ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Really Free Malware Removal Software Programs Overview, Tricks and Scan Setup Instructions

Updated on April 3, 2011

No-cost Command-line Malicious Software Removal Tool

At first I intended to write about one free malware remover - EMSISOFT anti-malware command-line scanner. It is available as a free downloadable archive which is kept always up-to-date with latest malware definitions. Freeware anti-malware are in rising demand right now, and short instructions on how to properly use this free malware remover are needed by lots of victims of computer infections.

But then I thought: who would search for a command-line scanner? I bet most PC users are unaware of black DOS-like looking windows, and even among those who know about command line console, the majority would prefer traditional GUI-based software. In the world of 3D graphics DOS environment is looked upon as a remnant of the past. Command line scanners are mostly used by IT pros or Unix enthusiasts, so I risked creating a hub that would never attract its audience.

Therefore I decided to slightly broaden the theoretical part of free malware removal options, while still concentrating on the EMSISOFT command line scanner.

What is Malware

As time goes by and we move in the next decennary of the XXIst century, the pests that aim attacking our computers never stop mutating. Their nature and activity patterns change, and so does the approach to naming the threats. In addition to computer viruses which appeared in the last millennium, a number of new types of PC infections appeared. Consider this list:

  • adware;
  • spyware;
  • threatware;
  • badware;
  • rogueware;
  • scam extortion.

Not speaking about the sub-divisions of the malicious programs, it is clearly seen that almost every PC user simply gets confused. How to know what type of infection bypassed my antivirus protection?

That's why it is common to unite the whole range of threats into a single term: malware.

So what is malware?

In short, it's all included in the list above, plus keyloggers, phishing, process injection, browser hijacks, etc. These are most widely known types of malware. Malware is something that should never be allowed to penetrate into a PC because no-one knows what purpose it prosecutes. Malware can display innocent pop-ups, but also steal identity and transmit sensitive private data to remote servers for later use by web criminals. Malware is used for achieving all kinds of goals, none of which you wish to be achieved.

There's one more question often asked by inquisitive PC users:

What is the difference between malware and spyware?

Spyware is limited to drawing money out of the victim's finances. Opposite to viruses which may use infected computers silently for certain activity (like sending spam or redirecting traffic), spyware is created to make money. It may deliver ads (forced to desktop or browser), collect information about surfing habits and transmit it to companies engaged in Internet marketing, keep a log of keyboard activity, etc. Generally speaking, virus and spyware together constitute the most widely known type of malware. A new spyware function is distribution of scams - rogue security software. This is when people are fooled into buying fake antivirus or antispyware porgram.

Malware is a broader term to refer to spyware, backdoors, trojan viruses, worms, etc. However, in most cases anti-spyware programs deal with all those types of malware in addition to common spyware infections. So if you have a solid antispyware protection this most likely means your computer is secured against not only spyware, but also other parasites. It's just been common to use the "antispyware" term for several years, and only recently it started yielding to a broader "anti malware" software which cover a wide range of PC threats. So basically you can't tell what particular anti malware or anti spyware program covers more types of malware unless you read through specs. But even detailed information doesn't give the full overview, that's why the difference between malware and spyware is many cases is little or non-existent.

Free Malware Removal

Removing malware consists of the following steps:

  1. identifying the presense of infections in the system;
  2. locating the exact places where parts of the malware reside;
  3. finding a proper tool for removing malware;
  4. creating conditions for removing malicious software;
  5. completing the malware cleaning process.

So, free malware removers are not the main concern - it's far more important to find out what needs to be deleted from the system. When you have information about the types of malware and their exact locations, it's much easier to find proper free malware removing software.

A free malware removal software can be:

  1. a single executable file (like McAfee stinger); major PC security software vendors offer such tools whenever a certain type of malware takes the Web by storm. For example, such malware removers were released when Nimda worm infected millions of computers worldwide.
  2. a batch file executed in the command line console;
  3. a feature-limited version of commercial anti-malware tools. Sometimes trials allow to remove malware for an evaluation period of two weeks or a month.
  4. Free online virus scan. Such services are provided by industry-leading anti-malware software manufacturers, as well as IT security-related websited which sometimes combine the power of several online virus scanners. Usually companies provide free online malware scan services as a way to attract new customers.

Advantages of a Command-line Anti-Malware Removal Software

Somebody would inevitably ask what advantages a plain-looking black window may have over convenient, pleasant-looking unfolding menus with keyboard shortcuts and mouse support? And that's not to mention the need to type in commands with switches, where every little error results in necessity to start typing all from scratch.

However, let's look at strong points of free malware removers anyway.

  • They never expire, never stop removing malware, never require subscription renewal;
  • Being command console applications, anti-malware tools use very little system resources, unlike desktop software with fancy graphics and transparency effects;
  • They do not require installation and can be removed simply by deleting a folder;
  • They remove malware even in Safe Mode and when desktop programs are disabled by smart viruses. In fact, command-line scanners perform best in Safe Mode.
  • They are easy to automate by creating simple .bat files. Double-click one to update definitions, initiate a scan and remove detected malware;
  • They are easy to transfer to portable devices.

I'd add that command-line based free malware removal programs help users to discover the hidden part of the system where certain tasks are performed faster than in GUI environment.

EMSISOFT a-squared

A-squared offers a cool command-line scanner that saved lots of users in frustration after their computers underwent malware attacks.

Diverse scams circulating on the Web are smart enough to get onto PC's protected by popular security software. Unfortunately, resident monitoring is often helpless when trojans bring SmitFraud infections with them. And once pop-ups appear on the desktop screaming about spyware infections detected, users feel at loss. How to remove malware?

