2015年5月5日星期二

Guides to Throughly Remove Backdoor.Generic18.UIY - Remove Trojan Horse from Your Computer

I have found a Trojan named Backdoor.Generic18.UIY from the system folders last night. My computer became sluggish and chaotic because of this Trojan. I have tried some other tools to clear the threat but unluckily none of them works. It came back again and again after I started up my computer. This Trojan horse keeps coming back. There were not other ways I can find to get rid of this Trojan virus. Anyone can help me totally eliminate such kind of Trojan horse?
Friendly Reminder: Please try a professional trojan horse removal tool to remove this trojan horse once you can't remove it through the manual removal guide below.


Introduction of Backdoor.Generic18.UIY


Just as its name implies, Backdoor.Generic18.UIY is classified as a Trojan horse. It can easily settle down on the computer through the way of embedding in legal program unnoticeably. Those unknown insecure downloading freeware and software applications bring unsafe files and malicious codes in the installation folders to computer system and infect system files in the way of replacing them with illegal files in deceptive name and with similar suffix, such as TXT, DOC, JPG, DLL, so that people are more likely to open the fake files as they expect. The purpose of using the fake file name and suffix is to confuse Windows system in order to hide the intrusion and existence of viruses. A majority of users may treat those Trojan files as an normal picture or document and then tempt to click to open or run them. It is very difficult for people to detect its trait with the naked eye. It is known that if a hacker wants to take control of a computer, he must deceive the user into running the Trojan program. Hackers will spare no effort to achieve their evil goal that the Trojan threat should be completely infiltrated into the target computer system. Commonly, computer users like to use anti-virus to do a system full scan. Since antivirus detection depends on the feature code in a program, hackers will inject legal code into the Trojan horse in order to escape from detection and removal by common antivirus program.
Like other malicious Trojan horses, this threat is not only responsible for destroying computer system, but also monitoring activities on the infected computer for the purpose of stealing sensitive information which may include IP address, usernames and passwords of different sites, online banking account details, etc. Trojan horses were mainly used to spy out others’ privacy or just play a trick on them. Different from the past, Trojan horses have been commercialized aiming at useful information in the target machine for the sake of gaining profits from computer users. The Trojan techniques allow the virus get through computer system without barrier whether in external or internal network. Since this risky virus can harm your computer badly, it is advised to eliminate it timely to avoid further loss.
Note: It requires sufficient computer knowledge and skills to manually remove the Trojan horse. If you are not expert at computer, using a professional malware removal tool will be a better option.

How dangerous is Backdoor.Generic18.UIY?


1It may open a backdoor and enable hackers to access your PC remotely without permission. 2. It makes a kings of damage: turning screens blue, slowing computer speeds, crashing systems and erasing executable programs. 3. It drops other malicious codes on your computer. 4 It may record your browsing history and steal your important data.

