My computer was infected by a Trojan called FakeAlert-KS.gen.ea
yesterday. It’s hard to be deleted although my AVG found it. I have also tried
using other removal tools to remove it, but none of them are helpful. Then I
kept no luck when using antivirus to sweep it away. This threat keeps staying on
my computer. Who can help me remove FakeAlert-KS.gen.ea completely from my PC
for good? How can I remove this Trojan horse completely without having any
troubles.
Friendly Reminder: Please try a professional trojan horse removal tool
to remove this trojan horse once you can't remove it through the manual removal
guide below.
FakeAlert-KS.gen.ea Description
Just as its name implies, FakeAlert-KS.gen.ea is
classified as a Trojan horse. Such vicious Trojan horse mainly distributed
through some freeware from the third party. It should be noted that many Trojan
horses are imbedded into the installation folders of free software, and usually
they have a file name which looks legitimate, such as JPG.EXE and TXT.EXE, so
that they can mislead users into running the malicious files. In most cases, the
Trojan horse will name its files similar to the system file names. It will
secretly change your desktop image and add strange icons and shortcuts on your
screen. Generally, a Trojan horse cannot be seen with the naked eye. The hacker
has to seduce you to run the Trojan program when trying to control the computer.
The hacker will make use of various vulnerabilities he can find to implant the
malicious Trojan horse into the targeted computer successfully. In general, they
run a entire scan with the antivirus program. Therefore, the hacker often embeds
legal codes into the Trojan process with the purpose of avoiding detection and
removal of antivirus software, for antivirus detection is based on the feature
code in Trojan virus.
Different from other computer Trojan horses, instead of concentrating on
destroying computer data, this Trojan horse is playing the role of spying on
your operation on the infected computer and trying to steal the data such as
passwords, account Numbers game, online stock accounts and online bank accounts,
etc. It is able to connect to the remote hackers and help them take full control
of your affected computer. However, now Trojan horse aims at stealing the
valuable information from the infected machine in order to make illegal profits.
There would be no absolute limit between Internet and reality since the
sensitive information stored on computer will make a great difference in real
life. Worse still, it can steal your credit card numbers, bank accounts, logon
names, passwords, identity information and other valuable information by using
keyloggers for illegal purposes.
Note: the manual removal requires users to have sufficient computer
knowledge and skills. If you are not a PC experts, please use a professional
removal tool to help you remove this Trojan horse infection.
How dangerous is the Trojan horse?
1. It allows cyber criminal invade your computer without any warning.
2.It runs many processes in the background to make your PC sluggish. 3. It adds
other cyber threats such as browser hijackers, adware and spyware to your PC. 4.
It can monitor your online activities, record your browsing cookies and steal
your confidential information.
Manually Remove FakeAlert-KS.gen.ea - Remove Trojan Horse Virus Step by Step
FakeAlert-KS.gen.ea is a malicious Trojan horse which can be installed
to the infected computer without PC users’ permission. It not only lets your
computer become slower but also invades other vicious contamination into the
computer. What’s more, this Trojan horse collects personal information without
your knowledge. Hence, it is highly recommended to remove this nasty thing as
early as possible. The following instructions will tell you how to clear it
quickly.
1. Know Your Enemy Any great war general will tell you to know your enemy, get inside their head, think like they do, act like they do, and become their best friend, as this will prepare you to overcome your enemy. So engage with the virus: keep an eye out for any security messages that pop up, as these usually provide the exact name of the virus that has infected your computer. If it gives you a security message that says "For More Info Click Here," or something else to click on, and it is not asking you to enter personal financial information or install anything, you may want to go ahead and click on it. Be prepared to write down any product name it gives you, or any file name and directory path (example: C:\Users\YourUserName\AppData\LocalLow\Temp\Virus). Remember, NEVER give out your personal financial information in these dialogues with malware.
Now if you were lucky enough to catch a security message and get the name of the virus itself, then you can continue on to Threat Expert and get all the information you can on that malicious software.