There are essentially two ways to recover the PC:

  1. Burn a bootable CD with antivirus and antispyware, providing latest signature files.
  2. Run a command-line scanner which works both in Normal and Safe Mode.

a-squared anti-malware is exactly of this type of scanners. The manufacturer offers it for download with no strings attached (no need to enter email, confirm, subscribe to newsletter, etc.), conveniently storing the archived file with latest anti malware definitions.

a-squared makes removing malware a no sweat task. Just a few command switches are needed to instruct the scanner:

  • to scan memory;
  • to use heuristics;
  • to clean the infected files;
  • to remove those files when cleaning fails.

It is worth noting that a-squared by EMSISOFT is better at removing malware than most antivirus tools because it incorporates the detection mechanism not limited to common virus infections. Its scanning engine is designed to fight a broader range of types of malware, that's why it may perform at a higher efficiency rate than already installed desktop security software.

In particular, free malware remover from a-squared is capable of fighting:

  • spyware;
  • adware;
  • trojans;
  • worms;
  • keyloggers;
  • rootkits;
  • dialers.

a-squared malware remover is capable of scanning Alternate Data Streams (ADS) on NTFS file systems and archives.

A typical command to instruct a-squared to start scan and deletion process looks like on the screenshot below.

a-squared free anti-malware command-line scanner switches
a-squared free anti-malware command-line scanner switches

The legend is iterpreted the following way:

E:\a2cmd\ shows the location of a-squared program files. In my case Windows is installed on E:\ drive, therefore I unpacked the files to the root.

/deep is one of the three scanning modes: quick, smart, deep. For an infected computer, I suggest using the deep mode to maximize the chances of successful malware deletion.

/n instructs the malware remover to scan the NTFS file system for Alternate Data Streams.

/h turns on the heuristics scan mode. It is used to identify unknown malware by suspicious behavior patterns.

/m stands for "memory scanning". I see no reason why it shouldn't be used.

/t scans for malware traces.

/r reveals Riskware - not yet defined occurrences or types of malware, yet suspicious in the digital eyes of the a-squared scanning engine.

/d is the most expected command. Every owner of a malware-infected computer would want this ON because it stands for MALWARE REMOVAL ;)

Below is the screenshot to show what happens when ENTER is pressed with the above described command parameters. The figure [404] in square brackets shows the number of scanned files.

a-squared scan and removal in progress
a-squared scan and removal in progress

Some more words about a-squared free antimalware

EMSISOFT free malware remover is a perfect tool for on-demand anti-malware scans. It needs no installation, doesn't add any files into Windows system directories, and makes no changes to the registry. About 26 megabytes of space is all that this malware remover needs.

a-squared designed its command-line scanner to remove malware an easy way with no special knowledge needed.

This malware remover is capable of deleting a number of rogue security programs like XP antivirus, and other types of malware.

P.S. If you find this information useful, please feel free to share it with your friends and those in need of removing malware.

Kaspersky(R) Virus Removal Tools

Kaspersky Labs released a command-line tool to remove a number of malware infections. It is a 120KB in size so even those with dial-up connection can use it.

The .com file can be executed straight from within Windows Explorer - just double-click on the tool to start scanning the whole system.

Kaspersky tool supports the following switches:

  • /s[n] - to force scanning of hard drives.
  • /n - to force scanning of mapped network drives.
  • /path <path to scan> - to force scanning specified path.
  • /rd - to force restoring registry values.
  • /y - do not request key press (to automate the scan).
  • /nr - do not reboot system automatically in any cases.

There are five return codes that explain the results of the scan.

  • 0 - nothing to clean (good!)
  • 1 - system was infected.
  • 2 - to finalize removal of infection you should reboot system.
  • 3 - to finalize removal of infection you should reboot system and start this program the second time.
  • 4 - program error.

If you know what type of virus hit your Windows station and all other remedies didn't work, look through the list of supported infections. If yours is listed among others, download Kaspersky's removal tool.

www.kaspersky.com/virus-removal-tools

Kaspersky Command-line Scanner

Kaspersky Virus Removal Tool (command-line scanner)
Kaspersky Virus Removal Tool (command-line scanner)

Malware bytes antimalware

Malware bytes is increasing in popularity at a fast pace. This little program with minimalistic interface has saved countless hours of struggle for victims of Virtumonde trojan virus. Since the release of version 1.31 I noticed that visitors of my Virtumonde hub got to praise this malware removal tool for its efficacy in fighting the dread presence of Virtumonde variants. The number of positive comments is so impressive that I believe I can recommend this program to all PC owners who can't kick the malware out of their computers.

Malware bytes anti malware features intuitive interface that's easy to use no matter what your PC experience is. There are two types of scan to choose from: quick and full. If you run Malwarebytes for the first time, do a full scan to make sure there's not a single dark corner in your system where Malwarebytes hasn't inspected every byte of the data. Be sure to update the program with latest definitions before scanning as you want it to have the fresh footprints of digital parasites.

Malwarebyte's in its basic edition is not just a scanner (unlike many other similar products on the market) but a fully-functional free malware remover. It really removes what it finds, and it finds a lot of types of malware!

Malwarebyte's peacefully resides in the system with antivirus software installed, so normally there's no need to worry about compatibility problems.

Malwarebyte's Anti-malware

Malwarebyte's anti malware scanner tab
Malwarebyte's anti malware scanner tab
EMSISOFT Anti-Malware
EMSISOFT Anti-Malware
working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)