Sunday, May 18, 2014

Get Rid of TROJ_ARTIEF.ZTBD-R – How to Remove TROJ_ARTIEF.ZTBD-R?

Your computer has been attacked by TROJ_ARTIEF.ZTBD-R? Can not remove it by using your antivirus program? How can you completely remove this threat from your PC? Read this post and you will find out effective solutions to delete TROJ_ARTIEF.ZTBD-R.

Description of TROJ_ARTIEF.ZTBD-R:

TROJ_ARTIEF.ZTBD-R is a hazardous computer virus which belongs to the Trojan horse family. It will damage the target operating system so as to carry out many malicious activities. Its real purpose is to steal your sensitive information to gain illegal profits. In addition, you will suffer from slow PC performance, system errors, poor network connection and many other problems due to this nasty virus. It is a very stubborn virus so your antivirus program may be able to block it temporarily but can not completely delete it. It will show up again when you restart the infected machine.
TROJ_ARTIEF.ZTBD-R
Generally speaking, TROJ_ARTIEF.ZTBD-R is usually distributed through free downloads, spam email attachments, p2p file sharing, suspicious sites and malicious links. Once it is installed on your computer, the default system settings of your PC will be completely modified by this virus without your approval. Besides, your anti-virus programs and firewall will also be disabled. Thus, your computer will become very vulnerable to be attacked by other computer threats such as spyware, rookits, worms and so on. This tricky virus will insert its malicious codes to the windows registry so that it can stick to the PC system and avoid being remove by your antivirus program. It will also add itself to the startup section so that it can be activated the moment your start your infected PC. It will create many hidden files which will take up lots of hard disk space. This Trojan virus will consume a large amount of the computer resources which will make the PC run extremely slow. Wha’t more, cyber criminals will be able to remotely control your infected with the help of this dangerous virus. As a result, your online activities will be monitored and the confidential data stored in your PC will be at a high risk of being stolen. It is strongly suggested to remove TROJ_ARTIEF.ZTBD-R as soon as you protect your computer and privacy.

How to Remove TROJ_ARTIEF.ZTBD-R?

Manual method:
Step 1: Reboot your computer in safe mode with networking.
Windows 7/vista/XP:
Restart your infected computer and then press F8 key constantly before windows launches. Use your arrow keys to select “safe mode with networking” and then press Enter. Click yes when you see the dialog ” Windows in running in safe mode”.
safe-modewithnetworking
Windows 8:
press the Power button at the Windows login screen or in the Settings charm. Then, press and hold the SHIFT key on your keyboard and click Restart.
win8restart
Click on Troubleshoot and choose Advanced Options. Then click on Startup Settings and select Restart. Your PC will restart and display nine startup settings. Now you can select Enable Safe Mode with Networking.
Win8startup-settings
Step 2: End the processes related to the Trojan horse in Windows Task Manager.
Windows 7/vista/XP:
Press Ctrl+Alt+Delete keys together to open Task Manager. Click “Processes” tab to find out and end the processes related to the Trojan horse.
windows-task-manager1
Windows 8:
Right-click the taskbar and select “Task Manager”. Click “More details” button when you see the Task Manager box.
Win-8-Task-Manager
Hit “Details” tab to find out and end the processes of the Trojan.
Details-Tab-in-Win-8-Task-Manager
Step 3: Show hidden files and folders.
Windows7/vista/XP:
Click the Start button and go to Control Panel. Click on Appearance and Personalization to select Folder Options. Click the View tab, select “Show hidden files and folders”, deselect “Hide protected operating system files (Recommended)” and then click “Apply”.
Folder Options1
Windows 8:
Open Windows Explorer from the Start screen and click View tab. Tick “File name extensions” and “Hidden items” options and then press OK to show all hidden items.
win8-show-hidden-file
Step 4: Find out and delete associated files of the Trojan horse listed below:
%Program Files%\TROJ_ARTIEF.ZTBD-R\TROJ_ARTIEF.ZTBD-R.exe
%UserProfile%\Desktop\TROJ_ARTIEF.ZTBD-R.lnk
%UserProfile%\Start Menu\TROJ_ARTIEF.ZTBD-R\TROJ_ARTIEF.ZTBD-R.lnk
%UserProfile%\Start Menu\TROJ_ARTIEF.ZTBD-R\Help.lnk
%UserProfile%\Start Menu\TROJ_ARTIEF.ZTBD-R\Registration.lnk
%UserProfile%\Application Data\Microsoft\Internet Explorer\Quick Launch\TROJ_ARTIEF.ZTBD-R.lnk
Step 5: Press Windows Key+R, go to run, then type “regedit” in the box to open Registry Editor, after that, find out and remove the registry entries of the Trojan horse listed below.
Run-box
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\TROJ_ARTIEF.ZTBD-R\DisplayIcon %AppData%\[RANDOM CHARACTERS]\[RANDOM CHARACTERS].exe,0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\TROJ_ARTIEF.ZTBD-R
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\TROJ_ARTIEF.ZTBD-R\UninstallString “%AppData%[RANDOM CHARACTERS][RANDOM CHARACTERS].exe” -u
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\[RANDOM CHARACTERS] %AppData%\[RANDOM CHARACTERS]\[RANDOM CHARACTERS].exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\TROJ_ARTIEF.ZTBD-R\ShortcutPath “%AppData%\[RANDOM CHARACTERS]\[RANDOM CHARACTERS].exe” -u
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\TROJ_ARTIEF.ZTBD-R\DisplayName TROJ_ARTIEF.ZTBD-R
Automatic Method:
It may be quite difficult for you to find out and delete all the the malicious files since some of them will hide deeply in your PC system. In order to delete TROJ_ARTIEF.ZTBD-R completely and effectively, you can use a professional tool to perform the removal task. Here I recommend SpyHunter to you. It is a powerful removal tool which can scan your entire computer system quickly and delete all the malicious files and registry keys created by the Trojan virus. Besides, it can also protect your computer from other computer threats.

No comments:

Post a Comment