Attempted malware removal (valuable find), unsure if my system is secure now


Title: Navigating the Aftermath of Malware: My Journey to Removing “Great Discover” Trojan

In today’s digital age, encountering malware is a nerve-wracking experience that many users face. Recently, I found myself dealing with a particularly troublesome form of malware known as “Great Discover.” Although I last dealt with malware seven years ago, this was my first encounter with a Trojan. Given my limited knowledge about antivirus software and malware scanners, I felt overwhelmed and uncertain about the steps needed to ensure my system’s safety. In this post, I will share my experience in hopes that it may assist others facing similar challenges.

Discovering the Malware

My ordeal began when I accidentally downloaded the “Great Discover” malware. Initial research provided scant information—just one removal guide and a couple of YouTube videos. Determined to find a solution, I embarked on a thorough process of elimination.

Step-by-Step Removal Process

  1. Identifying the Intruder: I first noticed an unusual program running in my system tray. Clicking on it revealed a pop-up with instructions for removal that included solving an impossible captcha. After a quick online search, I learned that “Great Discover” is a Trojan known for its cryptocurrency mining capabilities, something I couldn’t fully grasp at the time.

  2. Browser Cleanup: Concerned about potential browser hijacking, I began by clearing my browser history and restoring default settings. I then diligently removed any unfamiliar extensions that could pose a threat.

  3. File Deletion: Next, I delved into my system files located in “C:\Program Files” and “C:\Program Files (x86).” I deleted numerous folders with unfamiliar names, including some that had been added several months prior—creating a sense of urgency.

  4. Control Panel Scrutiny: I accessed the Control Panel to review installed programs, uninstalling anything that appeared suspicious or unfamiliar.

  5. Malware Scanning: After removing potentially harmful files, I downloaded Malwarebytes for a thorough scan. The first scan yielded one positive result, which I quarantined and subsequently deleted. Running a second scan confirmed that my device was clear. Not stopping there, I utilized Kaspersky’s virus removal tool for an additional layer of security.

  6. System Resource Check: I opened Task Manager to monitor resource usage, confirming that no rogue applications were consuming system resources.

  7. Host File Verification: Following a suggestion from the removal guide,

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *