How to Remove a Virus From Your Computer in 2026 — Step-by-Step Guide (PC & Mac)

How to Remove a Virus From Your Computer in 2026 — Complete Step-by-Step Guide (PC  Mac)

If you have ransomware (encrypted files, ransom note) — read this first

Do NOT pay the ransom yet. Disconnect from the internet immediately (unplug Ethernet, turn off Wi-Fi). Take a photo of the ransom note with your phone. Visit nomoreransom.org — many ransomware families have free decryption tools. Then call IT Cares at 1 (888) 711-9428 for a free consultation before taking any other action. Paying ransoms does not guarantee file recovery and funds criminal operations.

Table of Contents

  1. How to Know If Your Computer Has a Virus
  2. Virus Types: Symptoms, Danger Level, Removal Difficulty
  3. Tool Comparison: 5 Best Free Removal Tools
  4. Windows Removal: Step-by-Step (Safe Mode)
  5. Mac Virus Removal: Step-by-Step
  6. Android Virus Removal (Bonus)
  7. After Removal: Security Hardening Checklist
  8. When to Call a Professional
  9. Frequently Asked Questions (15)

Our team at IT Cares removes viruses and malware from Canadian computers every day. We know which tools work in 2026, which infections require professional intervention, and exactly when the situation requires professional tools rather than consumer software. This guide gives you the exact process we use, adapted for someone doing it themselves for the first time.

The good news: the majority of infections — adware, browser hijackers, PUPs, and common trojans — can be fully removed using free tools in 2-4 hours. The challenging cases — rootkits, ransomware with encrypted files, banking trojans — require professional tools or system reinstallation. This guide helps you determine which category you are in, remove what you can, and make an informed decision about the rest.

How to Know If Your Computer Has a Virus

Not every slow computer has malware. But these specific symptoms reliably indicate a malware infection rather than a hardware or software performance problem:

Common infection symptoms (in order of reliability)

  • Very reliable indicators: Browser homepage changed without your action; new browser extensions you didn't install; antivirus detected something and you dismissed or ignored it; pop-up ads appearing outside the browser (in the corner of your screen); files have changed to strange extensions (.locked, .encrypted, .WNCRY)
  • Moderate indicators: Browser redirects to search engines you don't use; computer significantly slower than 2-3 months ago; unusual CPU or disk activity in Task Manager when no programs are open; computer overheating and fan running constantly at high speed; programs opening or closing on their own
  • Weak indicators (many other causes): Computer is slow in general; computer sometimes crashes; internet seems slow

If you see any of the "very reliable indicators," proceed with this removal guide. If you only have "weak indicators," first check our complete guide to fixing slow computers to rule out hardware causes before assuming malware.

Virus Types: Symptoms, Danger Level, and Removal Difficulty

Malware Type What It Does Key Symptoms Danger Level Removal Difficulty
Adware Displays unwanted ads, collects browsing data for advertisers Pop-up ads, new browser toolbars, slow browser, ad overlays on websites Low Easy — Malwarebytes
Browser Hijacker Changes browser homepage, search engine, redirects traffic for ad revenue Different search engine, homepage you didn't set, constant redirects Low-Medium Easy-Moderate — Malwarebytes + browser reset
Trojan Disguises as legitimate software, enables backdoor access, downloads more malware Program you downloaded behaves unexpectedly, unusual network activity, antivirus warning High Moderate — Safe Mode + multiple scanners
Spyware Records keystrokes, screenshots, webcam footage; steals passwords and financial data Often invisible; sometimes slow performance, unusual network activity at night Very High Moderate — Change all passwords from clean device
Ransomware Encrypts your files and demands payment for decryption key Files suddenly inaccessible, strange extensions (.locked, .encrypted), ransom note Critical Very Hard — May require professional help; check nomoreransom.org
Rootkit Hides itself and other malware at the OS level, survives normal removal attempts Malware returns after removal; antivirus cannot be opened; system behaves erratically Critical Very Hard — Offline scanner or reinstall required

Tool Comparison: 5 Best Free Virus Removal Tools in 2026

Each tool has a different specialty. For thorough removal, use multiple tools in sequence rather than relying on a single scanner.

