Free anti-malware tools that you can use

Support
Solution ID Last Updated
1055290 Date : 2014/09/16 Time:4:22 PM , (PST)


Product/Version Platform
OfficeScan - 10.0, 10.5, 8.0;Titanium AntiVirus + - All;Titanium Internet Security - All;Titanium Internet Security for Dell - All;Titanium Maximum Security - All;Titanium Maximum Security Premium Edition - All;Titanium Premium Security - All;Trend Micro AntiVirus plus AntiSpyware - 2008, Trend Micro AntiVirus plus AntiSpyware - 2009, Trend Micro AntiVirus plus AntiSpyware - 2010;Trend Micro Antivirus+ Security - 2015;Trend Micro Internet Security - 2015;Trend Micro Internet Security - 2008, Trend Micro Internet Security - 2009, Trend Micro Internet Security - 2010;Trend Micro Internet Security Pro - 2008, Trend Micro Internet Security Pro - 2009, Trend Micro Internet Security Pro - 2010;Trend Micro Maximum Security - 2015;Trend Micro Premium Security - 2015;Worry-Free Business Security Standard/Advanced - 6.0, Worry-Free Business Security Standard/Advanced - 7.0, Worry-Free Business Security Standard/Advanced - 8.0, Worry-Free Business Security Standard/Advanced - 9.0;
Windows - 2003 Compute Cluster Server, 2003 Datacenter Server, 2003 Datacenter Server Edition 64-bit, 2003 Enterprise Server, 2003 Home Server, 2003 Small Business Server, 2003 Standard Server Edition, 2003 Standard Server Edition, 2003 Standard Server Edition 64-bit, 2003 Standard Server Edition 64-bit, 2003 Storage Server, 2003 Web Server Edition, 2008 Enterprise Server, 2008 Standard Server Edition, Vista 32-bit, XP Home

Problem Description

There are instances where you may encounter unusual behavior in your computer and suspect that is infected by malware. In these cases, there are several tools that you can use. Knowing which tool to use at the right time may be a key in making your computer behave normally.
Note: You can run the tools listed below even if you do not have any Trend Micro product installed.

Solution

Clean-up tools
These tools attempt to remediate a single-seat infection.
  • HouseCall - This is the tool that you need to use first. HouseCall scans your PC for a wide range of Internet security threats including viruses, worms, Trojans, and spyware.
    For instructions, refer to the Knowledge Base article: Scanning your computer using HouseCall.
  • RootkitBuster - If you suspect there is a malicious component preventing HouseCall or SysClean from executing, or that is trying to hide from the system, you may run the RootkitBuster. This tool is a rootkit scanner that can check through hidden files, registry entries, processes, drivers, and hooked system services. It can also clean out hidden files and registry entries that were created by malicious software.
    For instructions, refer to the Knowledge Base article: Using the RootkitBuster.
  • FakeAV Remover - This tool allows you to clean rogue antivirus, also known as Fake Antivirus (FakeAV). FakeAV threats have been rampant in the past few years. Various FakeAV variants have infected millions of PCs and are continuously spreading worldwide. If you find out that you have this malicious software, use this to clean your computer.
    For instructions on how to use the tool, refer to the article: Fake Antivirus (FakeAV) Removal Tool.
  • Anti-Threat Toolkit (ATTK) - The ATTK scanner can be used for offline and online computers. Download the correct package for your system: if your computer is connected to the Internet (online) or not (offline).
    For instructions on how to use the tool, refer to the article: Using Trend Micro Anti-Threat Toolkit (ATTK) to scan your computer.
  • AntiRansomware Tool - The AntiRansomware Tool is able to execute successfully on an infected environment and stop a ransomware process. However, for digitally signed ransomware processes, the tool will not be able to stop the process completely but it can minimize it.
    To know more about the AntiRansomware Tool, refer to the article: Using the Trend Micro AntiRansomware Tool.
  • Rescue Disk - Rescue Disk allows you to use a CD, DVD, or USB drive to examine your computer without launching Microsoft Windows. It finds and removes persistent or difficult-to-clean security threats that can lurk deep within your operating system.
  • HijackThis (HJT) - HijackThis generates an in-depth report of registry and file settings from your computer, allowing you to selectively remove items from your machine.
Information and log generation tools
These do not fix suspected malware issues, but instead generates a log file that Technical Support can go through to help you with your suspected infection.
  • ATTK Suspicious Files and Information Collector - The ATTK Suspicious Files and Information Collector is available for 32-bit and 64-bit computers. Download the correct package for your operating system.
    For instructions on how to use the tool, refer to the article: Using Trend Micro Anti-Threat Toolkit (ATTK) to scan your computer.
You can also post questions and inquiries at the Trend Micro Malware Community. This community is composed of individuals such as yourself who may be experiencing something similar, and by Trend Micro Subject Matter Experts.


Rate this Solution
Did this article help you?

Please provide your comments to help us improve this solution.

 
  *This form is an automated system. General questions, technical, sales and product-related issues submitted through this form will not be answered.
 
 

Connect with us on