link
Hosts-Perm.bat Link This hyperlink is taking you to a website outside of Dell Technologies.
FixExec (/W32) Link This hyperlink is taking you to a website outside of Dell Technologies.
FixExec (/W64) Link This hyperlink is taking you to a website outside of Dell Technologies.
RKill Link This hyperlink is taking you to a website outside of Dell Technologies.
RKill (Download renamed as iExplore.exe) Link This hyperlink is taking you to a website outside of Dell Technologies.
Shortcut Cleaner Link This hyperlink is taking you to a website outside of Dell Technologies.
Unhide Link This hyperlink is taking you to a website outside of Dell Technologies.
Utility Link
Anti-Malware .exe This hyperlink is taking you to a website outside of Dell Technologies.
Emergency Kit .exe This hyperlink is taking you to a website outside of Dell Technologies.
Utility Link
GrantPerms (/W32) Link This hyperlink is taking you to a website outside of Dell Technologies.
GrantPerms (/W64) Link This hyperlink is taking you to a website outside of Dell Technologies.
ListParts (/W32) Link This hyperlink is taking you to a website outside of Dell Technologies.
ListParts (/W64) Link This hyperlink is taking you to a website outside of Dell Technologies.
MiniToolBox Link This hyperlink is taking you to a website outside of Dell Technologies.
Recovery Scan Tool (/W32) Link This hyperlink is taking you to a website outside of Dell Technologies.
Recovery Scan Tool (/W64) Link This hyperlink is taking you to a website outside of Dell Technologies.
Service Scanner Link This hyperlink is taking you to a website outside of Dell Technologies.
Utility Link
Defogger Link This hyperlink is taking you to a website outside of Dell Technologies.
Utility Link
Free Removal Tools Link This hyperlink is taking you to a website outside of Dell Technologies.
Utility Link
Microsoft Defender Link This hyperlink is taking you to a website outside of Dell Technologies.
Malicious Software Removal Tool Link This hyperlink is taking you to a website outside of Dell Technologies.
FakeRean Fix it Tool (/W32) Link This hyperlink is taking you to a website outside of Dell Technologies.
Rootkit Revealer (Sysinternals) Link This hyperlink is taking you to a website outside of Dell Technologies.
Utility Link
Malware Cleaner Link This hyperlink is taking you to a website outside of Dell Technologies.
Utility Link
OTL Link This hyperlink is taking you to a website outside of Dell Technologies.
 
Utility Link
Hitman Pro 3.7 (/32) .exe This hyperlink is taking you to a website outside of Dell Technologies.
Hitman Pro 3.7 (/64) .exe This hyperlink is taking you to a website outside of Dell Technologies.
Utility Link
Junkware Removal Tool Link This hyperlink is taking you to a website outside of Dell Technologies.
Utility Link
Anti-Threat Toolkit (/W32) Link This hyperlink is taking you to a website outside of Dell Technologies.
Anti-Threat Toolkit (/W64) Link This hyperlink is taking you to a website outside of Dell Technologies.
Fake AV-Removal Tool user interface (/W32) Link This hyperlink is taking you to a website outside of Dell Technologies.
Fake AV-Removal Took user interface (/W64) Link This hyperlink is taking you to a website outside of Dell Technologies.
Fake AV-Removal Tool CLI (/W32) Link This hyperlink is taking you to a website outside of Dell Technologies.
Fake AV-Removal Took CLI (/W64) Link This hyperlink is taking you to a website outside of Dell Technologies.
HijackThis Link This hyperlink is taking you to a website outside of Dell Technologies.
Rootkit Buster (/W32) .exe This hyperlink is taking you to a website outside of Dell Technologies.
Rootkit Buster (/W64) .exe This hyperlink is taking you to a website outside of Dell Technologies.

Back to Top


Prevent Re-Infection

To minimize the risk of a repeat infection, pay attention to the steps below:

  1. Keep your operating system and applications updated with the latest security patches. On Windows Update, these would be the updates that are marked as critical and security.

  2. When you are reading your email, do not open messages or attachments that are sent from unknown senders. If you are unsure, it is better to delete it than to expose your computer to reinfection.

  3. Ensure that you have a real-time anti-virus program running on your computer and see that it stays updated. If you do not want to spend money on a paid service, then you can install one of the free programs that are available.

  4. Scan any removable media before they are used. (This includes, floppies, CDs, DVDs, Flash USBs, and External hard drives.)

  5. Do not download unknown software from the web. The chance of infection from an unknown source is too high a risk.

  6. Scan all incoming email attachments or any other file that decide to download - before you use it.

  7. Do not open files that you receive by email or chat with the following extensions. .exe, .pif, .com, and .src.

  8. In addition to installing traditional anti-virus software, see our Security and anti-virus support page for more information.

Always double check any online accounts such as online banking, webmail, email, and social networking sites. Look for suspicious activity and change your passwords, you cannot tell what info the malware might have passed on.

If you have an automatic backup for your files, run virus scans on those backups. Confirm that it did not backup the infection as well. If virus scans are not possible such as online backups, most people decide to delete their old backups and save new versions.

Keep your software current. Ensure that you update then frequently. If you receive any messages about this and are not sure of their validity, then always contact the company in questions support to clarify it.

Back to Top

Informations supplémentaires

Secure  Get general information and guidance to secure your system/data on our Security and anti-virus page.

Produits concernés

Alienware, Inspiron, Legacy Desktop Models, OptiPlex, Vostro, XPS, G Series, G Series, Alienware, Inspiron, Latitude, Vostro, XPS, Legacy Laptop Models, Latitude Tablets, Surface, Venue, XPS Tablets, Fixed Workstations
Propriétés de l’article
Numéro d’article: 000129494
Type d’article: How To
Dernière modification: 28 Aug 2024
Version:  13
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.