Tool Best For Real-time? Installation Detection Focus Speed
Malwarebytes Free Adware, PUPs, browser hijackers No (on-demand) Required PUPs, adware, behavioral Fast (20-30 min)
Windows Defender Offline Rootkits, pre-boot threats N/A (offline scan) Built-in Windows Rootkits, pre-OS threats Moderate (30-60 min)
HitmanPro (30-day free) Second-opinion multi-engine scan No Portable (no install needed) Multi-vendor cloud scan Fast (15-25 min)
ESET Online Scanner Thorough scan, no install needed No Browser-based (no install) Broad, strong detection Slow (45-90 min)
Kaspersky Virus Removal Tool Standalone removal on any Windows No Portable executable Top detection rate Moderate (30-60 min)

Recommended removal sequence for best results

Step 1: Malwarebytes Free (catches adware, PUPs, browser hijackers most consumer tools miss)
Step 2: Windows Defender Offline Scan (catches rootkits operating before Windows loads)
Step 3: HitmanPro (multi-engine cloud scan, catches stragglers from different vendor databases)
Step 4: ESET Online Scanner (optional thorough verification that removal is complete)

Windows Virus Removal: Complete Step-by-Step Process

1

Confirm the infection and note the symptoms

Before doing anything else, open a note and write down every symptom you have noticed: specific pop-ups, programs that appeared, when it started, what you installed or downloaded around that time. This information helps identify the malware family and ensures you can confirm complete removal at the end.

Also check: open Task Manager (Ctrl+Shift+Esc) > Processes tab. Look for processes using high CPU or with unfamiliar names. Note their full names and parent processes.

2

Disconnect from the internet (for serious infections)

If you suspect a trojan, ransomware, spyware, or any malware that might be sending your data to external servers, disconnect from the internet immediately. Unplug your Ethernet cable or disable Wi-Fi in Windows Settings. This prevents the malware from:

  • Sending your passwords and files to the attacker's server
  • Receiving commands from the attacker (command-and-control)
  • Downloading additional malware payloads
  • Encrypting additional files (in the case of ransomware)

For adware and browser hijackers, internet disconnection is less critical. Reconnect when you need to download removal tools.

3

Boot into Safe Mode with Networking

Safe Mode loads Windows with only essential services and drivers, preventing the vast majority of malware from running during the scan. This is the most important step for effective removal.

Windows 10/11:

  • Click Start > Power > hold the Shift key and click Restart
  • In the blue menu: Troubleshoot > Advanced options > Startup Settings > Restart
  • After restart, press 5 (or F5) for Safe Mode with Networking
  • The screen resolution will be different and the taskbar may look different — this is normal for Safe Mode

Alternative (if above doesn't work): Press Win+R, type msconfig, click OK. Go to the Boot tab, check "Safe boot" and select "Network." Click OK and restart. Remember to uncheck Safe boot after cleaning is complete or your computer will always boot to Safe Mode.

4

Download and run Malwarebytes Free

In Safe Mode with Networking, open your browser and go to malwarebytes.com. Download the free version installer. Install it (it will automatically start a 14-day Premium trial — this is fine, it gives you all features for free during this period).

Once installed, click Scan (full Threat Scan). This takes 15-30 minutes. When complete:

  • If threats are found: click Quarantine to remove all of them. Do not restart yet.
  • If nothing is found: the infection is not in Malwarebytes' detection scope, or it has disabled its own visibility (rootkit). Proceed to the next steps.
5

Run Windows Defender Offline Scan

This is a critical step for rootkits. Open Windows Security (search it in Start, even in Safe Mode). Go to Virus & threat protection > Scan options > Microsoft Defender Antivirus (offline scan) > Scan now.

The computer will restart and run a scan before Windows loads — this is where rootkits hide from normal scans. The scan takes 20-40 minutes and the computer will restart automatically when complete. If threats are found, Defender removes them automatically and shows a report after the final restart.

6

Download and run HitmanPro (free 30-day trial)

HitmanPro is unique: it scans your system using cloud-based detection engines from multiple vendors simultaneously (Bitdefender, Kaspersky, ESET, and its own). It runs as a portable executable — no installation required. Download it from hitmanpro.com.

