The Great Discover Virus


The Great Discover Virus

The Great Discover Virus is a malware type categorized as a Trojan Horse that exploits the system resources and uses them for cryptocurrency generation, which severely slows down the computer. Any amount of cryptocurrency generated by the Great Discover Virus goes directly to its creators.

The Great Discover Virus

The Great Discover virus likely has gained some pretty extensive privileges in the machine

If you have this malware program on your computer, the main symptom you may have noticed is a significant decrease in the speed and responsiveness of your system. If you open the Task Manager’s Performance tab and there you see that most of your computer’s RAM and CPU is being used up even when there aren’t any resource-intensive programs currently running in the system, this could be a strong indication that you might be dealing with the Great Discover virus.

The good news is that it is likely that this virus will not try to damage the computer or the data you store on it. The goal of the Great Discover is to remain on your PC for as long as possible in order to keep leeching off of your system resources and generating cryptocurrency for its creators. Still, even though there are currently no reports of this Trojan attempting to damage any systems that it has infected, it is most definitely not safe to keep it on the computer. Since this virus likely has gained some pretty extensive privileges in the machine, it is not beyond the realm of possibility that the hackers who control it may choose to exploit those privileges and harm your computer, steal your data, or infect the PC with more malware, including sneaky Spyware threats, file-encrypting Ransomware viruses, rogue browser-targeting Adware and Hijacker extensions, Rootkits, other Trojans, and more.

What is the Great Discover?

The Great Discover is a malware program that leeches system resources off of the infected  computer to mine BitCoin, Monero, Dask, or other cryptocurrencies for its creators. If the Great Discover virus has infected your PC, there will likely be slow-downs and other performance issues.

It’s possible that some versions of this malware only mine cryptocurrency when the computer is idle so that the user won’t notice the presence of the virus. However, in other cases, the mining activities may be running at all times which could make the computer very slow and sluggish and prevent you from using it normally. Not only could this severely hinder your working process on the computer, but it could also put a massive strain on the machine’s hardware which, in turn, can contribute to an accelerated wearing-out process of the whole PC.

Distribution

Like most threats of the Trojan Horse family, the Great Discover virus primarily relies on the use of disguise to make its way into its victim’s computers. Whether through a spam email message with a misleading download link, a fake update request for some app that you may or may not have, or through being bundled to another, more presentable piece of software, the distribution method used to get this Trojan added to your system would always be aimed at tricking you and making you think you are not downloading a virus but rather something useful or at least something that’s not malicious. This is why, in order to prevent landing this, or another similar malware, in the future, it is strongly recommended to, firstly, be very selective about the sources you use to download new software and, secondly, to always read the small text and check the Advanced setup options of the installers you are running in the computer because this is can help you notice if anything potentially unwanted has been added to a program that may otherwise look legitimate.

Malware Related to the Great Discover

The Great Discover virus is the latest addition to a family of Trojan Horse threats, that are all used for similar purposes or have been created by the same hacker groups. Therefore, if you have the Great Discover in your system, it is highly possible that there could be other malware programs from that same virus family on your computer. If you complete the guide we’ve shared on this page, you should be able to clean everything, especially if you make use of the powerful removal tool that we’ve linked below. However, it would still be a good idea to check out our other articles that focus on the rest of the threats from the Great Discover virus family so that you may learn some additional information about them and their removal from the system. Here are the other similar threats that we have written articles on:

 SUMMARY:

Name The Great Discover Virus
Type Trojan
Detection Tool

How to Uninstall the Great Discover Virus?

To uninstall the Great Discover virus, you must first find it and delete it from the Programs and Features page and then delete its folder from C:\Program Files or C:\Program Files (x86).

  1. Type Programs and Features in the Start Menu and press the Enter key.
  2. Look for a Great Discover or from any of the other threats of the same malware family that we mentioned in the article as well as for any other suspicious program or app.
  3. If you find anything that shouldn’t be there, click on its icon, select Uninstall from the top, and complete the on-screen steps to uninstall the Great Discover Virus.
  4. Go to C:\Program Files or C:\Program Files (x86), find the Great Discover folder (could be named differently), and delete it.

Advanced Removal Steps

The following instructions provide a more detailed and in-depth explanation of the removal process of this Trojan and they also add some extra steps to ensure that the threat gets fully deleted from your computer. Therefore, if the previous steps weren’t enough to help you with the Trojan Horse removal, then proceed to the next instructions.

  1. Click on the Windows Start button from bottom left.
  2. In Control Panel open Programs and Features.
  3. Click on Uninstall a Program and you should see a list of all programs currently installed on your computer.
  4. Search for questionable-looking programs that could have a relation to The Great Discover Virus. It is not necessarily that they have the same name, therefore search carefully and pay attention to apps that have unknown developers, or you can’t remember installing.
  5. When you are sure that you have found a Trojan-related app, select it and click on the Uninstall button at the top.
  6. A prompt like the one on the image below may ask you for confirmation. Make sure you  choose NO and complete the uninstallation process:

    virus-removal1

Attention! The quick instructions above may help you remove the dangerous The Great Discover Virus-related apps from the Programs and Features list but if there are other malicious entries stored in different system locations, you will need to complete the detailed removal instructions below in order to remove the Trojan successfully.


