SecurityA+

Malware Troubleshooting for CompTIA A+ 220-1102

Diagnosing and resolving malware infections requires systematic investigation. CompTIA A+ 220-1102 tests your ability to identify infection indicators, use diagnostic tools, and apply the correct remediation procedure. This guide covers practical malware troubleshooting skills and exam scenarios.

9
5 sections · 8 exam key points
1 practice questions

Recognizing Infection Symptoms

Malware symptoms vary by type. Performance-based indicators: System significantly slower than baseline, unusual disk or network activity at idle, CPU at sustained high percentage with no user-initiated tasks. Browser-based indicators: Homepage or default search engine changed without user action, unexpected toolbars or extensions installed, browser redirects to unexpected sites, excessive pop-ups even on trusted sites. Security-related indicators: Antivirus software disabled or refusing to update, cannot access security websites (antivirus vendors' sites), new or suspicious user accounts in User Accounts. File system indicators: Files missing, renamed, or encrypted (ransomware), .exe or .bat files appearing in unexpected locations, desktop wallpaper changed to ransom demand. Network indicators: Unusual outbound connections in netstat -a, DNS queries to unfamiliar servers, traffic to known malicious IPs. System behavior: Programs crashing, UAC prompts appearing unexpectedly, Task Manager or Registry Editor disabled, system processes with misspelled names (svchost.exe vs scvhost.exe).

Diagnostic Tools

Windows Security / Windows Defender: primary built-in scanner. Update definitions first, then run full scan. Malwarebytes Free: excellent second-opinion scanner. Detects PUPs, adware, browser hijackers. Run after Defender in Safe Mode. Autoruns (Sysinternals): shows all autostart locations. VirusTotal integration highlights suspicious entries. Uncheck to disable without deleting (for safe testing). Process Explorer (Sysinternals): verify each process's digital signature, identify processes hiding behind legitimate names. HijackThis / AdwCleaner: browser hijacker detection and removal. TCPView (Sysinternals): real-time network connections — identify unusual outbound connections. netstat -b (admin): show which process owns each network connection. Windows Defender Offline: pre-OS scan, most effective for rootkits. Access: Windows Security → Virus & threat protection → Scan options → Microsoft Defender Offline scan (requires restart). Google's "run a safety check" in Chrome: checks for harmful extensions and settings.

Troubleshooting Specific Malware Types

Browser hijacker: change homepage/search engine in browser settings, remove suspicious extensions, run AdwCleaner. Check HKCU\Software\Microsoft\Internet Explorer\Main for DefaultSearch. Ransomware: disconnect from network immediately (prevent further encryption and C2 communication). Do NOT pay the ransom — no guarantee of key delivery. Restore from clean backup (most reliable). Check No More Ransom (nomoreransom.org) for free decryptors for known ransomware families. Cryptominer: causes sustained high CPU usage. Check Task Manager and Process Explorer. Miners often hide as legitimate process names. Rootkit: requires offline scanning (Defender Offline, bootable rescue disk). May require OS reinstallation. PUP (Potentially Unwanted Program): bundled software installed without clear consent. AdwCleaner or Malwarebytes detects most PUPs. Fileless malware: lives in memory or registry, no files to detect. EDR solutions with behavioral analysis are most effective. Check unusual PowerShell processes in Autoruns and Process Explorer.

Persistence Mechanisms

Malware uses persistence mechanisms to survive reboots. Common persistence locations: Registry Run keys: HKLM and HKCU \SOFTWARE\Microsoft\Windows\CurrentVersion\Run and \RunOnce. Startup folder: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup (all users) and C:\Users\Username\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (current user). Scheduled tasks: Task Scheduler — check for tasks with suspicious names or pointing to non-standard executables. Services: malware creates a Windows service for persistence. Check services.msc for suspicious services. Browser extensions: persist in browser even after OS malware removal. DLL hijacking: malware places a DLL in a location where a legitimate process will find it before the real DLL. WMI event subscriptions: advanced persistence — attacker creates WMI events that trigger malware execution. Remove with specialized tools. Check all these locations when removing malware — missing one persistence mechanism causes reinfection.

When to Escalate or Reinstall

Escalation triggers: rootkit confirmed and resistant to removal attempts. Fileless malware suspected (may require specialized EDR tooling). Ransomware where restoring from backup is not possible and decryptor not available. System remains unstable after multiple removal attempts. High-value or sensitive system where complete certainty of clean status is required. Suspicious of APT (Advanced Persistent Threat) — nation-state or sophisticated attacker. OS reinstallation procedure: back up personal data to external storage (from a known-clean boot environment if possible). Verify backup files are not infected (scan before restoring). Wipe and reinstall Windows from official installation media. Restore only personal data files (not program files, executables). Reinstall applications from original sources. Re-enroll in MDM if applicable. Change all passwords on accounts that the infected machine could have accessed.

Key exam facts — A+

  • Homepage/search hijack, disabled antivirus, encrypted files = common infection indicators
  • Malwarebytes: second-opinion scanner — run after Defender for comprehensive detection
  • Autoruns: check all persistence locations — missing one = reinfection
  • Ransomware: disconnect from network, do NOT pay, restore from backup, check nomoreransom.org
  • Windows Defender Offline: boot-time scan — most effective for rootkits
  • Common persistence: registry Run keys, startup folder, scheduled tasks, services
  • Reinstall OS when: rootkit confirmed, system unstable after removal, high-value system
  • After malware removal: change ALL passwords accessed from the infected machine

Common exam traps

Practice questions — Malware Troubleshooting

These questions are representative of what you will see on A+ exams. The correct answer and explanation are shown immediately below each question.

Q1.

A.A. Spyware
B.B. Adware
C.C. Ransomware
D.D. Rootkit

Explanation: File encryption, renamed file extensions, and a ransom demand are the hallmark symptoms of ransomware. Immediately disconnect the system from the network, do not pay the ransom, and restore from a clean backup.

Frequently asked questions — Malware Troubleshooting

What is the first thing I should do if I suspect a computer is infected?

Follow CompTIA's procedure: (1) Verify the infection symptoms. (2) Isolate/quarantine the computer — disconnect network cable and disable Wi-Fi. (3) Disable System Restore. (4) Update antivirus definitions and run a scan in Safe Mode. (5) Use a second scanner (Malwarebytes). (6) Re-enable System Restore, create a restore point. (7) Educate the user. Change all passwords accessed from the machine after confirmed infection.

Practice this topic

Test yourself on Malware Troubleshooting

JT Exams routes you to questions in your exact weak areas — automatically, after every session.

No credit card · Cancel anytime

Related certification topics