Run it, select "I am going to scan the system only once" (no need to install). If it finds threats, the 30-day free trial lets you remove them. HitmanPro is particularly effective at finding threats that Malwarebytes and Defender missed, because it checks against multiple vendor databases simultaneously.

7

Clean up browser extensions and reset browser settings

Malware frequently installs browser extensions that persist even after the main malware is removed. These extensions can redirect searches, display ads, steal form data, and reinstall the main malware.

Chrome: Settings (⋮ menu) > Extensions. Remove any extension you don't recognize or didn't intentionally install. Then: Settings > Reset settings > Restore settings to original defaults.

Firefox: Menu > Add-ons and themes > Extensions. Remove unknown extensions. Then: Help > More troubleshooting information > Refresh Firefox.

Microsoft Edge: Settings (⋯) > Extensions. Remove unknowns. Settings > Reset settings > Restore settings to default values.

8

Check startup programs and scheduled tasks

Many malware variants install scheduled tasks that redownload and reinstall themselves even after removal. Check both locations:

Startup programs: Task Manager > Startup apps. Look for unfamiliar programs and disable them.

Scheduled tasks: Search "Task Scheduler" in Start. Click Task Scheduler Library. Look for tasks with unfamiliar names that run daily or at user login. Right-click suspicious tasks and select Disable before deleting (disabling first lets you verify nothing breaks before permanent deletion).

9

Change all important passwords from a different device

This step is mandatory if you had any indication of a trojan, keylogger, or spyware infection. Even if you believe the malware is now removed, passwords entered on an infected computer may have been captured and transmitted before you removed it.

Priority order for password changes (do these from your phone or a different computer):

  • Banking and financial accounts
  • Email accounts (Gmail, Outlook, etc.) — these are used for password recovery
  • Work accounts and VPN credentials
  • Social media accounts
  • Shopping accounts with saved payment methods

Enable two-factor authentication (2FA) on every account that supports it, especially banking and email.

10

Run a verification scan 24-48 hours later

After restarting normally and using the computer for a day, run another Malwarebytes scan. If the same threats appear again, the malware has a persistence mechanism that survived your removal:

  • A rootkit loading the malware before Windows
  • A scheduled task you missed
  • Malware hiding in a system restore point
  • An infected USB drive or network share reinfecting the system

If malware returns after your removal attempt, the situation requires professional tools or a clean Windows reinstall. Contact IT Cares for a professional assessment.

Mac Virus Removal: Step-by-Step

True Mac malware is less common than Windows malware, but it exists and is growing. The most common Mac threats in 2026: adware bundled with "free" software, browser hijackers, fake antivirus scareware, and crypto-mining malware that secretly uses your Mac's CPU for cryptocurrency mining.

1

Run Malwarebytes for Mac (free)

Download from malwarebytes.com (select Mac version). Run a full scan. This is the most effective free tool for Mac malware and adware removal. It detects and removes adware, browser hijackers, and common Mac malware families. The free version provides complete on-demand scanning.

2

Check Login Items and Launch Agents

Login Items: System Preferences (or System Settings) > Users & Groups > Login Items. Remove anything you don't recognize.

Launch Agents (advanced): Open Finder > Go menu > Go to Folder > type /Library/LaunchAgents. Look for .plist files with unfamiliar names. Google any suspicious file names before deleting them.

3

Check for malicious configuration profiles

Malware sometimes installs configuration profiles that can force browser settings and prevent changes. Go to System Preferences (or System Settings in macOS Ventura+) and look for a "Profiles" section. If it exists, click it and remove any profile you don't recognize (these are normally only added by corporate IT management or MDM software).

4

Clean browser extensions on Safari, Chrome, and Firefox

Safari: Preferences > Extensions. Uninstall extensions you don't need or recognize. Also check Advanced > Homepage and search engine settings. Chrome/Firefox: Same extension cleanup process as described in the Windows section above. Reset browser settings if in doubt.

5

Check Activity Monitor for suspicious processes

Open Activity Monitor (Applications > Utilities). Sort by CPU usage. Any process consistently using 50%+ CPU when the Mac should be idle is suspicious. Google the process name to identify it. If confirmed malicious: right-click > Quit Process. Then find and delete the associated application or file.

