My computer was infected by Trojan Horse Generic36.FGM yesterday. AVG detected it but couldn’t completely get rid of it. I tried other tools to deal with this threat, but had no luck to remove it. Every time I am told that this threat has been deleted, but after restarting my computer it comes back. I have felt tired of removing this stubborn Trojan horse since every way seems not to work. Why Trojan Horse Generic36.FGM is so stubborn? And how can I deal with it? Can anyone help me?
Trojan Horse Generic36.FGM, as its name implies, is a Trojan horse. It usually gets into a targeted computer system by attaching to freeware or shareware which is downloaded from unsafe sources. It should be noted that many Trojan horses are imbedded into the installation folders of free software, and usually they have a file name which looks legitimate, such as JPG.EXE and TXT.EXE, so that they can mislead users into running the malicious files. The purpose of using the fake file name and suffix is to confuse Windows system in order to hide the intrusion and existence of Trojan horses. This is the best way for cyber hackers to intrude users’ computers and mislead them into activating the malicious codes. Antivirus programs can remove Trojan horses, because they have the ability to sense malicious codes. So, to prevent from antivirus detection, cyber hackers tend to insert the malicious codes into some software in case that the codes are deleted by antivirus. In such way, the Trojan horses can deceive antivirus programs and avoid being detected and removed easily. As a Trojan horse, Trojan Horse Generic36.FGM also possesses the ability to bypass antivirus programs. And that is why it can be detected but may not be removed from your computer.
Trojan Horse Generic36.FGM, as its name implies, is a Trojan horse. It usually gets into a targeted computer system by attaching to freeware or shareware which is downloaded from unsafe sources. It should be noted that many Trojan horses are imbedded into the installation folders of free software, and usually they have a file name which looks legitimate, such as JPG.EXE and TXT.EXE, so that they can mislead users into running the malicious files. The purpose of using the fake file name and suffix is to confuse Windows system in order to hide the intrusion and existence of Trojan horses. This is the best way for cyber hackers to intrude users’ computers and mislead them into activating the malicious codes. Antivirus programs can remove Trojan horses, because they have the ability to sense malicious codes. So, to prevent from antivirus detection, cyber hackers tend to insert the malicious codes into some software in case that the codes are deleted by antivirus. In such way, the Trojan horses can deceive antivirus programs and avoid being detected and removed easily. As a Trojan horse, Trojan Horse Generic36.FGM also possesses the ability to bypass antivirus programs. And that is why it can be detected but may not be removed from your computer.
Similar to other types of Trojan horse, apart from destroying crucial system files and controlling the system, Trojan Horse Generic36.FGM will also keep the PC under surveillance and tries to record users’ personal or confidential information and data, such as online bank account information, credit card account data, online behavior and internet search activities. In the old days, Trojan horses were just written and spread to play tricks on users or pry into their privacy. But nowadays, they are used to record user’s commercial information and then utilize it to obtain more illegal gains. With the purpose of stealing users’ information, Trojan horses combine with the ability to break network and get the access to the deep of the system. The advanced techniques allow the Trojan horse get through computer system without barrier whether in external or internal network.
Dangers of the Trojan Horse
It allows the cyber hackers to gain access to your infected computer secretly.
It can stop some programs from working and cause system crash.
It downloads other threats such as browser hijackers, adware and spyware to your PC.
It can record your browsing histories and collect the confidential information.
It slows down your computer performance and network speed.
It can stop some programs from working and cause system crash.
It downloads other threats such as browser hijackers, adware and spyware to your PC.
It can record your browsing histories and collect the confidential information.
It slows down your computer performance and network speed.
Ways to Remove Trojan Horse Generic36.FGM
Most of time, Trojan horses can be removed from your computer, if you use your antivirus software to run a system full scan. But in some cases, users find it hard to remove them using their antivirus programs. In this situation, users can try manually removing it or using a more advanced removal tool to deal with this threat. First, you can follow the steps below to manually remove the Trojan horse.
1. Reboot the computer into the Safe Mode.
(1) Reboot the computer and tap the key F8 constantly during the start-up process.
(2) When the Advanced Boot Options comes up, please use the arrow keys to highlight “Safe Mode with Networking” and press Enter.
2. Stop process of Trojan Horse Generic36.FGM.
(2) When the Advanced Boot Options comes up, please use the arrow keys to highlight “Safe Mode with Networking” and press Enter.
2. Stop process of Trojan Horse Generic36.FGM.
(1) Open the Task Manager by pressing Windows key + R key, type “taskmgr” and pressing Enter.
(2) Click “Processes”, find out and stop the process of Trojan horse using the “End Process” button.
3. Show hidden files.
(2) Click “Processes”, find out and stop the process of Trojan horse using the “End Process” button.
3. Show hidden files.
(1) Click on the Start Orb and then choose Control Panel.
(2) Click on “Appearance and Personalization”.
(2) Click on “Appearance and Personalization”.
(3) Click on “Folder Options”.
(4) Click on the “View” tab in the Folder Options window.
(5) Tick “Show hidden files, folders, and drives”, non-tick “Hide protected operating system files (Recommended)” and click OK.
(4) Click on the “View” tab in the Folder Options window.
(5) Tick “Show hidden files, folders, and drives”, non-tick “Hide protected operating system files (Recommended)” and click OK.
4. Delete files related to Trojan Horse Generic36.FGM.
%AllUsersProfile%\Application Data\[random].exe
%AppData%\[random].exe
%Temp%\[random].exe
%UserProfile%\Desktop\[Trojan horse name].lnk
%AppData%\[random].exe
%Temp%\[random].exe
%UserProfile%\Desktop\[Trojan horse name].lnk
5. Delete the Trojan horse related registry entries.
(2) While the Registry Editor is opened, search for and delete the following registry entries.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “random”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “CertificateRevocation” = “random”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer “NoDesktop” = ‘ 1′
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = ’1′
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “random”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “CertificateRevocation” = “random”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer “NoDesktop” = ‘ 1′
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = ’1′
Still fail to get rid of Trojan Horse Generic36.FGM after accomplishing the steps above? Actually, there are a few malware removal tools that are able to remove the stubborn Trojan horse out of your computer easily and completely. Manual removal is an effective way to remove the threat, but it really requires certain level of computer expertise. So, to eliminate the Trojan horse safely and effectively, it is highly recommended to download and use an advanced removal tool.
Conclusion
Trojan Horse Generic36.FGM is a highly dangerous Trojan horse. As we have mentioned above, Trojan horses are often seems to be harmless, but will perform some unexpected malicious actions. Once this Trojan horse finishes its infection process, it will start its payloads according to the command sent by the remote hackers. It will change system settings, randomly delete system files, disable important programs and services, and even download other malware onto your computer. Your computer will become slower and slower, and is flooded by lots of annoying pop-up ads. However, it may be hard for a common antivirus program to remove Trojan Horse Generic36.FGM, since it is designed with the rootkit technique and can hide deep inside your infected system. Using a powerful automatic removal tool will be the wise choice to get rid of the vicious Trojan virus.
No comments:
Post a Comment