I have had a problem for 2 weeks with an .eml file. It is in multiple folders on my system and I cannot successfully...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
delete them. The file also copies itself onto any attached USB devices. None of my applications are working as a result of this file, what is the best way to rid my machine of this file before it affects others on the network?
First off, remove your computer from the network before the malware potentially copies infected files onto mapped network drives. Whatever malware infected your system, it sounds like it has associated itself with executables on your system and has functionality to prevent it from being removed (which is common). You could potentially restore your computer to a known good restore point. If that doesn't work, you will need to know how to remove the malware manually from your hard drive.
To remove malware manually from a system, follow these basic steps:
- On a separate computer, download a malware-removal tool like McAfee Stinger (or another similar tool from a major antivirus vendor) and save it to a USB drive. You may need to use other similar tools depending on the specific malware. Download the installer and updated definition files from whatever antimalware/antivirus software used at your organization.
- Boot your computer into safe mode.
- Run McAfee Stinger on the infected computer to remove the malware. You may need to use the additional tools that you downloaded earlier if McAfee Stinger didn't remove the malware. If you can't run one of these tools, you'll need to manually fix the file associations. There are some good guides and directions on the Microsoft website; check out these Windows XP malware removal instructions.
- After installing or updating the antimalware or antivirus software on the machine, run a full system scan.
To prevent this in the future, be sure the account you normally log in with does not have elevated or administrator-level privileges (savvy hackers can exploit admin-level user accounts quite easily), and always install and update antimalware and antivirus software (if both are not included in your preferred software). If you login with an account with elevated privileges, you may need to contact your IT department to change your account to remove your elevated privileges.
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
The Fruitfly Mac malware has decades-old code, but has been conducting surveillance attacks for over two years without detection. Expert Nick Lewis ...continue reading
A Gmail phishing attack brought users to fake login pages designed to look like Google's. Expert Nick Lewis explains how users can prevent similar ...continue reading
A HummingBad malware variant, HummingWhale, was discovered being spread through 20 apps on the Google Play Store. Expert Nick Lewis explains the ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.