Share via

How to remove ransomware/trojan from your computer?

Anonymous
2020-06-21T13:35:21+00:00

How to remove ransomware/trojan from your computer? It's simple!

Ransomeware:

Step 1: Boot into Safe Mode. (F8)

Step 2: Launch your Antivirus Software. (such as Windows Defender or MalwareBytes)

Step 3: Perform an Virus Scan using your Antivirus Software.

Step 4: After it detects all ransomeware files, click the remove button.

Step 5: Boot into the normal Windows 7.

Step 6: Open your browser. (i recommend IE 11 or Edge)

Step 7: Search for a decryptor file. (make sure it's not that one included in the ransomware)

Step 8: Run the downloded file.

Step 9: Follow instructions on the screen.

Step 10: Run the installed decryptor. (it's the last chance to make sure it's not that one included in the ransomware)

Step 11: Scan for files.

Step 12: Repair the files. (you may need to buy)

Step 13: That's all! Now your documents, pictures, letters, videos and other non-system files are now decrypted.

Future Prevention: As of Windows 7 end of support, you should upgarde to the newest, easiest, fast version of Windows, which is Windows 10.

Trojan:

Step 1: Insert a Windows 7 Installation Media into your PC/Laptop.

Step 2: Click the "Next" button.

Step 3: Click the "Repair your Computer".

Step 4: Select "Windows 7". If it is not present, select the 2nd box and click "Next".

Step 5: Select "Startup Repair".

Step 6: Once is done, reboot.

Step 7: Now you can boot in Windows.

Future Prevention: As of Windows 7 end of support, you should upgarde to the newest, easiest, fast version of Windows, which is Windows 10.

Thanks for reading! If you have problems, feel free to ask in comments and i'll reply in the shortest time i can.

Windows for home | Previous Windows versions | Security and privacy

Locked Question. This question was migrated from the Microsoft Support Community. You can vote on whether it's helpful, but you can't add comments or replies or follow the question.

0 comments No comments

2 answers

Sort by: Most helpful
  1. quietman7 MVP Alumni 19,735 Reputation points Volunteer Moderator
    2020-06-22T01:00:47+00:00

    Most crypto malware ransomware is typically programmed to automatically remove itself...the malicious files responsible for the infection...after the encrypting is done since they are no longer needed but there are some exceptions. The malware developers usually do this to make it more difficult for security researchers to find and analyze their malicious payload. That also explains why many security scanners do not find anything after the fact. The encrypted files do not contain malicious code so they are safe. Unfortunately, most victims do not realize they have been infected until the ransomware displays the ransom note and the files have already been encrypted. In some cases there may be no ransom note and discovery only occurs at a later time when attempting to open an encrypted file. As such, many victims don't know how long the malware was on the system before being alerted or if other malware was downloaded and installed along with the ransomware which could still be present on the infected computer.

    However, some crypto malware (i.e. STOP/Djvu Ransomware) are known to leave behind malicious components leaving behind malicious components that will encrypt any new files saved and re-encrypt any files victims previously managed to decrypt. Other ransomware (i.e. Phobos Ransomware) are very aggressive and do not end on a single run...they will run multiple times ensuring repeated infection. There are a few ransomwares that will store a victim's master key in the registry and if removed, the next time the computer is restarted, the ransomware could create a new master key and begin encrypting files again. That means encrypted data by two different keys.

    Therefore it is recommended to isolate the infected computer from other devices and thoroughly check the system to ensure no such malicious components have been left behind. IT folks and advanced users who are ransomware victims can use Farbar Recovery Scan Tool (FRST), an advanced specialized tool designed to investigate for the presence of malicious and suspicious files. FRST logs provide detailed information about your system, registry loading points, services, driver services, Netsvcs entries, known DLLs, drives, partition specifications and will also list system files that could be patched by malware.

    There are a few ransomware variants that will add an entry to Run and RunOnce Registry Keys so the malicious executable or ransom screen always displays itself on each restart of the computer. In such cases, victims should look for a related entry under the Startup tab in Windows System Configuration Utility (msconfig) or use a tool such as Autoruns to search for and remove any malicious entries.

    Important Note: Some ransomware have been known toinstall password stealing Trojans on victim's computer to steal account credentials, cryptocurrency wallets, desktop files, and more. It is imperative that you change all passwords for your computer to include those used for banking, taxes, email, eBay, paypal and any online activities which require a username and password. You should consider them to be compromised and change passwords from a clean computer as a precaution, not the infected one.

    Disinfection will not help with decryption of any files affected by the ransomware.

    .

    Before doing anything, it is recommended to create a copy or image of the entire hard drive or remove the hard drive, store it away and replace it with a new hard drive then a fresh install of Windows. Doing that allows you to save the complete state of your system including all encrypted files, ransom notes, key data files (if applicable) and registry entries containing possible information which may be needed in the event that a free decryption solution is developed in the future.

    2 people found this answer helpful.
    0 comments No comments
  2. Reza-Ameri 45,806 Reputation points Volunteer Moderator
    2020-06-21T14:20:59+00:00

    Thank you for sharing these tips.

    However, these steps might solve general issues with some malwares , for example in some cases you could remove Trojan just with preforming scan and you don't need to boot Windows 7 installer. 

    You don't need to use Windows installer unless there is a problem with booting or you have to reinstall Windows.

    In many cases, you could use Windows Defender Offline instead:

    https://support.microsoft.com/en-us/help/17466/windows-microsoft-defender-offline-help-protect-my-pc

    And for ransomwares, we recommend take a look at:

    https://support.microsoft.com/en-us/help/4013550/windows-protect-your-pc-from-ransomware

    0 comments No comments