*How to find and use some of the applications installed by the ITS Service Center on your computer.*
Table of Contents
Step-by-step instructions to use various applications used by ITS
Windows XP/Vista/7 RC/8/10
CCleaner, MalwareBytes, Avira, ComboFix, Spybot - Search & Destroy
If a client's computer has been dropped off at any of the ITS service centers for reasons including virus, spyware, malware and rootkit infections, it is likely that the technicians have installed certain software on your PC.
Here are some instructions on how to config/run these apps
Microsoft Security Essentials - Windows Defender
To Download Click: Download Microsoft Securty Essentials
Once downloaded simply follow the basic instructions provided by microsoft. If you are running windows 8 or above Windows Defender will already be installed on your computer
Updating Microsoft Security Essentials
It is recommended that you set up the automatic scans to be at a time when your computer is regularly on. If not, you will need to manual run scans on the computer. You will also want to enable automatic update in "Windows Updates" to ensure that this program is regularly up to date.
- UPDATE this software daily. To do so, right-click at the Avira icon (red-white color) in the taskbar (bottom-right) and click "Update Antivirus". During the update process, a window might pop-up advertising the various Avira products. Click Ok to ignore it. Once the update has installed itself, you can Close the window or click Report to see details of the process.
- To open the main screen of AntiVir, click the Avira icon (red-white color) in the taskbar (bottom-right) and click "Free Antivirus".
To scan your PC, bring up the main screen of AntiVir. On the left side, click "Scan System" located near the center of the window.
If you do not want to perform a full system scan, other options can be found under the tab "System Scanner"
- The scan will run and may take anywhere from 20 minutes to a full hour. A dialog box will appear with the results of the scan allowing you to remove any threats if they were found.
- Locate CCleaner.exe(or a shortcut to it) and launch the program.
- The files deleted by CCleaner are usually temporary files stored by various applications. They are of little or no value. However, if you're not comfortable with deleting unknown files, please visit the ITS service centers for assistance.
- The column at the center of the screen has two tabs: Windows and Applications.
- Windows: Depending on your system configuration, you should see the following Applications: Internet Explorer, Windows Explorer, System and Advanced.
- Applications: The applications under this tab vary from PC to PC. The files that are deleted under this tab mainly include shortcuts, temp files and browser history for non-IE browsers.
- If an ITS technician has installed the program for you, it is likely that all the boxes are checked (Note: If you would like to save the cookies/history for Internet Explorer or leave the Recycle Bin unchanged, feel free to uncheck those boxes.)
- Click Analyze if you would just like to see details about the files CCleaner can delete. This does NOT perform the deleting process and merely generates a list of files and their details.
- Click "Run Cleaner" to perform the deletion. Note: Once deleted, these files can't be recovered.
- To update this software (which is recommended), click "Check for updates..." located at the bottom right of the application window. This will open a link in your default internet browser and will let you know if you are using the latest version of CCleaner. If it isn't, it will provide a link to download the latest version. (Warning: The web page might contain several links and ads to download other applications and software. Please proceed with caution and only download the latest CCleaner version.)
- Locate mbam.exe(or a shortcut to it) to launch the program.
- First you should make sure that the databases are up to date. Click update next to the Database Version
- Select "Scan Now" to begin the malware scan
- Once the scan is completed, it will display a list of infected items, if any.
- Select "Remove threats" to remove the infected items
- Locate Spybot(or a shortcut to it) to launch the program.
- Update the definitions right away (recommended!!). To do so, click the "Update" button under the Basic Tools section. It will bring up the updater window.
- If no updates are available, then you're all set to Immunize and Scan!
(Click to enlarge image)
- Once the update is done, return to the main window and click on the "Immunization" button.
- Click "Check system" then "Apply immunization" after the check is done.
- Once this process is done, Spybot is ready to scan the PC for spyware and adware. Return to the main window
- Click on "System Scan" then on "Start a Scan" in the window that appears.
- Spybot will begin scanning and may take anywhere from 20 minutes to an hour.
- Once the scan is complete, it will display a list of detections.
- Select the ones marked in RED (selected by default) and hit "Fix selected". This will delete the files associated with Adware and Spyware. Contact an ITS technician if you're unsure of this process.
Advanced System Administration Tool
Please contact an ITS Service Center technician if you're uncomfortable using it. If your PC is heavily infected, it is recommended to run this application in Safe-Mode.
ComboFix does not support Windows 10
- Restart your computer.
- Hit F8 before the Windows loading screen is displayed. This will bring up the advanced setup options.
- Select "Safe-Mode". If you need an active internet connection for any reason, you can also select "Safe-mode with networking", although this isn't recommended.
- Once the PC enters safe-mode, it will prompt you to run "system restore". Select not to do so.
- Please close all applications before launching ComboFix.exe.
- Once launched, it will bring up a system window like this.
(click to enlarge image)
- A disclaimer window will pop-up next. Carefully read what is written and click "Yes" if you agree with all the terms mentioned.
- Next, the application will begin backing up the registry. This process is automatic and is a precautionary measure.
(click to enlarge image)
- Next, a window might pop up asking you to download/install "Microsoft Windows Recovery Console". This is not needed and it is recommended to click No.
- Now, the scanning process begins. Note: This process could take several minutes and also uses system resources intensively; it is recommended to not interfere with the system while it's scanning.
- During the scanning process, it is normal to see the Stage numbers the scanner is going through. It might also provide minor details about the infected files it detects.
- Once its over, a "log report" will be generated. If you decide to bring this PC in to ITS, please save the log report in a known location and notify the ITS technician.
- The log file looks like this. It usually opens in Notepad.
- Restart your computer back into normal mode once you're done.
Sources and Relevant Links