Successfully Navigating the Removal of the “Great Discover” malware: A Comprehensive Guide
Recently, I found myself grappling with a malware infection for the first time in seven years, specifically a trojan known as “Great Discover.” My previous experiences with viruses prepared me somewhat, but this particular situation was unique and posed its own set of challenges. While I understand that technical jargon can be overwhelming, I hope my detailed account of the steps I took will resonate with others facing similar issues.
The Discovery
This morning, I inadvertently downloaded “Great Discover.” Initial research turned up limited resources, primarily a single how-to-remove guide and a couple of videos on YouTube. Feeling determined, I documented each step I undertook in the hopes that it may aid others in the future.
Upon discovering the malware, I noticed an unfamiliar program icon in my system tray. Clicking on it revealed a pop-up with uninstall instructions, but it required solving a captcha that was, frankly, impossible to complete. A quick Google search confirmed my suspicion: it was malware designed for cryptocurrency mining—an activity I was unfamiliar with.
Taking Action
With urgency, I took several steps to cleanse my system:
Step 1: Browser Cleanup
My first course of action was to clear my browser history and reset all settings to factory defaults. I noticed that Google was suggesting dubious extensions, which led me to the extensions tab, where I meticulously removed anything that seemed suspicious or unfamiliar.
Step 2: Removing Unwanted Programs
Next, I navigated to C:\Program Files
and C:\Program Files (x86)
to look for any unusual folders or files. I deleted numerous suspicious directories that I recognized were not created by me, including some that reflected dates from months prior.
Step 3: Control Panel Inspection
I then accessed the Control Panel and scrutinized the programs listed under Programs and Features. This process involved uninstalling any Software that was unfamiliar and appeared unnecessary.
Step 4: Comprehensive Malware Scanning
To eliminate the possibility of residual threats, I installed Malwarebytes and performed a full scan. The initial scan detected one issue, which I quarantined and subsequently eliminated. A second scan revealed that my system was clean. Still cautious, I proceeded to download Kaspersky’s virus removal tool, running a full system scan that returned no threats.
Step 5: Task Manager Review
Next, I opened Task Manager to examine any processes consuming excessive resources. Thankfully
Share this content: