Virus Removal Checklist

Malicious software can cause significant damage to a computer, steal personal information, and even compromise the security of an entire network. If you believe that you may have malware on your computer, is essential to take the appropriate steps to remove any viruses or malware that are found. Remember, if in doubt, always reset your password through reset.uah.edu as an extra precautionary measure.

Checklist

  1. Run a full system scan: The first step in checking for viruses and malware is to run a full system scan on your computer. This can typically be done through the built-in antivirus software or a third-party program. Make sure to run a scan on all drives, including external ones, and set it to scan all files, including hidden and system files.

  2. Check for suspicious programs: Check the list of installed programs for any that seem suspicious or unfamiliar. These programs may be malware that has been installed on the computer.

  3. Check the Task Manager: Open the task manager and check the list of running processes for any that seem suspicious or are consuming a lot of resources.

  4. Check the Startup folder: Check the Startup folder in the Start menu for any programs that are set to start automatically when the computer boots up. This is a common place for malware to hide.

  5. Check for rogue browser extensions: Check the browser for any suspicious or rogue extensions that may have been installed without your knowledge.

  6. Check for any suspicious network activity: Check the computer's network activity to see if there is any suspicious incoming or outgoing traffic.

  7. Check for any suspicious files: Check the computer for any suspicious files, especially in the Temp and AppData folders.

  8. Check for any suspicious registry keys: Check the computer's registry for any suspicious keys or values.

  9. Check for any suspicious scheduled tasks: Check the computer's scheduled tasks for any that seem suspicious or are set to run at unusual times.

Removal Steps

  1. Remove any suspicious programs: Uninstall any suspicious programs that were found during the check.

  2. Remove any suspicious browser extensions: Remove any suspicious or rogue browser extensions that were found.

  3. Remove any suspicious files or registry keys: Delete any suspicious files or registry keys that were found.

  4. Remove any suspicious scheduled tasks: Remove any suspicious scheduled tasks that were found.

  5. Run a scan with a secondary malware removal tool: Run a scan with a secondary malware removal tool to ensure that all malware has been removed.

Prevention Steps

  1. Keep the computer's antivirus software up to date: Make sure that the computer's antivirus software is up to date and that it is set to run regular full system scans.

  2. Keep the computer's operating system up to date: Make sure that the computer's operating system is up to date with the latest security patches.

  3. Use a firewall: Use a firewall to block any suspicious network activity.

  4. Use a browser with a built-in pop-up blocker: Use a browser that has a built-in pop-up blocker to prevent pop-up ads from installing malware on the computer.

  5. Be cautious when opening email attachments: Be cautious when opening email attachments, especially from unknown senders.