My computer has a virus—what should I do? (Preliminary malware troubleshooting)KB Solution ID: SOLN2505|Last Revised: November 11, 2014
- You suspect that your computer is infected with a virus or malware (such as Poweliks)
- You were directed by ESET Customer Care to complete Preliminary malware troubleshooting
- Bookmark/save this article
Before proceeding we highly recommend that you bookmark this article in your web browser , print it for reference or view it on another device so that you can easily return to it and continue on to the next given step (for example, in step 4 you will have to access this article again after restarting your system in Safe Mode).
- Rule out currently trending threats
Win32/Poweliks.A is a trojan which tries to download other malware from the Internet, and can be controlled remotely. To check for, and remove (if present) this threat, follow the steps in the following Knowledge
Win32/Rovnix is a trojan that steals sensitive information. The trojan attempts to send gathered information to a remote machine. It uses techniques common among rootkits. To check for, and remove (if present) this threat, complete the steps in the following Knowledgebase article:
Once you are finished running these tools, proceed to step 3.
The ESET Rogue Application Remover (ERAR) will detect and attempt to remove rogue applications that are infecting your computer or making undesired changes to your registry.
- Run ERAR using the steps in the following article:
- If ERAR fails to remove a detected threat, or does not find one, continue to step 4 (run the ESET Online Scanner).
If you have an ESET product installed, run a Computer scan. If you do not have an ESET product installed, run the ESET Online Scanner (using default settings). The ESET Online Scanner looks at your system from a different perspective than a typical ESET Computer scan. To run the online scanner, follow the steps in the Knowledgebase article below:
If, after completing steps 1-4, you restart your computer and no longer notice the issues / symptoms that brought you to this article, you do not have to continue to step 6. If your issue / symptoms persist, continue to step 6 below.
To complete this step, send a copy of a Scan log, Detected Threats log and SysInspector log to ESET Customer Care following the steps in the Knowledgebase articles below: