Work.hta Virus Removal (September 2018 Update)


How irritating is this problem? (1 votes, average: 5.00)
Loading...

This page aims to help you remove Work.hta Virus. Our removal instructions work for every version of Windows.

A new danger to users’ computers has recently been detected on the Internet. Its name is Work.hta and it belongs to the Trojan horse family. You may not have a clue if this nasty threat has sneaked inside your PC because it typically has no visible symptoms. Of course, when a major damage has been done to your system, it might be too late to take any effective measures. That’s why, on this page, we will focus on how to prevent the infection and how to detect and remove it on time. If you are interested in that, we suggest you read the next lines, where we will share some useful information about the typical places where Work.hta can be found and what issues it may cause if not removed on time. At the end of the page, you will also find a professional Work.hta removal tool and a detailed Removal guide which can help you get rid of this nasty Trojan without risk for your system.

How can Work.hta Virus infect you and what issues can it cause?

The Trojan horse infections are probably the most common computer infections that the web users encounter. There is probably no PC user who has not heard about these threats because in the online circles, they are a synonym of a total system disaster. It really can’t be otherwise, because the Trojans are so versatile and cunning in their nature, that the list of their malicious abilities is huge.

First of all, this type of infections could be found anywhere – from harmless-looking ads, pop-ups, web pages, and software installers to fake update requests, email attachments and spam. What is more, distinguishing them from normal web content is oftentimes really difficult without proper security software because these threats aim to mislead the web users about their real nature by using various forms of disguise. This is exactly what Work.hta typically does in order to infect its victims. Once it tricks them into clicking on its malicious transmitters, this Trojan secretly invades the system and waits for the commands of its criminal creators.

Work.hta Virus Removal

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide


Step1

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

Step2

WARNING! READ CAREFULLY BEFORE PROCEEDING!

Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab (the “Details” Tab on Win 8 and 10). Try to determine which processes are dangerous. 

malware-start-taskbar

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at: https://howtoremove.guide/online-virus-scanner/




Scan Results


Virus Scanner Result
ClamAV
AVG AV
Maldet


After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 

Step3

Hold together the Start Key and R. Type appwiz.cpl –> OK.

appwiz

You are now in the Control Panel. Look for suspicious entries. Uninstall it/them.

Type msconfig in the search field and hit enter. A window will pop-up:

msconfig_opt

Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

Step4

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.

Open the start menu and search for Network Connections (On Windows 10 you just write it after clicking the Windows button), press enter.

  1. Right-click on the Network Adapter you are using —> Properties —> Internet Protocol Version 4 (ICP/IP), click  Properties.
  2. The DNS line should be set to Obtain DNS server automatically. If it is not, set it yourself.
  3. Click on Advanced —> the DNS tab. Remove everything here (if there is something) —> OK.

DNS

Step5

  • After you complete this step, the threat will be gone from your browsers. Finish the next step as well or it may reappear on a system reboot.

Right click on the browser’s shortcut —> Properties.

NOTE: We are showing Google Chrome, but you can do this for Firefox and IE (or Edge).

browser-hijacker-taskbar-properties

Properties —–> Shortcut. In Target, remove everything after .exe.

ie9-10_512x512  Remove Work.hta from Internet Explorer:

Open IE, click  IE GEAR —–> Manage Add-ons.

pic 3

Find the threat —> Disable. Go to IE GEAR —–> Internet Options —> change the URL to whatever you use (if hijacked) —> Apply.

firefox-512 Remove Work.hta from Firefox:

Open Firefoxclick  mozilla menu  ——-> Add-ons —-> Extensions.

pic 6

Find the adware/malware —> Remove.
chrome-logo-transparent-backgroundRemove Work.hta from Chrome:

Close Chrome. Navigate to:

 C:/Users/!!!!USER NAME!!!!/AppData/Local/Google/Chrome/User Data. There is a Folder called “Default” inside:

Rename the Folder to Backup Default

Rename it to Backup Default. Restart Chrome.

Step6

Type Regedit in the windows search field and press Enter.

Inside, press CTRL and F together and type the threat’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

  • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
    HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
    HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

Sometimes, it may take weeks or months before the infection activates and performs the malicious commands of the hackers. But once this happens, the crooks may attack the computer in many ways. It is really difficult to predict what Work.hta might be programmed to perform because its malicious actions depends on the intentions of the criminals. Most commonly, the Trojan-based virus is used as a tool for espionage, data tracking or theft of information as well as for system and data corruption tasks. With its help, the hackers may steal the victims’ passwords, login credentials, online banking details or other sensitive data. They may also gain full remote access to the infected machine and modify its settings, insert other malware (very often Ransomware viruses are introduced via Trojan horse infections) or completely destroy the software and the data kept on the targeted computer.

That’s why, if you have the slightest doubt that Work.hta Virus might be present in your system, we highly recommend you run a thorough system scan with a reliable antimalware tool such as the professional Work.hta removal tool on this page.

How to deal with Work.hta Virus without risk for your system?

If a Trojan horse is hiding in your system, you should never experiment with your malware removal skills and should only follow trusted removal instructions. Handling a computer threat like Work.hta Virus is not easy and if not done correctly could only cause more damage. That’s why, to avoid potential risk for your system, we advise you to use the steps in the Removal Guide below or the professional malware removal software. Be very careful what files you delete, though, especially if you are trying to detect the harmful scripts manually. Work.hta Virus may easily trick you into deleting something else in order to remain on the computer, so keep this in mind.

For future protection, we advise you to first update your system to the latest security patches and eliminate any outdated software, which could be exploited. Investing in reliable security software is something that we already stressed on but, once again, having a good antivirus program can really prevent Trojan horses from sneaking inside your PC undetected. After all, the purpose of such programs is to detect potential threats and notify you about them on time before they have managed to cause any harm.

SUMMARY:

Name Work.hta
Type Trojan
Danger Level  High (Trojans are often used as a backdoor for Ransomware)
Symptoms  This malware rarely triggers visible symptoms as it tries to remain hidden in the system for longer. 
Distribution Method  Well-camouflaged transmitters such as fake ads, misleading links, infected email attachments, compromised software installers, illegal web pages, torrents. 
Detection Tool

Leave a Comment