Jan 19, 2016

Trojan Horse Generic36.BZED Virus Removal Help

Hey all, I’ve recently come across a problem in the past day where I get a constant notification saying that my system has been infected with Trojan Horse Generic36.BZED virus. The pop up keeps popping up every 5 mins even if I have removed it to virus vault. I am sure it must be still lurking in the background somewhere. Is there any other way I can delete it completely?

Infected With Trojan Horse Generic36.BZED Virus – How to Remove?

Trojan Horse Generic36.BZED is defined as malicious Trojan virus that allows hackers to remotely access you computer system, letting them modify files, steal personal information and install more unwanted software. Distribution of this Trojan occurs in a variety of ways. From email attachments and links to instant messages, drive-by downloads and being dropped by other malicious software. Once installed on the compromised computer, the Trojan begins to perform the predetermined actions that it was designed for. It can disable your firewall security and even make your antivirus program like AVG or Norton unable to use. And then the virus starts creating tons of junk files and even modifies your system settings in order to stay on your system as longer as it can. With the help of this Trojan, hackers can install other type of threats such as rogue programs, ransomware and adware to your PC without any approval in order to promote potentially unwanted programs and earn more and more profit.

The purpose of Trojan Horse Generic36.BZED virus is evil because it can bring you serious computer damages and even data loss. This virus launches automatically at startup and runs as a background program, taking up high CPU usage and other resources. Thus your PC performance will be poor and it takes forever for you to start up your PC and load up any programs or complete any tasks. Besides, you may get many unwanted problems and even black screen or blue screen of death without any warning. In some cases, it can change browser settings and host file, in order to redirect users’ search results to certain websites that will promote some products which look cheap and attractive but not reliable and worth buying in fact, thus to boost traffic and make great profits. Your online activities will be interrupted frequently because of a large number of pop-up ads that come from nowhere. To prevent unnecessary damage and loss, it is better for you to get rid of Trojan Horse Generic36.BZED virus immediately.

The following instructions require certain levels of computer skills. If you’re not sure how to delete this nasty Trojan, please live chat with YooCare experts now.

Dangerous Actions Performed by This Virus:

1. It can compromise your system and may introduce additional infections like rogue software.
2. It forces you to visit websites and advertisements which are not trusted and may lead you to pay money wrongly for worthless products.
3. It takes up high resources and strikingly slows down your computer speed and even causes your computer stuck frequently.
4. It may allow cyber criminals to track your computer and steal your personal information.

How Does This Virus Get On Your Computer?

From malicious drive-by-download scripts from corrupted porn and shareware / freeware websites.
Through spam email attachments, media downloads and social networks.
When clicking suspicious pop-ups or malicious links.
Open unknown email or download media files that contain the activation code of the virus.

About Trojan Virus Removal:

Currently many computer users had the same experience that this virus couldn’t be removed by any anti-virus applications. So the manual approach is always required to combat this virus. And here is the step-by-step removal guide for all computer users.

1. End the malicious process from Task Manager.

Once Trojan Horse Generic36.BZED virus is installed, computer user may notice that CPU usage randomly jumps to 100 percent. At any time Windows always has many running processes. A process is an individual task that the computer runs. In general, the more processes, the more work the computer has to do and the slower it will run. If your system’s CPU spike is constant and remain at a constant 90-95%, users should check from Task Manager and see if there is a suspicious process occupying system resources and then end it immediately.

(The name of the virus process can be random.)

Press Ctrl+Shift+Esc to quickly bring up Task Manager Window:

task manager

2. Show hidden files and folders.

Open Folder Options by clicking the Start button, clicking Control Panel, clicking Appearance and Personalization, and then clicking Folder Options.

Click the View tab.

Under Advanced settings, click Show hidden files and folders, uncheck Hide protected operating system files (Recommended) and then click OK.

Folder Options

3. Open Registry entries. Find out the malicious files and entries and then delete all.

Attention: Always be sure to back up your PC before making any changes.

a. Press Windows key + R to open Run box. In the “Open” field, type “regedit” and click the “OK” button.


Then a Registry Editor window will pop up as the following picture shows:

registry editor

b. Search malicious files and registry entries and then remove all of them:

%AllUsersProfile%\Application Data\.exe

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\[random]
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Temp

Video Shows You How to Safely Modify Windows Registry Editor:

Trojan Horse Generic36.BZED virus is commonly Trojan horse that targets computers users worldwide and penetrates into your system quietly in order to generate all sorts system issues to annoy PC users. It can perform a series of malicious activities as soon as it is downloaded. It will firstly turn off the firewall and disable the security tools to ensure its long presence on your computer. And then it will drop several malicious files and creates a couple of folders on every corner of your computer to occupy your system resource and slow down your PC performance. Moreover, it has the ability to create a backdoor and connect to a remote server without your knowledge which helps a remote attacker to gain control on the compromised computer to install malware to further ruin the computer. The virus is usually installed through spam email, peer-to-peer network connections, instant messaging programs or social networking sites. Once detect, you should get rid of it manually without any delay.

Note: If you are not knowledgeable enough to be able to distinguish the location of this virus, or you are afraid of making mistake during the manual removal, please contact experts from Yoocare Online Tech Support for further help.

Published by & last updated on January 19, 2016 7:03 am

Leave a Reply

Your email address will not be published. Required fields are marked *

Problems with your PC, Mac or mobile device?

Live Chat Now

Thanks for using YooCare Services!

Here're some of the support team members who are passionate about their works and support our customers 24/7.

As Seen On