Attempted malware removal and made an important discovery—still uncertain about my current security status

Overcoming malware: My Experience with the “Great Discover” Trojan

Introduction

Today, I embarked on a challenging journey of tackling malware for the first time in seven years. Having navigated through numerous viruses in the past, I found myself unexpectedly up against a trojan known as “Great Discover.” With only a scant amount of information available online and minimal experience with malware removal, I felt it necessary to document my steps in detail. This post aims to guide and reassure others who may find themselves in a similar predicament.

Encountering the Malware

This morning, I unwittingly downloaded a program named “Great Discover.” My first clue that something was amiss came from a strange application appearing in my system tray. Upon clicking it, I was presented with a pop-up instructing me on how to uninstall it. However, the process was thwarted by an unreasonably difficult CAPTCHA that I could not solve, leading me to suspect that this application was indeed malicious. A quick Google search confirmed my fears—it was identified as a trojan used for cryptocurrency mining, an activity I wasn’t even familiar with.

Taking Action

Concerned for my system’s safety, I took the following steps to remove the malware and secure my computer:

  1. Browser Cleanup: First, I thoroughly cleared my browser history and reset my settings to their defaults. I also checked the extensions tab and removed any unfamiliar add-ons that may have been introduced without my consent.

  2. Program Removal: I delved into the directories C:\Program Files and C:\Program Files (x86) to rid my system of several suspicious folders with misleading names. Some of these folders had timestamps indicating they were created months prior, which was bewildering.

  3. Control Panel Check: Next, I accessed the Control Panel and reviewed the list of installed programs. Any applications that I couldn’t recognize were promptly uninstalled.

  4. Malware Scanning: To ensure thoroughness, I installed Malwarebytes and conducted a complete scan, which initially flagged one potential threat. I quarantined and deleted it, then scanned again—this time, the scan came back clean. For added peace of mind, I also ran Kaspersky’s virus removal tool, yielding similar positive results.

  5. Task Manager Review: I opened Task Manager to monitor resource usage, ensuring no rogue applications were consuming my CPU or memory. Fortunately, the intrusive program had vanished, but I noted some

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *