What to do if your PC has a trogen

Checked on January 1, 2026
Disclaimer: Factually can make mistakes. Please verify important information or breaking news. Learn more.

Executive summary

A confirmed or strongly suspected Trojan on a Windows PC requires immediate containment, thorough scanning with reputable tools, and—if necessary—a clean reinstall; follow-up steps must include credential resets from a known-clean device and review for data exfiltration or fraud [1] [2] [3]. Multiple independent scans (including offline rescues) are recommended because Trojans can hide, install additional payloads, or survive partial removal [4] [1] [5].

1. Isolate the machine now — cut the network and stop using it for sensitive tasks

If a Trojan is suspected, disconnect the PC from the internet and any local networks immediately to limit command‑and‑control connections and lateral movement to other devices; this simple containment step reduces the risk that the malware will steal credentials or phone home while removal is attempted [5] [3]. Avoid logging into bank or email accounts on the infected PC and do not enter passwords until the system is verified clean [6] [7].

2. Preserve important files, but assume they may be compromised

Back up personal documents to external media only if possible to do so without running unknown programs; however, understand that files can carry malware or credentials, so treat backups as potentially tainted and scan them with multiple antivirus engines before restoring elsewhere [5] [1]. If the Trojan targeted specific data (financial files, password stores), assume those accounts were exposed and prepare to rotate credentials from a different, clean device [6].

3. Run layered scans — start with Windows Security, then a second vetted tool, then an offline scan

Begin with full scans using Windows Security/Defender (Windows Security > Virus & Threat Protection) because it’s integrated and reliable for many detections, then run a second reputable scanner (Malwarebytes, Avast, McAfee, etc.) to pick up items one engine might miss [1] [8] [9]. If in‑OS scans don’t fully remove the threat, boot a rescue or offline scanner (Windows Defender Offline or vendor rescue media) to catch rootkits and deeply embedded components that run before Windows boots [10] [1] [2].

4. Quarantine, remove, and verify — repeat until clean, then reassess system integrity

Quarantine detected items first, then remove them; after removal, reboot and run repeated full and offline scans until no threats are found [11] [2]. Be mindful that some Trojans install secondary malware or modify system settings; simply deleting one executable may not eliminate additional backdoors, so verification across several tools is prudent [4] [5].

5. If removal fails or the system shows persistent signs, prepare for a clean reinstall

When scans and offline tools can’t assure a pristine state, a clean Windows reinstall (format + install) is a reliable last resort; create installation media from another trusted PC, back up necessary data first, and then perform a fresh install to eliminate stealthy persistence mechanisms [10] [2]. Document which programs and data were restored and scan everything before reconnecting to networks [10] [1].

6. Recovery: change passwords, audit accounts, and monitor for fraud from a clean device

After the PC is clean or rebuilt, change passwords and enable MFA for email, banking, and critical services using a known‑good device because Trojans commonly harvest credentials [6] [3]. Monitor financial accounts and credit reports for unexplained activity; if the Trojan was a credential‑harvesting or banker family strain, contact banks and consider identity‑theft protections [6].

7. Prevent recurrence and beware of scams posing as “trojan alerts”

Strengthen defenses: keep OS and apps patched, use a modern antivirus with real‑time protection and anti‑phishing features, avoid pirated software or questionable downloads, and be skeptical of pop‑ups that demand a support phone call (those are common tech‑support scams that exploit fear of Trojans) [3] [7] [5]. Consider professional incident response if the machine belonged to a business or the infection involved sensitive corporate data [3].

Want to dive deeper?
How to create and use Windows Defender Offline or rescue media to remove persistent malware?
What steps should be taken to recover accounts and finances after credential theft by spyware or banker Trojans?
Which signs indicate a Trojan installed a backdoor or additional malware that necessitates professional incident response?