This page aims to help you remove Latentbot. These Latentbot malware removal instructions work for every version of Windows.
When people here about a Trojan Horse two associations usually pop in their mind – the Trojan Horse from Greek mythology and also a computer virus. Well, Latentbot and other Trojans in general really resemble the Trojan Horse from mythology and that’s why are named so, but Trojans are not viruses. Rather Trojans work with/for viruses by helping them get installed on any PC that is already infected with a Trojan.
When this malware first makes it into your computer it lies dormant, ready to become activated remotely by the personal responsible for its creation. Once that happens it will execute any command that was sent to it – and most of the time this involves installing some virus or other malicious application on your computer without your knowledge or permission. Latentbot is usually targeting some sort of security vulnerability on your computer – most commonly that is Adobe Flash, but it could be any flaw of your Internet browsers as well. Internet Explorer seemed to have the most holes, but these days most of them are already patched and it seems to perform no worse then its main competitors – Chrome and Firefox. Uninstalling Latentbot as soon as possible should be your biggest priority – every moment it remains on your computer increases the chances that you’ll be infected with something else – and probably dangerous.
|Danger Level||High. This is the type of malware that often opens the way for Ransomware threats.
|Symptoms||Unexpected appearance of unauthorized software on your drive.
|Distribution Method||Infected .exe files, program bundles, e-mail attachments.
Latentbot Malware – methods of spreading around the web
Trojans are more subtle then their dangerous big brothers – the viruses. In order to exploit the vulnerabilities of your computer they need to get installed first – and this usually means tricking you into installing them, usually attached to some other software. Latentbot malware will exclusively only install from infected executable files and an executable file is basically any file that ends with .exe.
There is a multitude of ways by which such in infected executable may have come in contact with you, We’ll try to list the most popular below, but keep in mind that this list is not exhaustive. As a rule of the thumb never trust executables obtained from free hosting locations, especially torrents and warez sites. Not everything is infected in such sites, but the quality control is low and one file may infect thousands of computers before it is found and deleted. If ever.
- Email attachments – spam emails are becoming increasingly more sophisticated – some look downright legitimate and could even appear to be sent by friends of colleagues. Watch out for that file extension though – a file should end with .exe only if it is a program or an installer for one. Invoice.exe is definitely not a work-related file, but a virus or a Trojan made to look like one.
- Program bundles – free programs or programs obtained from unofficial mirrors, torrent or online storage sites are often carriers for different Adware, viruses or Trojans. If you try to install such a program it will also unload whatever else is attached to it, varying between harmless, but annoying programs and threats like this malware. There is one thing you can do to minimize this risk – always use the Advanced installation option on any installer. This will give you detailed knowledge of what is getting installed and you should block access to any added programs.
- Advertisements attached to certain sites can be dangerous. Ads displayed on popular sites are usually under strict control, as are Ads displayed by Google. The same is not often true for Ads on random sites around the web, especially if they offer free products or trial versions. If you see something interesting in an Ad try to search it yourself on Google and download it from the official site. This way you eliminate the chance of any viruses hiding in the installation .exe.
Latentbot Malware Removal
Reboot in Safe Mode (use this guide if you don’t know how to do it).
This is just the first preparation.
The first mandatory thing is to allow you to see Hidden Files and Folders. Each version of Windows does this slightly differently.
- I repeat – it’s extremely important you do this. Latentbot may have hidden some of its files and you need to see them to delete them.
Hold the Start Key and R together. Write appwiz.cpl in the field, then click OK.
You are now in the Control Panel. Search around for Latentbot and suspicious-looking programs. Uninstall it/them. Also, be extremely careful. Viruses often spend one last ditch effort to trick you into installing more of their kind. If you see a screen like this when you click Uninstall, choose NO:
Hold the Start Key and R again – but this time copy + paste the following and click OK:
A .txt file will open – don’t type or change it. If you are hacked and someone has access to your PC, there will be a bunch of other IPs connected to you at the bottom. This is what a hosts file looks like:
If there are a bunch of strange IPs connecting to you below “Localhost” you may be hacked, and it’s best to ask us in the comments for directions.
Open the Task Manager by right clicking on the Taskbar and choosing Start Task Manager.
Once it opens, choose the Processes Tab. Look at all of the processes in front of you and try to determine which ones are a virus. Google them or ask us in the comments and we will provide the best assistance we can.
A WARNING! PLEASE READ THESE INSTRUCTIONS!
What is left is to terminate any leftover processes associated with Latentbot and delete any files. Please be careful. If you make a mistake and delete the wrong stuff you can damage your OS installation or other programs.. If you are not feeling comfortable with such a possibility you always have the option install the anti-malware tool we recommend. This might be a good idea to do even if you manage to remove Latentbot malware on your own – use the scanner to make sure no viruses were installed by the virus while it was on your PC.
Right click on each of the virus processes separately and select Open File Location. Also, End the process after you open the folder. Just to make sure we don’t delete any programs you mistakenly took for a virus, copy the folders somewhere, then delete the directories you were sent to.
Take a look at the following things:
Type msconfig in the search field and hit enter: you will be transported to a Pop Up window.
Go in the Startup tab and Uncheck entries that have “Unknown” as Manufacturer.
Type Regedit in the windows search field and press Enter.
Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If you can’t find them this way, look in these directories, and delete/uninstall the registries manually:
- HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious, but bear in mind they are always different.
HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random
If these things fail to help you find Latentbot you need to resort to a professional scanner – obviously this is a malware that was created to steal your credentials and credit cards – meaning the people who created it spent a lot of resources to make it as dangerous as possible.
Remember to leave us a comment if you run into any trouble!
Did we help you? Please, consider helping us by spreading the word!