Kaspersky Free
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Deutsch
- Eesti
- Español (España)
- Español (México)
- Français
- Italiano
- Latviešu
- Lietuvių
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Български
- Русский
- Српски
- العربية (الإمارات العربية المتحدة)
- ไทย (ไทย)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Deutsch
- Eesti
- Español (España)
- Español (México)
- Français
- Italiano
- Latviešu
- Lietuvių
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Български
- Русский
- Српски
- العربية (الإمارات العربية المتحدة)
- ไทย (ไทย)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- Data provision
- Data provision under the End User License Agreement
- Data provision under the End User License Agreement on the territory of the European Union, the United Kingdom, Brazil, or by California residents
- Data provision to Kaspersky Security Network
- Saving data to the application operation report
- Locally processed data
- Saving service data on application operation
- About using the application in the European Union, the United Kingdom, Brazil, or by California residents
- About Kaspersky Free
- How to install or remove the application
- What is My Kaspersky account for?
- How to protect another device
- Switching from Kaspersky Free to a different subscription
- How to configure the application interface
- Security
- Assessing computer protection status and resolving security issues
- How to fix security issues on your PC
- How to restore a deleted or disinfected file
- Scanning the computer
- Updating anti-virus databases and application modules
- Pre-Kaspersky virus removal
- Weak Settings Scan
- Scanning email messages
- Protection using hardware virtualization
- About protection using Antimalware Scan Interface
- Game mode
- Privacy Cleaner
- Protecting personal data on the Internet
- Security news
- Data Leak Checker
- How to uninstall incompatible applications
- How to pause and resume computer protection
- How to restore the default settings of the application
- How to view the application operation report
- How to apply the application settings on another computer
- Participating in Kaspersky Security Network
- Limitations and warnings
- Other sources of information about the application
- Network settings for interaction with external services
- Glossary
- Activation code
- Anti-virus databases
- Application modules
- Blocking an object
- Compressed file
- Database of malicious web addresses
- Database of phishing web addresses
- Disk boot sector
- Exploit
- False positive
- Heuristic analyzer
- iChecker Technology
- Incompatible application
- Infected object
- Kaspersky Security Network (KSN)
- Kaspersky update servers
- License term
- Phishing
- Probably infected object
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Security level
- Startup objects
- Task
- Task settings
- Traces
- Traffic scanning
- Unknown virus
- Update
- Update package
- Virus
- Vulnerability
- Information about third-party code
- Trademark notices
Recovering the operating system after infection
If you suspect that the operating system of your computer has been corrupted or modified due to malware activity or a system failure, use the Microsoft Windows Troubleshooting Wizard, which clears the system of any traces of malicious objects. Kaspersky recommends that you run the Wizard after the computer has been disinfected to make sure that all threats and damage caused by infections have been fixed.
The Wizard checks whether there are any changes to the system, which can include access to the network being blocked, file name extensions for known formats being changed, Control Panel being blocked, etc. There are different reasons for these different kinds of damage. These reasons may include malware activity, incorrect system configuration, system failures, or malfunctioning applications for system optimization.
After the review is complete, the Wizard analyzes the information to evaluate whether there is system damage that requires immediate attention. Based on the review, the Wizard generates a list of actions that are necessary to eliminate the damage. The Wizard groups these actions by category based on the severity of the problems detected.
See also: Troubleshooting the operating system by using the Microsoft Windows Troubleshooting Wizard |