Android Virus Removal (Bonus)

Most "phone viruses" on Android are actually unwanted apps, adware, or browser-based scareware rather than true viruses. True malware on Android is mainly distributed through unofficial app stores or side-loaded APK files.

1

Restart in Android Safe Mode

Hold the power button until the Power off option appears. Long-press "Power off" until a "Restart in Safe Mode" prompt appears. Tap OK. In Safe Mode, third-party apps are disabled but still visible — this helps you identify which app is causing problems.

2

Uninstall suspicious apps in Safe Mode

Go to Settings > Apps (or Application Manager). Sort by install date (recently installed apps first). Remove any app you don't recognize, particularly apps installed around the time problems started. Some malware disguises itself as system tools, flashlights, or utilities. Also check for apps with device administrator privileges: Settings > Security > Device administrators — remove any suspicious app from this list before attempting to uninstall it.

3

Run Malwarebytes for Android (free)

Download Malwarebytes from the official Google Play Store. Run a full scan. If malware is found, remove it. Do not download antivirus apps from any source other than the Google Play Store — many fake "antivirus" apps are themselves malware.

4

Factory reset as last resort

If problems persist after removing suspicious apps and running a scan, factory reset the device. Settings > General Management > Reset > Factory data reset. Back up contacts, photos, and important data to Google account or cloud storage first. Do not restore backed-up apps without verifying them — restore app data selectively rather than restoring a full backup that might include the malicious app.

After Removal: Security Hardening Checklist

Removing the infection is only half the job. Applying these hardening measures prevents reinfection and significantly raises the bar for future attacks.

Post-Removal Security Hardening Checklist

Enable Controlled Folder Access in Windows Security > Virus & threat protection > Ransomware protection. This blocks ransomware from encrypting your Documents and Pictures folders.
Install Malwarebytes Browser Guard (free extension for all browsers). Blocks phishing sites, tech support scam pages, and malicious downloads — the most common infection sources in 2026.
Enable two-factor authentication on all important accounts: banking, email, work, social media. Even if a password is stolen, 2FA prevents unauthorized access.
Use a password manager (Bitwarden is free, reputable, and open-source). This eliminates password reuse, which allows one breach to compromise all accounts.
Set up automatic backups. The only complete ransomware defense is a backup that exists outside the infected computer. Windows Backup (Settings > System > Storage > Advanced storage settings > Backup) or a cloud service like Backblaze ($9/month for unlimited storage).
Update all software. Go to Settings > Windows Update and install all available updates. Then update all installed applications — out-of-date software is the #1 vulnerability exploited by malware in 2026.
Review and reduce startup programs. Open Task Manager > Startup apps. Disable programs you don't need at login to reduce attack surface and improve performance.
Clear system restore points. Malware can hide in restore points. After confirming the infection is removed: search "Create a restore point" > System Protection > Configure > Delete to clear old points, then create a fresh clean one.
Avoid pirated software. Pirated software and cracked games are the #1 source of serious malware infections (trojans, ransomware). The cost savings are not worth the risk.
Be cautious with email attachments. Never open .exe, .zip, .rar, .doc, or .pdf attachments from unexpected emails, even if the sender appears to be someone you know (their email may be compromised).

When to Call a Professional: Clear Decision Guide

The following situations require professional tools, professional experience, or both. Attempting DIY removal in these cases often wastes time and may complicate professional recovery:

Professional Virus Removal Across Canada — Remote in 60-90 Minutes

IT Cares removes viruses, malware, ransomware, rootkits, and spyware remotely across Canada. Our technicians use professional-grade tools unavailable in consumer software. We provide a 30-day guarantee: if the infection returns within 30 days of our removal, we re-clean at no additional charge.

