2 Remove Virus

Manual security threats removal

Users not always turn to anti-malware software in order to delete threats, and sometimes choose to do it themselves. You can use these guides to help you remove some malicious threats.

Checking for and killing malicious processes

A process in essentially a program that is currently active. It uses some of your computer’s resources to run and if you were to kill its process, it would stop being active. Killing a process can be quite useful when a program is misbehaving or you can’t close it. It’s also useful when your computer is infected with malware. Assuming you don’t have anti-malware software, you can check for strange processes currently running on your computer by accessing the Task Manager.

There are a couple of ways to do this. You can use the combination of Ctrl + Alt + Delete and then select Task Manger, or Ctrl + Shift +Esc. Alternatively, you can do it via run.

Now that you have accessed Task Manager, you can check and end weird processes. Look for ones using a lot of your CPU, and research any strange ones you encounter. If your search turns up with results about it being malicious, end the process.

We suggest you always research a process before you end it to make sure that it’s not something your Widows is running.

Preventing the threat from launching upon startup

For your convenience, some programs are set to launch whenever your computer loads. This can be done by you or the program itself. It’s not only trustworthy programs that do this, malicious ones may also set to launch upon startup. Bogus anti-malware programs are especially guilty of this. They will start ‘scanning’ your computer for supposed threats every time you launch your computer. To prevent a program from launching automatically, follow these steps.

Deleting a file

If you don’t have anti-malware software installed, you would need to find and delete the threat yourself, and that includes all files related to it. First of all, you will need to make hidden files visible.

Now all files will be visible.

Ensure that you delete all files related to the threat.