Version 8: “Attempted Malware Removal: Exciting Find but Still Uncertain About My Security”

My Journey in Tackling Malware: Steps Taken Against “Great Discover”

Today, I experienced the unsettling challenge of dealing with malware for the first time in seven years and, interestingly enough, this was my initial encounter with a trojan. After numerous run-ins with viruses in the past, I felt equipped to handle the situation, yet I quickly found myself lost in the complexities of malware removal. This blog post is crafted to document my steps in hopes that it might aid others facing a similar struggle.

The Discovery

This morning, my day took a turn when I downloaded a malware program known as “Great Discover.” Unfortunately, information on this specific malware was scarce, limited to one removal guide and a couple of YouTube videos. I found myself in need of advice on ensuring my system was completely secure following this incident.

Initial Investigation

Upon launching my computer, I noticed an unfamiliar program in the system tray. Clicking on it revealed a pop-up prompting me to follow steps to uninstall it—standard procedure. However, this process was complicated by an unyielding captcha that I simply could not solve. A quick Google search confirmed my fear: I was dealing with a trojan designed for cryptocurrency mining, a term that was completely foreign to me.

Cleaning Up My Browser

I knew the first step was to restore my browser’s integrity, so I thoroughly cleaned my browser history and reset the settings to their default state. I then accessed the extensions tab and removed all unfamiliar extensions, taking a cautious approach in ensuring there was no lingering threat.

Uninstalling Suspicious Programs

Next, I navigated to C:\Program Files and C:\Program Files (x86) to purge numerous folders with cryptic names that I hadn’t installed. This included files that appeared to have been added months prior—something I found quite alarming.

To further solidify my defenses, I opened the Control Panel and combed through the list of installed programs in the Programs and Features section, removing anything that raised my suspicions.

Running Malware Scans

Following these initial steps, I turned to trusted cleaning software, installing Malwarebytes for a thorough scan. The first scan detected one threat, which I quarantined and subsequently deleted. To be extra cautious, I ran another scan that came up clean. Still not convinced, I also downloaded Kaspersky’s virus removal tool and performed a full system scan, which confirmed my system was clear.

System Resource Check

I then opened Task

Share this content:

One Comment

  1. It sounds like you’ve taken some solid initial steps in identifying and removing the malware threat. When dealing with persistent or unknown malware like “Great Discover,” here are some additional recommendations:

    • Ensure your operating system and all security software are fully up to date. Regular updates patch security vulnerabilities that can be exploited by malware.
    • Consider booting into Safe Mode to perform scans; this can prevent malware from running and make removal easier.
    • Use multiple reputable malware removal tools, but make sure to run them in a safe environment to prevent any conflicts.
    • Review your browser and system startup entries using tools like Task Manager or MSConfig to locate suspicious processes or auto-start entries.
    • Check your scheduled tasks and services for any unfamiliar entries and disable or delete them if necessary.
    • Perform a thorough disk cleanup and consider resetting your browser settings again if needed. You might also want to reset your network settings to clear any residual malicious configurations.
    • For added security, change your passwords, especially for cryptocurrency accounts, and monitor your financial transactions for any unusual activity.
    • If you continue to experience issues or malware persists, it might be worthwhile to consider a clean reinstall of your OS or consult with a cybersecurity professional.

      Remember, maintaining regular backups and practicing good security hygiene can greatly reduce the risk of future infections. If

Leave a Reply

Your email address will not be published. Required fields are marked *