Saturday, January 26, 2013

Trojan horse BackDoor.Generic15.WEE Is Detected, How to Completely Remove It?

Trojan horse BackDoor.Generic15.WEE is a dangerous backdoor threat that would severely damage system and endanger confidential file.

Once Trojan horse BackDoor.Generic15.WEE gets access to your computer, it will settle down by making changes to your registries and creating random files with secret locations. And then security backdoor will be opened for remote hackers to get connected to your PC, unloading malware and malicious files, stealing pass words and other login details and hacking your email address or other accounts without your consent.

What is more, Trojan horse BackDoor.Generic15.WEE tends to come packed with other parasites to strengthen its destructions. Therefore, you may encounter many unexpected performance troubles. For instance, browsers affected would lead you to random sites but not the pages that you have addresses for.

To completely get rid of Trojan horse BackDoor.Generic15.WEE and any other threats brought, please find the following manual removal guide for your reference. Any difficulties, please contact Online Tech Support Agents to get professional help.  
Manually Remove Trojan horse BackDoor.Generic15.WEE for Good

1) Backup Reminder: Always be sure to back up your PC before making any changes.

2) Log in safe mode with networking or command prompt.

3) Stop the associated processes:


3) Delete the associated files: 

%AllUsersProfiles%\Application Data\~%random%r
%AllUsersProfiles%\Application Data\%random%.exe
%AllUsersProfiles%\Application Data\%random%
%AllUsersProfiles%\Application Data\~%random%

5) Get rid of the related registry entries:

 HKCU\Software\Classes\.exe\shell\open\command\ %commonappdata%\pcdfdata\[rnd].exe /ex %1 %*
 HKCU\Software\Classes\.exe\shell\open\command\IsolatedCommand %1 %*
 HKCU\Software\Classes\.exe\shell\runas\command\ %1 %*
 HKCU\Software\Classes\.exe\shell\runas\command\IsolatedCommand %1 %*

Attention: Please note that the manual removal is effective but yet risky process. To avoid any unnecessary to damage your computer, you are recommended to get help from computer experts.

No comments:

Post a Comment