Frequently Asked Questions

How do I know if my computer has a virus?
The most reliable signs of a virus: browser homepage changed without your action; new browser toolbars or extensions you didn't install; pop-up ads appearing outside your browser window; antivirus warnings you dismissed; files with strange new extensions (.locked, .encrypted). Moderate indicators: unusual CPU or disk activity in Task Manager when no programs are open; computer significantly slower than 3 months ago; browser redirects to search engines you don't use. Any combination of reliable indicators warrants an immediate scan.
Can I remove a virus without antivirus software?
In most cases, no. Manual removal requires knowing exactly which files, registry entries, scheduled tasks, and browser extensions to remove — information that requires professional tools to identify reliably. Free tools like Malwarebytes, Windows Defender Offline, and HitmanPro do this safely and thoroughly. Manual removal risks missing components, breaking Windows by deleting wrong files, and leaving persistence mechanisms intact. Manual removal is only appropriate for experienced security professionals in specific scenarios.
Will factory reset remove a virus?
A factory reset (Settings > System > Recovery > Reset this PC > Remove everything) removes virtually all malware by reinstalling Windows from scratch. Rare exceptions: BIOS/UEFI firmware malware (extremely rare), and malware hiding in external drives or cloud sync folders (OneDrive, Dropbox) that reinfect after the reset. Always back up your personal files before resetting. Do not restore backed-up .exe or .dll files — these may be infected. Do not restore a full backup that was made while infected.
How do I remove malware from Windows in Safe Mode?
Boot into Safe Mode with Networking: Start > Power > hold Shift + click Restart > Troubleshoot > Advanced options > Startup Settings > Restart > press 5 or F5. In Safe Mode, Windows loads only essential components, preventing most malware from running during the scan. Download and run Malwarebytes from malwarebytes.com, quarantine all threats. Then run Windows Defender Offline Scan (Windows Security > Virus & threat protection > Scan options > Offline scan). Restart normally and run a verification scan after 24 hours.
What is the best free virus removal tool in 2026?
No single tool catches everything. For best results, use multiple tools in sequence: 1) Malwarebytes Free — best for adware, browser hijackers, and PUPs. 2) Windows Defender Offline Scan — best for rootkits that hide from normal scans. 3) HitmanPro (free 30-day trial) — best second-opinion multi-engine scanner using Bitdefender, Kaspersky, and ESET cloud databases simultaneously. 4) ESET Online Scanner — thorough verification with no installation required. Use all four for complete coverage after a serious infection.
How do I remove a virus from a Mac?
To remove malware from a Mac: 1) Download and run Malwarebytes for Mac (free) from malwarebytes.com. 2) Check Login Items in System Preferences > Users & Groups > Login Items — remove unfamiliar entries. 3) Check for configuration profiles in System Preferences > Profiles — remove any you don't recognize. 4) Clean browser extensions in Safari (Preferences > Extensions), Chrome, and Firefox. 5) Use Activity Monitor to identify and quit suspicious high-CPU processes. 6) Update macOS via System Preferences > Software Update. If problems persist, contact IT Cares.
Can a virus come back after removal?
Yes. Malware can reappear after apparent removal if: a rootkit reinstalls it before Windows loads; a scheduled task you missed downloads it again; it was hiding in a system restore point; it lives in a cloud-synced folder (OneDrive, Dropbox) that syncs it back; or you revisited the original infection source (same infected website, USB drive, or email attachment). If malware returns within 48-72 hours of your removal attempt, contact IT Cares for professional assessment — this is a rootkit or persistence mechanism that requires specialized tools.
What should I do if I have ransomware?
If you have ransomware: 1) Disconnect from the internet and network immediately to prevent spread to other devices. 2) Do NOT pay the ransom without expert consultation — no guarantee of recovery. 3) Photograph the ransom note with your phone — it identifies the specific ransomware family. 4) Check nomoreransom.org — many ransomware families have free decryption tools provided by law enforcement agencies. 5) Call IT Cares at 1 (888) 711-9428 for a free assessment of your recovery options. 6) Report to the Canadian Anti-Fraud Centre (antifraudcentre.ca) and local police for insurance documentation.
How do I remove a browser hijacker?
To remove a browser hijacker: 1) Uninstall recently installed unfamiliar programs from Settings > Apps. 2) Run Malwarebytes Free scan. 3) Open your browser extensions and remove everything you don't specifically remember installing. 4) Reset browser settings: Chrome > Settings > Reset settings > Restore settings to original defaults. Firefox > Help > More troubleshooting information > Refresh Firefox. 5) Check Windows startup programs and scheduled tasks for hijacker persistence mechanisms. 6) In Windows, check Control Panel > Network and Internet > Internet Options > Advanced > Reset IE settings (even if you don't use IE, hijackers sometimes modify these settings).
