tried to remove a malware (great discover), not sure if I’m safe yet

Navigating the malware Maze: My Battle with “Great Discover” Trojan

In today’s digital age, the threat of malware is a prevalent concern for many users. Recently, I encountered a troublesome piece of malware known as “Great Discover,” and I wanted to share my journey in combating this menace. Whether you’re a tech novice or a seasoned expert, my experience may resonate with you and perhaps even provide guidance in your own fight against malware.

A Disclaimer on My Background with Malware

It’s important to note that my last encounter with malware was seven years ago, and while I managed to sidestep various viruses since then, tackling a trojan for the first time has been another challenge entirely. I lack deep technical knowledge about how antivirus Software functions and often find myself struggling to comprehend the jargon involved. With this post, I aim to outline my process in detail, hoping it serves as a resource for anyone else facing similar challenges.

The Initial Encounter

This morning started off suspiciously when I inadvertently downloaded “Great Discover.” In my search for more information, I stumbled upon a single how-to-remove guide and a couple of YouTube videos that promised assistance. Despite the limited resources, I was determined to rid my system of this infection.

Upon discovering the malware, I noticed an unusual program running in my system tray. Clicking on it led to a prompt instructing me to uninstall it, but it came with an impassable captcha that prevented me from proceeding. It didn’t take long for a quick Google search to reveal that this Software was indeed malware, specifically a trojan used for cryptocurrency mining—I was left perplexed by this notion.

Steps Taken to Combat the Malware

1. Browser Cleanup

My first step was to take action on my browser. I cleared my browser history and reset the settings to their default configurations. Subsequently, I combed through the extensions tab and removed any suspicious ones that I didn’t recall adding.

2. File Deletion

Then, I ventured to C:\Program Files and C:\Program Files (x86), eliminating numerous folders with unfamiliar names—some dated months back, which raised my concern.

3. Control Panel Checking

Next, I accessed the Control Panel and navigated to Programs and Features. Here, I meticulously searched for any Software that I didn’t remember installing, removing all questionable applications.

Scanning for Additional Threats

Realizing that other threats might have accompanied

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *