I have found a Trojan named Backdoor.Generic18.UIY from the system
folders last night. My computer became sluggish and chaotic because of this
Trojan. I have tried some other tools to clear the threat but unluckily none of
them works. It came back again and again after I started up my computer. This
Trojan horse keeps coming back. There were not other ways I can find to get rid
of this Trojan virus. Anyone can help me totally eliminate such kind of Trojan
horse?
Friendly Reminder: Please try a professional trojan horse removal tool
to remove this trojan horse once you can't remove it through the manual removal
guide below.
Introduction of Backdoor.Generic18.UIY
Just as its name implies, Backdoor.Generic18.UIY is
classified as a Trojan horse. It can easily settle down on the computer through
the way of embedding in legal program unnoticeably. Those unknown insecure
downloading freeware and software applications bring unsafe files and malicious
codes in the installation folders to computer system and infect system files in
the way of replacing them with illegal files in deceptive name and with similar
suffix, such as TXT, DOC, JPG, DLL, so that people are more likely to open the
fake files as they expect. The purpose of using the fake file name and suffix is
to confuse Windows system in order to hide the intrusion and existence of
viruses. A majority of users may treat those Trojan files as an normal picture
or document and then tempt to click to open or run them. It is very difficult
for people to detect its trait with the naked eye. It is known that if a hacker
wants to take control of a computer, he must deceive the user into running the
Trojan program. Hackers will spare no effort to achieve their evil goal that the
Trojan threat should be completely infiltrated into the target computer system.
Commonly, computer users like to use anti-virus to do a system full scan. Since
antivirus detection depends on the feature code in a program, hackers will
inject legal code into the Trojan horse in order to escape from detection and
removal by common antivirus program.
Like other malicious Trojan horses, this threat is not only responsible
for destroying computer system, but also monitoring activities on the infected
computer for the purpose of stealing sensitive information which may include IP
address, usernames and passwords of different sites, online banking account
details, etc. Trojan horses were mainly used to spy out others’ privacy or just
play a trick on them. Different from the past, Trojan horses have been
commercialized aiming at useful information in the target machine for the sake
of gaining profits from computer users. The Trojan techniques allow the virus
get through computer system without barrier whether in external or internal
network. Since this risky virus can harm your computer badly, it is advised to
eliminate it timely to avoid further loss.
Note: It requires sufficient computer knowledge and skills to
manually remove the Trojan horse. If you are not expert at computer, using a
professional malware removal tool will be a better option.
How dangerous is Backdoor.Generic18.UIY?
1It may open a backdoor and enable hackers to access your PC remotely
without permission. 2. It makes a kings of damage: turning screens blue, slowing
computer speeds, crashing systems and erasing executable programs. 3. It drops
other malicious codes on your computer. 4 It may record your browsing history
and steal your important data.
Manually Remove Backdoor.Generic18.UIY - Remove Trojan Horse Virus Step by Step
Backdoor.Generic18.UIY is one of the latest discovered Trojan virus
which can get loaded on the computer automatically. It can cause a series of
computer problems and downloads more malware to the compromised system.
Moreover, it is a tool used by hackers to gain unauthorized access to the target
computer and steal the victim’s information. You may have to eliminate it
immediately. Users can follow the manual guide here to have it removed
instantly.
1: Boot up your computer in Safe Mode with Networking: Method One
1: Press “Windows” and “R” keys together to open the Run box
Use Windows key and R key to boot in Safe Mode on Windows 8
2: Type “msconfig” in the the Run box and click OK
msconfig
3: Click the Boot tab, then check the box that says “Safe boot” and “Network” under the Boot options section Click OK.
System Configuration - Windows 8
4: Click Restart when it informs that you need to restart your computer.
system configuration
Method Two
1:Press the “Windows” + “C” keys, and then click Settings.
Win + C keys to open Settings on Win 8
Settings on Windows 8
2: Click Power, hold down Shift key on your keyboard and click Restart.
open Troubleshoot on Windows 8
3: Click Troubleshoot button
Troubleshoot on Win 8
4: Click Advanced options button
Advanced options on windows 8
5: Click Startup Settings button
Startup Settings on windows 8
6: Click Restart button enable Safe Mode on Win 8
7: Press 5 on your keyboard to Enable Safe Mode with Networking.