How long does virus removal take?
A standard DIY virus removal using free tools takes 2-4 hours: Safe Mode setup and Malwarebytes scan (40-60 minutes), Windows Defender Offline scan including reboot (45-75 minutes), HitmanPro scan (20-30 minutes), browser cleanup (15-20 minutes), password changes from clean device (20-30 minutes), and applying hardening measures (15-20 minutes). Complex infections involving rootkits may require 6+ hours or professional assistance. IT Cares remote virus removal typically takes 60-90 minutes for standard infections.
Is it safe to use a computer with a virus?
No. Using an infected computer risks having your passwords and financial information stolen, files encrypted by ransomware, your computer used to attack other systems (botnet participation), spreading the infection to other devices on your home network, and accumulating additional malware. Stop using the infected computer for any financial transactions, email, or sensitive activities immediately. Disconnect it from your network if you suspect data-stealing malware. Remove the infection before resuming normal use.
How do I remove a virus from my phone?
For Android: restart in Safe Mode (hold power button > long-press "Power off" until Safe Mode prompt appears). In Safe Mode, go to Settings > Apps and uninstall suspicious recently-installed apps. Then run Malwarebytes for Android (from Google Play Store). If problems persist, factory reset: Settings > General Management > Reset > Factory data reset. For iPhone/iOS: true malware is extremely rare on non-jailbroken iPhones. Remove suspicious profiles in Settings > General > VPN & Device Management. Update iOS. If you see fake "virus detected" pop-ups on your iPhone, these are scam websites, not real malware — close the tab and clear your browsing history.
What is the difference between a virus, malware, and a trojan?
Malware is the umbrella term for all malicious software. Within it: a virus replicates by attaching itself to legitimate files. A trojan disguises itself as legitimate software to trick you into installing it. Ransomware encrypts files and demands payment. Spyware secretly monitors your activity and steals data. Adware shows unwanted advertisements. Rootkits hide at the operating system level, concealing themselves and other malware. Browser hijackers redirect your browser for ad revenue. In everyday language, people call all of these "viruses," but the distinction matters because different types require different removal approaches.
How much does professional virus removal cost in Canada?
IT Cares professional remote virus removal in Canada starts at $79 CAD for standard infections (adware, browser hijackers, common trojans). Complex infections involving rootkits, ransomware, or business network incidents are assessed individually and quoted upfront before any work begins. We include a 30-day guarantee — if the same infection returns within 30 days, we re-clean at no charge. Call 1 (888) 711-9428 for a free phone consultation to assess your situation before booking any service.
When should I call a professional instead of doing it myself?
Call a professional when: malware returns after your removal attempt (rootkit); you have ransomware with encrypted files; your antivirus was disabled by malware; you found evidence of banking credential theft; the infection affects a business network; or you simply don't have 4+ hours for the DIY process. IT Cares at 1 (888) 711-9428 offers a free phone consultation — we will tell you honestly whether your situation needs professional help or whether the steps in this guide will be sufficient.

Comments (3)

KN
Karen N., Ottawa
May 16, 2026

The ransomware warning at the top saved me from making a terrible mistake. I was about to pay $800 in Bitcoin when I found this article. Checked nomoreransom.org and found a free decryption tool for my specific ransomware family. Got all my files back for free. Cannot thank IT Cares enough for this information.

LT
Louis T., Montreal
May 15, 2026

The virus type table is incredibly useful. I could identify exactly what I had (browser hijacker) from the symptoms column and go directly to the right fix. Safe Mode + Malwarebytes + browser reset worked perfectly. Total time about 2 hours. Very well written and organized.

AT
Anna T., Calgary
May 14, 2026

After my computer got reinfected twice, I called IT Cares. They found a rootkit in under 30 minutes that my Malwarebytes kept missing. Fully removed remotely and set me up with the hardening checklist from this article. Completely resolved. Highly recommend calling them if DIY removal isn't working.

Leave a Comment

Virus won't go away? We remove it remotely — guaranteed →
Book Removal $79 Free Call