If you were only able to get a product name, then you need to do a search on it. Most likely, you’ll find out that the product is "fakeware" (malicious software that calls itself an anti-virus program).
In your search, it's a good idea to pursue results that link you to a forum, as you may find the information you need in discussions there, for example the name of the virus infecting your computer.
Once you have the name of the virus and the report from Threat Expert you can begin the hunt. It won't be a long hunt if you were able to get the directory from the "security" message, because that is where that little malicious bugger is hiding.
2. Block the Virus from the Startup List
You can’t kill the virus unless you put it to sleep first. So to put the virus to sleep we will end all the processes created by the virus.
A first step is to block the malicious program from starting itself up along with your usual programs every time your computer starts up. You can use System Configuration ("msconfig") to do this. One way to do this is to click the “Start” button on your desktop, type "System Configuration" into the "Search" field, and select “Start System Configuration” from the results. Or find it by clicking "Start," then "Control Panel," then "System and Security," and then "Administrative Tools," and then double-clicking "System Configuration.?"
System Configuration is great for helping with virus removal, allowing you to keep the virus turned off when you start up again.
System Configuration is great for helping with virus removal, allowing you to keep the virus turned off when you start up again.
Source: How to Computer
System Configuration opens the "General" tab, where you will need to select the circle next to "Selective Startup." Next, move to the “Startup” tab and go through the list there: select all the programs that have an unknown manufacturer and disable them, because programs with unknown manufacturers are almost always malware. Restart your computer to close any currently-running versions of the malware.
Source: How to Computer
3. Start Task Manager and End Virus-Related Processes
When your computer restarts you will open your Task Manager immediately, which can be done quickest by pressing the "Ctrl," "Alt," and "Delete" keys all at the same time and then selecting "Start Task Manager" from the options that appear. Select the “Processes” tab and then compare the processes listed as running on your computer to the list of virus-created processes you got from the Threat Expert report or other research. Any processes running on your computer that match the ones on the report need to be ended, until all virus-created processes are gone.
Source: How to Computer
4. Seek and Destroy That Malicious Software: Delete Its Files
Now we will go to the directory where the virus is and delete the virus. Tip: viruses like to hide themselves inside your “Temp” folder. If you got the directory path from the security message the virus gave you, then all you need to do is open up your computer's Explorer window and follow the path. For example, if you were looking for "C:\Users\YourUserName\AppData\LocalLow\Temp\Virus…" you would click on the "C" icon in Explorer, for the computer's hard drive, then click the “Users” folder, then click the “YourUserName” folder, and so on, until you get to the virus. Now delete any file names that match those on the virus report.
5. Seek and Destroy Some More: Remove Registry Keys
Finally, we will go into the Registry and remove the registry keys the virus put in. To go into the Registry, click the “Start” button on your desktop, click “Run,” type "regedit," and click "OK." Or type "regedit" in the search bar on your Start Menu, and select the Regedit program from your search results. You can find the exact name and directory path of the registry keys created by the virus from the Threat Expert virus report. Delete the registry keys that the virus created--do be careful to delete the exact keys you have in mind, no others--and you should be virus-free.
Note: Of course, it's highly recommended that you should remove trojan horse in a professional way if there are still some similar problems with your computer.
Conclusion
FakeAlert-KS.gen.ea is a highly risky Trojan horse created to attack
users’ computers worldwide. As mentioned above, Trojans often bring in some
awful and compulsive operation, especially the dangerous infection although they
looks safe. Manual?removal?is?as?risky?as?it?sounds, especially for a regular PC
user. This Trojan horse can cause various problems after finishing its
installation. The settings of your computer will be altered forcibly by the
Trojan horse and you will receive floods of pop-ups while surfing the Internet.
The backdoor process will make this Trojan horse hard to be removed. The best
choice to remove impure threat should be in the manual method. What's more, it's
wise for you to install one professional malware removal tool to prevent any
threats from attacking your computer.