Virus or Malware Infection? Remove It Safely on Windows
🛡️ Virus or Malware Infection? Remove It Safely on Windows
Malware spreads fast and can steal data, encrypt files, or hijack your browser. The safest path is to contain the threat first, then remediate in a controlled way, and finally lock things down so it doesn’t happen again.
Here’s a validated sequence that prioritises safety and data integrity.
🛑 1. Isolate the Device (Containment)
• Disconnect Wi-Fi/Ethernet and unplug external drives
• If this is a work PC, notify your manager/IT immediately
• Do not log in to banking or email from the infected device
💾 2. Preserve What Matters
• If files are accessible, copy critical documents to a clean USB or cloud location you trust
• Avoid copying EXE/MSI/BAT files to prevent migrating the infection
🔍 3. Confirm the Symptoms
• Look for unknown processes, sudden pop-ups, fake antivirus alerts, or browser redirects
• Note recent installs or downloads — you’ll remove these later
🧯 4. Boot to Safe Mode with Networking (Controlled Environment)
• Windows: Settings > System > Recovery > Advanced Startup > Restart now → Troubleshoot > Advanced options > Startup Settings > Restart → choose Safe Mode with Networking
• This loads minimal drivers so malware has fewer places to hide
🧪 5. Run an Initial Threat Scan (Independent Tools)
• Use Microsoft Defender Offline scan or a reputable on-demand scanner (one at a time)
• Quarantine anything detected; keep a record of what was found
🧼 6. Remove Recently Added Suspicious Software
• Settings > Apps > Installed apps — uninstall unknown or recently added programs
• Check browser extensions; remove anything unfamiliar or newly installed
🧹 7. Clean Browser Hijacks
• Reset default browser settings (Chrome/Edge/Firefox) and clear cache
• Set your homepage, search engine, and new tab back to defaults
• Re-enable only essential extensions
🔐 8. Check Persistence & Start-up Entries
• Task Manager > Startup apps — disable unknown entries
• Settings > Apps > Startup — turn off items you don’t recognise
• Review Scheduled Tasks (Task Scheduler) for odd entries
🧬 9. Second Opinion Scans
• Run a different reputable scanner for a follow-up pass (don’t run two real-time engines at once)
• Reboot, then scan again until you get a clean result
🔑 10. Reset Passwords from a Clean Device
• Change passwords for email, Microsoft 365, banking, and social accounts from a separate, known-clean device
• Enable MFA on all critical accounts
🧱 11. Patch the System and Apps
• Windows Update → install all security and cumulative updates
• Update browsers, Java (if used), PDF readers, and other common targets
🗂️ 12. Restore Damaged Files (Safely)
• If files are corrupted/encrypted and you have backups, restore from a known clean backup
• Do not pay ransoms; contact support for options and incident steps
🧩 13. Hardening & Prevention (Keep It Clean)
• Keep a reputable, business-grade endpoint security tool active (real-time + web protection)
• Turn on SmartScreen, Controlled Folder Access (Windows), and automatic updates
• Use a standard (non-admin) account for everyday work
• Consider DNS filtering and mail threat protection for Microsoft 365
💡 Need Robust Protection?
We can supply and configure reliable endpoint security with proper Microsoft 365 exclusions and policy tuning — licences available. Prefer PAYG? We’ll set it up and hand it over.
🆘 Still Infected or Unsure?
If anything looks suspicious after cleaning, stop using the device for sensitive logins. Call IT Mate can perform a deeper malware removal, data recovery checks, and security hardening — remote or onsite across Australia.
Tech Support That Comes to You — Or Connects Remotely
No call centres. No confusing jargon. Just fast, reliable support from real technicians who speak your language. Whether it’s a one-off issue or ongoing help — we’ve got you covered.
🏠 Residential | 💼 Business | 🔧 Onsite & Remote Support
Book a Tech Visit