Common Ways of Malware Executions

This section provides a quick introduction of some common ways how malware (Malicious Software) get executed again after installation on Windows systems.

In order for malware to infect your Windows system, it needs to be executed at least once. In most cases, the malware only tries to install itself to your system during this initial execution.

Once a malware is installed on Windows system, it needs to be executed again to perform malicious activities. Here are some common techniques used by malware to get executed after its installation.

As a Web Browser Add-on - A larger number of malware will be installed as an add-on to a Web browser, so that the malware will executed whenever you run the browser.

As a System Service - A larger number of malware will be installed as a system service on Windows systems, so that the malware will be executed whenever you restart your system.

As a Startup Program - A larger number of malware will be installed as a startup program on Windows systems, so that the malware will be executed whenever you restart your system.

As a Scheduled Task - Some malware will be installed as a scheduled task on Windows systems, so that the malware will be executed based on the date and time schedule.

As a Hijacked System Program - Some malware will be installed to hijack a commonly used system program. For example, a malware can replace the system program cmd.exe with its own malicious version. So whenever you run cmd.exe, the malicious version gets executed.

As a Bogus Freeware - Some malware will hide inside a bogus freeware. The freeware may perform genuine functionalities. But whenever you run the bogus freeware, the malware will also be executed.

Table of Contents

 About This Windows Security Book

 Windows 8: System Security Review

 Windows 8: System Security Protection

 Windows 8 System Recovery

 Windows 8 Defender for Real-Time Protection

 Windows 7: System Security Review

 Windows 7: System Security Protection

 Windows 7 System Recovery

 Windows 7 Forefront Client Security

 Norton Power Eraser - Anti-Virus Scan Tool

 McAfee Virus and Malware Protection Tools

 Spybot - Spyware Blocker, Detection and Removal

 Keeping Firefox Secure

 Keeping IE (Internet Explorer) Secure

Malware (Adware, Spyware, Trojan, Worm, and Virus)

 What Is Malware (Malicious Software)?

 Common Ways of Getting Infected

 Common Symptoms of an Infected System

Common Ways of Malware Executions

 Malware Removal by Anti-Virus Tools

 Identify Malware Process Manually

 Delete Malware Program Files Manually

 HijackThis - Browser Hijacker Diagnosis Tool

 IE Add-on Program Listing and Removal

 "Conduit Search" - Malware Detection and Removal

 "Tube Dimmer", "Scorpion Saver" or "Adpeak" Malware

 Malware Manual Removal Experience

 Vundo (VirtuMonde/VirtuMundo) - vtsts.dll Removal

 Trojan and Malware "Puper" Description and Removal

 VSToolbar (VSAdd-in.dll) - Description and Removal

 PWS (Password Stealer) Trojan Infection Removal

 MS08-001 Vulnerability on Windows Systems

 Antivirus System PRO

 References

 Full Version in PDF/ePUB