Some simple tricks to deal with Malware
TipsMake.com - Malware seems to become more and more intelligent and cause more unintended consequences. Installing malware detection tools (MalwareBytes, HiJackThis, ComboFix .) on the computer is not a redundant task. But in some cases, for many reasons (blocked by malware itself) these tools may have problems starting up. At this time, users can refer to some solutions below.
1. Malware is blocking the names of special applications
Because many popular software tools have fixed file names, they can be blocked by malware. Then, try changing the name of the application executable file name (for example, "mbam.exe " MalwareBytes ) to " virus.com "
Sometimes this method will work and users can launch the application as a standalone dotcom file. Please rename the file as before when done.
2. Malware is blocking all applications
The common thing is that malware blocks all applications (and notifies that the computer is infected while it is a source of infection). Try logging off the current user account. Now log in again and press Ctrl + Alt + Del . The Task Manager window appears. If you know the file names are not malicious files, you can easily identify malware because they usually have names of 8 to 14 characters long (eg fjh2efhn9.exe ). Please end the process and find the original file and delete it. Once the primary source of infection has been eliminated, download and run a tool like MalwareBytes to clean up the remaining files and registry.
But in some cases, malware can block the Task Manager window. Now remove the hard drive and clean up the source of infection by attaching it to another computer and using the malware removal tools on that computer.
3. Malware corrupts the exe file
If you launch an executable file and get an ' open file type with ' dialog box, that means that the malware has removed or changed the registry to teach Windows how to open executable files. Here is how to fix registry errors to fix this problem. Open notepad and type or copy the following registry entry:
[HKEY_CLASSES_ROOT.exe]
@ = "exefile"
"Content Type" = "application / x-msdownload"
[HKEY_CLASSES_ROOT.exePersistentHandler]
@ = "{098f2470-bae0-11cd-b579-08002b30bfeb}"
[HKEY_CLASSES_ROOTexefile]
@ = "Application"
"EditFlags" = hex: 38.07,00.00
"TileInfo" = "prop: FileDescription; Company; FileVersion"
"InfoTip" = "prop: FileDescription; Company; FileVersion; Create; Size"
[HKEY_CLASSES_ROOTexefileDefaultIcon]
@ = "% 1"
[HKEY_CLASSES_ROOTexefileshell]
[HKEY_CLASSES_ROOTexefileshellopen]
"EditFlags" = hex: 00,00,00.00
[HKEY_CLASSES_ROOTexefileshellopencommand]
@ = ""% 1 "% *"
[HKEY_CLASSES_ROOTexefileshellrunas]
[HKEY_CLASSES_ROOTexefileshellrunascommand]
@ = ""% 1 "% *"
[HKEY_CLASSES_ROOTexefileshellex]
[HKEY_CLASSES_ROOTexefileshellexDropHandler]
@ = "{86C86720-42A0-1069-A2E8-08002B30309D}" "
[HKEY_CLASSES_ROOTexefileshellexPropertySheetHandlers]
[HKEY_CLASSES_ROOTexefileshellexPropertySheetHandlersPEAnalyser]
@ = "{09A63660-16F9-11d0-B1DF-004F56001CA7}"
[HKEY_CLASSES_ROOTexefileshellexPropertySheetHandlersPifProps]
@ = "{86F19A00-42A0-1069-A2E9-08002B30309D}" "
[HKEY_CLASSES_ROOTexefileshellexPropertySheetHandlersShimLayer Property Page]
@ = "{513D916F-2A8E-4F51-AEAB-0CBC76FB1AF8}"
Save the file as ' Exe-fix.reg ' and run the file. It will restore the operation for executable files.
4. Many variants of malware can hide all files on the computer
There is a simple command that the user can use to display these files. Open command prompt : Start -> Run -> cmd and press enter. Enter the command attrib -h C: *. * / S / d . The command will show all the files and folders in drive C. Repeat the command and replace C with another drive letter. Type attrib /? to see all options.
Malware not only hides files on your computer but also moves items in the Start Menu . Items in the Start Menu are often moved to the user's temp folder. Type % temp% in the title bar to enter this folder. Often items are pushed into the same folder starting with the letter "S" or " SE" . Find the directories where the user can find items and place them in the same location.
Malware constantly changes and does everything to prevent users from removing them. Therefore, users should regularly update the malware removal tool to keep their computer safe and smooth. Besides, manual methods are also not bad solutions in many cases if the user has knowledge of the system.
You should read it
- 10 typical malware types
- How to use Malwarebytes Anti-Malware Home to find, remove spyware, ads, malicious ... on your computer
- Download the malware removal tool and clean up Malware Hunter PRO computer for $ 49.95 for free
- 9 things to do when detecting a computer infected with malware
- How many types of malware do you know and how to prevent them?
- Samsung website contains Trojan
- Link download IObit Malware Fighter 8.4.0.760
- What is Safe Malware? Why is it so dangerous?
May be interested
- What is Malware? What kind of attack is Malware?guide you how to recognize malware, how to prevent malware and as well as what to do when you encounter a malware infected website.
- The 4 most common ways to spread malware todayif there's one thing that poses a threat to all users of technology, it's malware. this malware can be extremely dangerous, harmful, and comes in many different forms.
- Learn about polymorphic malware and super polymorphismas mentioned in previous articles, malware (malware) has become a big problem. unrighteous people are taking advantage of ransomware, keyloggers, bank trojans and cryptojacker to redeem themselves from the victims.
- What is Goldoson Malware? How can you protect yourself?an example of malware is goldoson. the malware has infected more than 60 legitimate google play apps, which have been downloaded more than 100 million times in total.
- What is rooting malware? What can you do to protect yourself?rooting malware works by gaining root access to the victim's phone. this gives the malware more control over the phone.
- What is Malware Joker? How to fight Malware Joker?joker malware is another threat to your privacy and sensitive information. recently, it attacked android mobile devices globally, resulting in the need to remove some applications from the google play store.
- 5 types of malware on Androidmalware or malware can affect mobile devices as well as computers. a little bit of knowledge and proper precautions can protect you from threats like ransomware and sextortion scam.
- The 5 most 'dirty' tricks of malwareif cyber criminals are behind a little more silly virus, trojan and destructive software, we don't have to worry that much. only thing, when the security industry has advanced 'one step' in preventing attacks, they immediately respond to the attack.
- Modular Malware - New stealth attack method to steal datasome malware variants can use different modules to change the way they affect the target system. so what is modular malware and how does it work?
- Malicious Code EvilGnome attacks Linux systems with many rare tricksthis backdoor implant is named evilgnome, and is still not recognized by any anti-malware tool on virustotal.