Enable Safe Mode with Networking on win 8
2: Show all hidden files:
On Windows XP
? Close all programs so that you are at your desktop.
? Click on the Start button. This is the small round button with the Windows flag in the lower left corner.
? Click on the Control Panel menu option.
? When the control panel opens click on the Appearance and Personalization link.
? Under the Folder Options category, click on Show Hidden Files or Folders.
? Under the Hidden files and folders section, select the radio button labeled Show hidden files, folders, or drives.
? Remove the checkmark from the checkbox labeled Hide extensions for known file types.
? Remove the checkmark from the checkbox labeled Hide protected operating system files (Recommended).
? Press the Apply button and then the OK button.
On Windows 7 / Vista
? Click and open Libraries
? Under the Folder Options category of Tools , click on Show Hidden Files or Folders.
? Under the Hidden files and folders section, select the radio button labeled Show hidden files, folders, or drives.
? Remove the checkmark from the checkbox labeled Hide extensions for known file types.
? Remove the checkmark from the checkbox labeled Hide protected operating system files (Recommended).
? Press the Apply button and then the OK button
On Windows 8 /8.1
? Click on Windows Explorer ;
? Click on View tab;
? Check the “Hidden Items” box
3: End Backdoor.Generic18.UIY associated files
%commondesktopdir%Backdoor.Generic18.UIY.lnk
%windows%System32drivers[**Random**].sys
C:WindowsSystem32drivers[Random].sys
%program files%Backdoor.Generic18.UIY .lnk
%ProgramFiles%Protected SearchTaskSchedulerCreator.exe
%System%driversUAC[RANDOM CHARACTERS].sys
%Documents and Settings%[UserName]Application Data Backdoor.Generic18.UIY
4: Stop Backdoor.Generic18.UIY related processes in the Windows Task Manager
Backdoor.Generic18.UIY .exe
On Windows XP
Press Ctrl+Alt+Del keys together to open Windows Task Manager ;
Under the Processes tab, right-click on the processes related with the virus and click End Process
Windows Task Manager on XP
On Windows 7 / Windows Vista
Right-click on Task Bar and click click Task Manager;
Under the Processes tab, right-click on the processes related with the virus and click End Process
Windows Task Manager on windows 7 and vista
end process on windows 7 and vista
On Windows 8 / 8.1
Right-click on Task Bar and click click Task Manager;
Under the Processes tab, right-click on the processes related with the virus and click End Process
Windows Task Manager on windows 8
5.Open the Registry Editor
Method 1
(Available on Windows XP, Windows 7 /Vista, and Windows 8 /8.1):
Call out “Run” box by pressing “Windows” key + “R” key on your keyboard;
Type “Regedit” into the Run box and click OK to open Registry Editor
Method 2
(Available on Windows 7/ Vista):
Click on Start button to open Start Menu
Type “Regedit” into the search box and click on Regedit to open Registry Editor
6: Delete Registry Entries created by Backdoor.Generic18.UIY
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesActiveDesktop “NoChangingWallPaper” = ’1
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesAttachments “SaveZoneInformation” = ’1
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem “DisableTaskMgr” = ’1
HKEY_LOCAL_MACHINEsoftwareclassesurlsearchhook.toolbarurlsearchhook
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerToolbar
HKEY_LOCAL_MACHINESOFTWAREMozillaFirefoxextensions,
HKEY_CURRENT_USERsoftwaremicrosoftinternet explorertoolbarwebbrowser
HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain “Use FormSuggest” = ‘yes’
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerAdvanced “ShowSuperHidden” = 0
Note: Of course, it's highly recommended that you should remove trojan horse in a professional way if there are still some similar problems with your computer.
Conclusion
Backdoor.Generic18.UIY is a big trouble to computer. As mentioned
above, Trojans are often good at pretending to be harmless files but they may
carry out a number of malicious tasks on the infected PCs. The troubles brought
by this Trojan often appear while using the infected computer, problems as poor
system performance, non-response error will jump out suddenly within minutes.
Once it settles down, this Trojan horse will start its payloads. The Trojan
horse will change system settings and you will be interrupted by lots of
constant pop ups. The tricky Trojan hides behind system rootkit, this is the
reason why it is hard to be removed. Manual way should be the most effective way
to remove nasty virus. Moreover, it's clever for you to set up a professional malware removal tool to detect and remove all the feasilbe infections.
没有评论:
发表评论