Computer malicious program forced installation how to clean up

Source: Internet
Author: User
Tags command line

Step one: Find out where these malicious rogue software is hiding.

1, encounter such malicious rogue software, the first thing to do is to break the net, because some of these software to rely on the network to install, the first to break off the network, and some will not install.

Then "All Programs" in the Start menu, look for software that you don't know, and uninstall if there's an uninstall.

2, can see the cleaning up, to clean out the unseen, it will go to Task Manager to find the process, first open Task Manager, method, taskbar Right, select the menu "Task Manager" can be, or with CTRL + Alt + DEL pull out task manager.

Into the task Manager, eliminate those familiar, and then remember those unfamiliar processes.

3, because the task Manager cannot display the path, you can open the destination address, or use the optimization master, so that the master of the optimization of the rogue software path, into the optimization of the master, select the left side of the "system worry", and then select "System security Worry", and then the right window, click the "Process Management" button.

4, into the optimization master's Process Management window, found in the top of the task manager just found in the unfamiliar process, and then remember the following "command line and parameters," the address of this line. Put all the unfamiliar processes in some way to find the path.

5, then record these paths in Notepad, one by one write out. These are the paths that will be followed by this path to find rogue software.

6, then follow the path of the record to the rogue Software installation folder, these software are generally installed in the C:Program Files folder.

After finding out, go into these folders and see if there is an unloaded file with it, if there is, uninstall it with it.

Step Two: Uninstall these malicious streaming software

1, these rogue software, most of which are not with the uninstall file, if the direct deletion, is not completely remove clean, then use the uninstall function of Windows System Uninstall, first to the control Panel, find "Add and Remove Programs", click to enter.

2, after entering, find these rogue software, select it, will be in the lower right side pop-up "Delete" button, click "Delete", start unloading. There will definitely be a prompt window, press "Yes", and if there are other prompts, select it in the direction of the uninstall.

3, deleted, and then delete other rogue software, each by the above method, all delete them.

4, uninstall these rogue software, back to the desktop.

5, the above uninstall is in the "Add and Remove Programs" can be seen, if not appear in the "Add and Remove Programs", then how to uninstall it?

Can be a third-party software intelligent Uninstall, this article with "Optimization Master" to demonstrate, into the optimization master, select the left side of the "System Cleanup", and then select its "Software intelligent Uninstall", and then the right point "other" button.

6, will open a file selection box, to find those who did not uninstall files, also not in the "Add and Remove Programs" in the software, select its main program, is the following exe suffix file, analysis, all tick, click on the right side of the uninstall.

7, the optimization master will begin to uninstall it, of course, if the pop-up is backed up, then there is no need, the rogue software is also ready, all deleted.

Step three: Clear the malicious software residue files

1, although the above has been the software to uninstall, as if no problem, in fact, there will be problems, but also very important, because there are residue files, these files pop-up windows, so that you are annoyed, if not now find out, later to find more trouble.

First go to c:program files to find these installation folders, delete all.

2, and then to the User Configuration folder to see if there are any residual files, the path is c:documents and settingsadministratorapplication Data, if any, deleted.

3, and then to the system to temporarily cache the folder, the files inside all deleted, this folder path for c:documents and Settingsadministratorlocal settingstemp.

4, the next is to clear the registry information, clean up the registry has a lot of tools, since the use of worry master, use it to clean up, select the "System Cleanup" under the "Registry information cleanup", and then in the right window point "scan", after scanning, will be scanned to delete all.

5, the last to clear is "task scheduling", because this software is started, when the boot start. will automatically start these software, into the task planning method, start-Search keywords: task planning, after entering, sure enough there are scheduled to start the plan, directly delete it.

In today's China, malware is forced to install up to a number of well-known software, if you install a sensitive program anti-virus software will be aware of the natural will be intercepted, but some slow development of computers in the country does not have anti-virus software, so this malicious program to live in these places can be paralyzed in minutes a computer, please believe that anti-virus software, TA is not as weak as he thought. Computer knowledge

Related Article

E-Commerce Solutions

Leverage the same tools powering the Alibaba Ecosystem

Learn more >

Apsara Conference 2019

The Rise of Data Intelligence, September 25th - 27th, Hangzhou, China

Learn more >

Alibaba Cloud Free Trial

Learn and experience the power of Alibaba Cloud with a free trial worth $300-1200 USD

Learn more >

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.