Remove Malware with the Trend Micro Anti-Threat Toolkit

Remove Malware with the Trend Micro Anti-Threat Toolkit

I have written more than one article on various ways to remove potentially unwanted programs that are not actually viruses (so the antivirus does not "see" them) - such as Mobogenie, Conduit or Pirrit Suggestor or those that cause pop-up ads in all browsers.

In this short review there is another free tool to remove malware from your computer, the Trend Micro Anti-Threat Toolkit (ATTK). I cannot judge its effectiveness, but judging from the information I have been able to find in the reviews in English, the tool must be quite effective.

Features and use of the Threat Toolkit

One of the main features pointed out by the creators of Trend Micro Anti-Threat Toolkit is that it not only removes malware from your computer, but also allows you to fix any changes you have made to your system: hosts file, registry entries, security policies, autostart, shortcuts, network connection properties (eliminate false positives and the like). For my part, one of the advantages of the program is that it does not require installation, that is, it is a portable application.

You can download this malware removal tool for free from the official website http://esupport.trendmicro.com/solution/en-us/1059509.aspx by opening "Clean infected computers".

There are four versions available: for 32-bit and 64-bit systems, for computers with and without Internet access. If the Internet on the infected computer works, I recommend using the first option, as it may be more efficient - the ATTK uses the capabilities of the cloud, checking for suspicious files on the server side.

It may interest you:  How to activate Windows Defender 10

After launching the program, you can click "Scan Now" to perform a quick scan or go to "Settings" if you need to perform a full system scan (may take several hours) or select specific drives to scan.

While the computer is being scanned for malware, it will be removed and errors will be corrected automatically, while you can monitor the statistics.

Upon completion, a report of the threats found and removed will be presented. If you need more information, click on "More details". Also, in the full list of changes made, you can undo any of them if, in your opinion, they were wrong.

In summary, I can say that the program is very easy to use, but I cannot say anything definitive about the effectiveness of its use to cure a computer, since I have not yet had the opportunity to test it on an infected machine. If you have that experience, do not hesitate to leave your comments.