Step1 Reboot in Safe Mode

Trojans like The Great Discover Virus may add malicious components in various system locations in order to prevent being fully removed from the infected system. Therefore, the successful deletion of the infection depends on your ability to detect these malicious components quickly and remove them without fail. Professionals surely know how to do that but for regular web users, things can much easier if they first reboot their computer in Safe Mode. and then proceed with the steps shown below. 

Important! During some of the steps in this guide, your browser may have to quit. Therefore, we recommend that you Bookmark this page, so you can quickly get back to its instructions and complete the removal of The Great Discover Virus. 

Step2

WARNING! READ CAREFULLY BEFORE PROCEEDING!

Once the computer is launched in Safe Mode, you need to press CTRL + SHIFT + ESC keyboard keys together and open the Windows Task Manager. Once in it, tap on Processes and search the list for active processes that consume unusually high system resources, have odd names or look suspicious.  

malware-start-taskbar

If you find a process that you cannot relate to any legitimate program that you have on your computer, right-click on it and select Open File Location. Then scan the files stored in that location for malicious code by dropping them in the free online scanner below:

Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
This scanner is free and will always remain free for our website's users.
This file is not matched with any known malware in the database. You can either do a full real-time scan of the file or skip it to upload a new file. Doing a full scan with 64 antivirus programs can take up to 3-4 minutes per file.
Drag and Drop File Here To Scan
Drag and Drop File Here To Scan
Loading
Analyzing 0 s
Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
    This scanner is based on VirusTotal's API. By submitting data to it, you agree to their Terms of Service and Privacy Policy, and to the sharing of your sample submission with the security community. Please do not submit files with personal information if you do not want them to be shared.


    Based on the scan results, you can easily determine if the selected process is malicious or not. If it is, end it and delete the folders that store the malicious files.  

    Step3

    In some cases, The Great Discover Virus may incorporate malicious startup entries in the Startup section of your computer in order to launch its harmful processes as soon as the computer starts. Therefore, you need to check for such entries and remove them.

    This can be done by typing msconfig in the windows search field and hitting enter to open the System Configuration window: 

    msconfig_opt

    Next, click on the Startup tab to search the startup entries for questionable ones. If you find any, uncheck their checkmark. Any entries with “Unknown” Manufacturer should best be researched online to find out if they are legitimate or not before you decide whether to uncheck them. Once you are done, save the changes by clicking on OK.

    Step4

    Attention! Trojans may act as a backdoor for other malware. Therefore, if you have been infected with The Great Discover Virus, you should check if a bigger threat (like spyware or ransomware) has compromised your PC without your knowledge and has hacked your system. This can be done in the following way:

    • Press the Start and R keyboard keys together.
    • A dialog box named Run will appear on the screen.
    • Copy the line below in the Run box :

    notepad %windir%/system32/Drivers/etc/hosts

    • Press Enter to execute the command.
    • This will open a text file named Hosts.
    • Scroll the text in the Hosts file and find where it is written Localhost.
    • Then, carefully look at the example image below. 

    hosts_opt (1)

    • If your system is not compromised, you shouldn’t see anything disturbing.
    • If you are hacked, however, you may see dozens of strange IPs under Localhost just as explained in the image. In this case, we invite you to leave us a comment below this guide, so we can provide you with instructions on what to do in this scenario.

    Step5

    A lot of Trojans can make changes in the Registry of the infected computer and add malicious entries that affect the system’s stability. To remove these entries you need to start the Registry Editor app on your computer by typing Regedit in the windows search field and pressing the Enter key

    Next, by pressing CTRL and F keys together, open the Find function and type the name of the Trojan in the Find dialog box. Press Find Next to search the Registry and delete all entries that are found with that name.

    Finally, go manually to each of the listed directories below and uninstall/delete them:

    • HKEY_CURRENT_USER->Software->Random Directory. 
    • HKEY_CURRENT_USER->Software->Microsoft->Windows->CurrentVersion->Run->Random
    • HKEY_CURRENT_USER->Software->Microsoft->Internet Explorer->Main->Random

    If The Great Discover Virus still keeps messing with your system after you complete all the steps above, it is best to scan the computer with the anti-virus program listed on this page to search for hidden elements that help the Trojan’s persistence. Also, use the online virus scanner to scan any questionable files. 

    blank

    About the author

    blank

    Brandon Skies

    Brandon is a researcher and content creator in the fields of cyber-security and virtual privacy. Years of experience enable him to provide readers with important information and adequate solutions for the latest software and malware problems.

    2 Comments

    • hi hello, thank you so much for this article/page. i appreciate it so much. i did step 4, where you asked to paste this in the run box (notepad %windir%/system32/Drivers/etc/hosts) and found those weird IPs. can spyhunter handle/remove these IPs for me or could you help me in any way? again, thanks so much.

      • Hi Irdina, can you please post the suspicious IPs in your hosts file here so maybe I can tell you if they pose any threat or no. If you have any questions regarding SpyHunter 5 you can ask them here

    Leave a Comment