Sensitive computer user information



w32.changeup is a worm that is spread through infected removable drives, mapped network drives, certain file-sharing programs or by exploiting the Microsoft Windows Shortcut 'LNK' Files Automatic File Execution Vulnerability of computer systems that have not been patched.

One of the primary functions of the w32.changeup worm is to download malware onto the infected computer. Some of it’s variants may pose an additional threat to your personal information through the hidden installation of a keylogger, which may record your every keystroke.



How to remove w32.changeup from your computer


Before you start, we always suggest hat you back up your important data to usb flash drive or some other external media. Unfortunately, since this particular worm is spread through the use of removable drives, any backups that you make to external devices may spread the infection onto the backup devices. Either way you should still backup your important files to a cd or dvd. And after you have successfully removed w32.changeup, execute an antiviral scan on the media that you backed up your data on., To prevent a possible re infection of your computer.  You will need only a few programs to remove the worm. You should be able to download the files below on the infected system. If that’s not the case,  you’ll need to download the needed files on an alternate computer, burn them to cd (Not On a Flash Drive) and then execute them on the infected computer.

You’ll need to download:

  1. Combofix
  2. Malwarebytes



w32.changeup removal procedure:


  1. First, at the Windows desktop in normal mode,  delete your temporary Internet files.
  2. Afterwards, disable any antivirus utility programs that you already have installed on the computer and run a scan with “Combofix”. It may take around 15 minutes or more to complete it’s scan. It’s important that you don’t interrupt it by trying to open any other programs on your system while Combofix is performing it’s scan.
  3. After Combofix has completed it’s scan, install a copy or Malwarebytes, update it and then run a full scan. Repair or delete any infected files that the utility locates. And just in case, restart your system after the scan and removal are complete.
  4. The removal procedure is complete!




The information in this article is provided "as is". It should be used for educational purposes only. Smith Technical Resources makes no guarantees or claims that the information contained in this article will help you completely remove the above listed malicious program(s) from your computer.

If you feel uncomfortable performing any of the procedures that we've listed on this page, please contact a professional computer repair company in your area and have them complete the needed repairs on your computer. Smith Technical Resources takes no responsibility for any possible damage that could result from your use of the above instructions.


©Smithtechres.com 2013 All Rights Reserved. Website Privacy Policy. Site Map


Share on Twitter Share on Stumble Upon Share on Digg Share on Delicious


Providing cost-effective local computer repair and network support in the middle Tennessee area

Remote Access Portal

Remote Access Icon
Home About Us Onsite Services Online Services Self Help Pricing Blog Inquiries