Manually Remove Backdoor.Generic18.UIY - Remove Trojan Horse Virus Step by Step


Backdoor.Generic18.UIY is one of the latest discovered Trojan virus which can get loaded on the computer automatically. It can cause a series of computer problems and downloads more malware to the compromised system. Moreover, it is a tool used by hackers to gain unauthorized access to the target computer and steal the victim’s information. You may have to eliminate it immediately. Users can follow the manual guide here to have it removed instantly.
1: Boot up your computer in Safe Mode with Networking:
Method One
1: Press “Windows” and “R” keys together to open the Run box
Use Windows key and R key to boot in Safe Mode on Windows 8
2: Type “msconfig” in the the Run box and click OK
msconfig
3: Click the Boot tab, then check the box that says “Safe boot” and “Network” under the Boot options section Click OK.
System Configuration - Windows 8
4: Click Restart when it informs that you need to restart your computer.
system configuration
Method Two
1:Press the “Windows” + “C” keys, and then click Settings.
Win + C keys to open Settings on Win 8
Settings on Windows 8
2: Click Power, hold down Shift key on your keyboard and click Restart.
open Troubleshoot on Windows 8
3: Click Troubleshoot button
Troubleshoot on Win 8
4: Click Advanced options button
Advanced options on windows 8
5: Click Startup Settings button
Startup Settings on windows 8
6: Click Restart button enable Safe Mode on Win 8
7: Press 5 on your keyboard to Enable Safe Mode with Networking.
Enable Safe Mode with Networking on win 8
2: Show all hidden files:
On Windows XP
? Close all programs so that you are at your desktop.
? Click on the Start button. This is the small round button with the Windows flag in the lower left corner.
? Click on the Control Panel menu option.
? When the control panel opens click on the Appearance and Personalization link.
? Under the Folder Options category, click on Show Hidden Files or Folders.
? Under the Hidden files and folders section, select the radio button labeled Show hidden files, folders, or drives.
? Remove the checkmark from the checkbox labeled Hide extensions for known file types.
? Remove the checkmark from the checkbox labeled Hide protected operating system files (Recommended).
? Press the Apply button and then the OK button.
On Windows 7 / Vista
? Click and open Libraries
? Under the Folder Options category of Tools , click on Show Hidden Files or Folders.
? Under the Hidden files and folders section, select the radio button labeled Show hidden files, folders, or drives.
? Remove the checkmark from the checkbox labeled Hide extensions for known file types.
? Remove the checkmark from the checkbox labeled Hide protected operating system files (Recommended).
? Press the Apply button and then the OK button
On Windows 8 /8.1
? Click on Windows Explorer ;
? Click on View tab;
? Check the “Hidden Items” box
3: End Backdoor.Generic18.UIY associated files
%commondesktopdir%Backdoor.Generic18.UIY.lnk
%windows%System32drivers[**Random**].sys
C:WindowsSystem32drivers[Random].sys
%program files%Backdoor.Generic18.UIY .lnk
%ProgramFiles%Protected SearchTaskSchedulerCreator.exe
%System%driversUAC[RANDOM CHARACTERS].sys
%Documents and Settings%[UserName]Application Data Backdoor.Generic18.UIY
4: Stop Backdoor.Generic18.UIY related processes in the Windows Task Manager
Backdoor.Generic18.UIY .exe
On Windows XP
Press Ctrl+Alt+Del keys together to open Windows Task Manager ;
Under the Processes tab, right-click on the processes related with the virus and click End Process
Windows Task Manager on XP
On Windows 7 / Windows Vista
Right-click on Task Bar and click click Task Manager;
Under the Processes tab, right-click on the processes related with the virus and click End Process
Windows Task Manager on windows 7 and vista
end process on windows 7 and vista
On Windows 8 / 8.1
Right-click on Task Bar and click click Task Manager;
Under the Processes tab, right-click on the processes related with the virus and click End Process
Windows Task Manager on windows 8
5.Open the Registry Editor
Method 1
(Available on Windows XP, Windows 7 /Vista, and Windows 8 /8.1):
Call out “Run” box by pressing “Windows” key + “R” key on your keyboard;
Type “Regedit” into the Run box and click OK to open Registry Editor
Method 2
(Available on Windows 7/ Vista):
Click on Start button to open Start Menu
Type “Regedit” into the search box and click on Regedit to open Registry Editor
6: Delete Registry Entries created by Backdoor.Generic18.UIY
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesActiveDesktop “NoChangingWallPaper” = ’1
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesAttachments “SaveZoneInformation” = ’1
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem “DisableTaskMgr” = ’1
HKEY_LOCAL_MACHINEsoftwareclassesurlsearchhook.toolbarurlsearchhook
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerToolbar
HKEY_LOCAL_MACHINESOFTWAREMozillaFirefoxextensions,
HKEY_CURRENT_USERsoftwaremicrosoftinternet explorertoolbarwebbrowser
HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain “Use FormSuggest” = ‘yes’
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerAdvanced “ShowSuperHidden” = 0

Note: Of course, it's highly recommended that you should remove trojan horse in a professional way if there are still some similar problems with your computer.

Conclusion



Backdoor.Generic18.UIY is a big trouble to computer. As mentioned above, Trojans are often good at pretending to be harmless files but they may carry out a number of malicious tasks on the infected PCs. The troubles brought by this Trojan often appear while using the infected computer, problems as poor system performance, non-response error will jump out suddenly within minutes. Once it settles down, this Trojan horse will start its payloads. The Trojan horse will change system settings and you will be interrupted by lots of constant pop ups. The tricky Trojan hides behind system rootkit, this is the reason why it is hard to be removed. Manual way should be the most effective way to remove nasty virus. Moreover, it's clever for you to set up a professional malware removal tool to detect and remove all the feasilbe infections. 

没有评论:

发表评论