How to Remove Malware Step by Step: Complete Removal Guide

If your device is infected with malware, acting quickly and methodically limits damage. This guide walks through the complete malware removal process across Windows, Mac, and Android.

How to remove malware step by step
1Diagnosing the Infection

Step 1: Diagnosing and Confirming a Malware Infection

Before running removal tools, confirm that your symptoms are actually malware-related rather than hardware failure, software conflicts, or simple performance degradation from a full hard drive. Common genuine malware symptoms include: antivirus alerts that you've dismissed or that your antivirus won't let you resolve; unexplained processes in Task Manager consuming CPU, RAM, or network bandwidth; browser redirects to unexpected sites, new extensions you didn't install, or a changed homepage/search engine; files with unfamiliar extensions appearing, or files you can't open; accounts showing login activity from unexpected locations; and suspicious charges on financial accounts linked to the infected device. Performance slowdown alone isn't a reliable malware indicator — it often has mundane explanations.

Use Windows Task Manager (Ctrl+Shift+Esc) to review running processes. Sort by CPU and Network usage to identify unusual resource consumers. Right-click any suspicious process and select "Open file location" — processes located in temporary directories (%temp%, AppData\Local\Temp, AppData\Roaming), the root of C:\, or with random character names are highly suspicious. The Microsoft Sysinternals Process Explorer provides a more detailed view, including the publisher signature of each process — unsigned processes or those that fail to match their claimed publisher are indicators of malware. Search the process name online if you're uncertain — a web search for the exact process name typically quickly confirms whether it's legitimate or known malware.

For browsers specifically, open each installed browser's extensions page and review all installed extensions. Remove any you don't recognise. Check the browser homepage setting, default search engine setting, and new tab page — these are frequently modified by browser hijackers. If your browser opens to an unexpected page or your searches redirect through an unfamiliar search engine, browser hijacker malware or a malicious extension is the likely cause. Check Windows Settings > Apps > Startup for unfamiliar entries that run at login, and Settings > Apps > Installed Apps for software you don't recognise. Unknown software with installation dates correlating to when symptoms began is a strong indicator of the infection source.

  • AV Alerts: Persistent antivirus warnings that can't be resolved are the clearest malware indicator.
  • Task Manager: Sort by CPU/Network — suspicious processes in temp directories or with random names are red flags.
  • Process Explorer: Microsoft Sysinternals tool showing publisher signatures — unsigned processes warrant investigation.
  • Browser Extensions: Remove all unrecognised extensions — common malware persistence mechanism.
  • Startup Apps: Settings > Apps > Startup — unfamiliar entries installed around symptom start are suspicious.
  • Unknown Installed Apps: Check install dates — software installed at time of symptom onset is a likely source.
Diagnosing malware infection
2Windows Malware Removal

Step-by-Step Windows Malware Removal Process

Begin Windows malware removal by disconnecting from the internet if you suspect active data exfiltration or a rapidly spreading infection (ransomware in progress, banking trojan actively logging credentials). For non-urgent cases, proceed with network connected to enable cloud lookups during scanning. Boot into Safe Mode with Networking (Windows Settings > Recovery > Advanced Startup > Restart Now > Troubleshoot > Advanced Options > Startup Settings > Restart > F5). Safe Mode loads only essential Windows components, preventing the majority of malware from running — which both improves detection (malware can't hide from the scanner) and reduces the risk of the malware interfering with removal tools.

In Safe Mode, run a full scan with Malwarebytes Free — download it fresh from malwarebytes.com (not cached copies) to ensure you have the latest version and definitions. Malwarebytes excels at detecting and removing the adware, PUPs, and many trojan families that primary antivirus may miss. After Malwarebytes completes and you've quarantined all detected items, run a full scan with your primary antivirus product. Running both in sequence (not simultaneously) provides the complementary second-opinion coverage that's most valuable for confirmed infections. If your primary antivirus was already running and missed the infection, this suggests it may need to be updated or replaced — consider whether a different product would have detected what it missed.

After antivirus removal, perform manual cleanup: use Autoruns (Sysinternals) to verify no malware persistence entries remain in startup locations, scheduled tasks, browser helper objects, or services. Remove any remaining unknown software through Settings > Apps. Reset all browsers to default settings (this removes any malicious extensions, homepage changes, and search engine modifications). After restarting in normal mode and confirming the infection appears removed, change all passwords that were used on the infected machine from a different, clean device — treat any credentials as potentially compromised during the infection period. Enable 2FA on email and financial accounts if not already active.

  • Safe Mode First: Boot into Safe Mode with Networking — prevents most malware from running during removal.
  • Malwarebytes Scan: Download fresh copy from official site — run full scan and quarantine all detections.
  • Primary AV Scan: Follow up with primary antivirus scan — two sequential scanners provide complementary coverage.
  • Autoruns Cleanup: Verify no malware persistence remains in startup, scheduled tasks, or services.
  • Browser Reset: Reset all browsers to remove malicious extensions and configuration changes.
  • Password Change: Change all credentials from a clean device after confirmed removal.
Windows malware removal steps
3Mac and Mobile Removal

Malware Removal on Mac, Android, and iPhone

For Mac malware removal, use Malwarebytes for Mac (free version available) as the first scanning tool — it's particularly effective against the adware and info-stealer families most common on macOS. Check Applications folder and drag any unfamiliar apps to Trash. Open System Settings > General > Login Items and review startup programs — remove anything you don't recognise. Check Safari Extensions (Safari > Settings > Extensions) and similarly review extensions in Chrome and Firefox. If you suspect a more sophisticated infection, boot into macOS Recovery (hold Cmd+R at startup) and use Disk Utility to check disk health, or consider reinstalling macOS using the "Reinstall macOS" option which reinstalls the OS while preserving your user data.

