Kaspersky Anti-Virus 2018
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Español (España, alfabetización internacional)
- Español (México)
- Deutsch
- Français
- Italiano
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Русский
- Српски
- Українська
- العربية (الإمارات العربية المتحدة)
- فارسى (ایران)
- ไทย (ไทย)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Español (España, alfabetización internacional)
- Español (México)
- Deutsch
- Français
- Italiano
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Русский
- Српски
- Українська
- العربية (الإمارات العربية المتحدة)
- فارسى (ایران)
- ไทย (ไทย)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- Kaspersky Anti-Virus
- How to install the application
- Installing the application from the command prompt
- Getting started
- How to upgrade a previous version of the application
- Switching from Kaspersky Anti-Virus to other Kaspersky Lab applications
- How to uninstall the application
- Application licensing
- Data provision
- Troubleshooting the operating system after infection
- Managing application notifications
- Assessing computer protection status and resolving security issues
- Update databases and application modules
- Scanning the computer
- How to restore an object deleted or disinfected by the application
- How to configure Mail Anti-Virus
- Protecting personal data on the Internet
- How to remove traces of activity on the computer
- Remote management of computer protection
- How to reserve operating system resources for computer games
- How to password-protect access to Kaspersky Anti-Virus management functions
- How to pause and resume computer protection
- How to restore the default application settings
- How to view the application operation report
- How to apply the application settings on another computer
- Participating in Kaspersky Security Network
- Participating in the Protect a Friend program
- Using the application from the command prompt
- Contacting Technical Support
- Limitations and warnings
- Other sources of information about the application
- Glossary
- Activating the application
- Activation code
- Anti-virus databases
- Application modules
- Available update
- Blocking an object
- Bonus activation code
- Bonus points
- Compressed file
- Database of malicious web addresses
- Database of phishing web addresses
- Digital signature
- Disk boot sector
- False positive
- File mask
- Heuristic analyzer
- iChecker Technology
- Incompatible application
- Infectable file
- Infected object
- Kaspersky Lab update servers
- Kaspersky Security Network (KSN)
- Keylogger
- License term
- Phishing
- Probable spam
- Probably infected object
- Protect a Friend profile
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Security level
- Spam
- Startup objects
- Task
- Task settings
- Threat level
- Traces
- Traffic scanning
- Trust group
- Trusted process
- Unknown virus
- Update
- Update package
- User rating
- Virus
- Virus outbreak
- Vulnerability
- AO Kaspersky Lab
- Information about third-party code
- Trademark notices
Recovering the operating system after infection
If you suspect that the operating system of your computer has been corrupted or modified due to malware activity or a system failure, use the Microsoft Windows Troubleshooting Wizard, which clears the system of any traces of malicious objects. Kaspersky Lab recommends that you run the Wizard after the computer has been disinfected to make sure that all threats and damage caused by infections have been fixed.
The Wizard checks whether there are any changes to the system, which can include access to the network being blocked, file name extensions for known formats being changed, Control Panel being blocked, etc. There are different reasons for these different kinds of damage. These reasons may include malware activity, incorrect system configuration, system failures, or malfunctioning applications for system optimization.
After the review is complete, the Wizard analyzes the information to evaluate whether there is system damage that requires immediate attention. Based on the review, the Wizard generates a list of actions that are necessary to eliminate the damage. The Wizard groups these actions by category based on the severity of the problems detected.