Android malware removal begins in Settings > Apps > See All Apps. Look for apps you didn't install, apps with unusual permissions, or apps you recognise but don't use that have been recently updated unexpectedly. Check Settings > Security > Device Admin Apps and revoke administrator permissions from any app that shouldn't have them — stalkerware and some aggressive adware grant themselves device admin status to prevent removal. Install Malwarebytes for Android from the Play Store and run a full scan. For banking trojan infections that have accessed financial apps, notify your bank immediately and consider enabling a temporary block on your account while you clean the device. For severe or uncertain infections, a factory reset (Settings > General Management > Reset) is the most reliable solution — back up contacts and photos to Google Drive beforehand.

For iPhone, "malware removal" is largely not applicable for non-jailbroken devices — as described in the iOS security article, traditional malware that can be detected and removed doesn't typically affect non-jailbroken iPhones. If you're experiencing unexpected behaviour on an iPhone, check Settings > Privacy & Security to review app permissions, delete any apps you don't recognise, and restart the device. If you believe an app from the App Store is behaving maliciously (excessive data use, unexpected account access), delete it and report it to Apple. For persistent unusual behaviour that can't be explained, a factory reset via Settings > General > Transfer or Reset iPhone > Erase All Content and Settings provides a clean slate. After reset, restore from iCloud backup (selecting a backup from before the suspicious behaviour began if possible).

  • Mac First Step: Malwarebytes for Mac + check Applications, Login Items, and browser extensions.
  • Mac Recovery Mode: macOS reinstall via Recovery Mode preserves data while refreshing OS components.
  • Android Admin Apps: Revoke device admin permissions before attempting uninstall of malicious apps.
  • Android Banking Response: Notify your bank immediately if banking apps were accessed during infection.
  • Android Factory Reset: Most reliable option — back up to Google Drive first, restore carefully post-reset.
  • iPhone Unusual Behaviour: Review app permissions, delete unknown apps, use older backup if persistent issues.
Mac and mobile malware removal
4After Removal and Prevention

After Removal: Securing Your Accounts and Preventing Reinfection

After successful malware removal, a structured post-infection checklist prevents the most common follow-on harms. First, change passwords for all accounts accessed on the infected device, in order of sensitivity: email accounts first (because email reset enables all other account takeovers), then banking and financial accounts, then work accounts and VPN credentials, then other services. Do this from a device you're confident is clean — your smartphone (if not also infected) or a different computer. As you change passwords, assess whether to use a password manager going forward — LastPass, 1Password, or Bitwarden provide unique strong passwords for every service without the memorisation burden that leads people to reuse passwords.

Review financial accounts for any unauthorised transactions in the period the device was infected. For Hong Kong bank accounts, most local banks have a 24-hour fraud hotline and specific procedures for reporting suspected malware-related fraud. The Hong Kong Monetary Authority has guidance on consumer rights in bank fraud cases, and banks are generally required to investigate and often compensate for unauthorised transactions when reported promptly. Credit card companies in Hong Kong (Visa/Mastercard) have chargeback mechanisms for fraudulent transactions. Report suspicious transactions immediately — delay reduces the likelihood of recovery. For businesses, check whether any corporate email accounts were accessed during the infection period, as business email compromise (BEC) attacks often follow enterprise malware infections.

Prevent reinfection by addressing the root cause of the original infection. Review how the malware likely got onto the device: was it a phishing email attachment? A downloaded cracked program? A drive-by download from a malicious site? Understanding the initial access vector tells you what behaviour to change. Install a quality antivirus product if the infected device didn't have one, or reconsider the product if it missed an active infection. Enable automatic OS updates if they were disabled. For businesses, consider whether the infection reveals gaps in email filtering, endpoint protection coverage, or security awareness training that need to be addressed organisation-wide. A single malware incident is often a diagnostic indicator of security posture gaps that likely affect more than one device.

  • Password Change Order: Email first, then banking, then work accounts — use a clean device for this process.
  • Password Manager: Adopt a password manager to enable unique passwords for every service going forward.
  • Financial Review: Check all accounts for unauthorised transactions — report immediately to bank fraud teams.
  • HK Bank Fraud Reporting: 24-hour fraud hotlines at HK banks — prompt reporting improves recovery likelihood.
  • Root Cause Analysis: Understand how infection happened — change the behaviour or configuration that allowed it.
  • Business BEC Check: Verify corporate email accounts weren't accessed — business email compromise follows enterprise infections.
Build a complete layered security defence →
Post-removal steps and prevention

Don't Let Malware Strike Twice

After removing an infection, build the protection that prevents reinfection. Find the right antivirus for your devices and threat profile.

Related VPN Articles