If you are looking for software to use, go to Huajun Software Park! software release
Location: front pageTutorial strategyTutorialOther tutorials How to completely clean...

How to completely remove rogue software from your computer?

Author: Itachi Uchiha Date: 2017-05-22

There is actually only one key to getting rid of them, which is to clear all their information from the registry. And as long as you persist in deleting three things repeatedly, you can kill them all. The three things are:

1. Delete from the registry in normal mode;

2. Delete from the registry in safe mode;

3. Delete the files corresponding to the rogue software;

Why do you need three things? Why do you need to delete it repeatedly? That’s because rogue software has many protection measures. The protection measures will prevent you from deleting files or certain registry entries, and sometimes the protection measures are not rigorous. When you do it repeatedly When these three things can be done, their mutual protection will gradually disintegrate.

Let’s take 2345 as an example:

1. Delete all information of 2345 in the registry in normal mode.

1. Press the win+R keys and enter: regedit in the input box

How to completely remove rogue software from your computer?

2. Click OK, and the Registry Editor will open. Many subsequent operations will be completed in this.

How to completely remove rogue software from your computer?

3. Then press CTRL+F to bring up the search dialog box:

How to completely remove rogue software from your computer?

4'. Enter: 2345Soft in "Search Target", and check "Full Word Match" below. In fact, the subsequent operation will not be enough to select "Whole Word Match" (Whole Word Match means: If you search for "Dabai", all words will be searched. Word matching means that only the word "大白" will be searched, "大白Rabbit" " will not be found in the search. If there is not enough selection, "White Rabbit" will be searched.) The purpose of full-word matching is to delete some trunks first (and if the whole-word matching is not started, a lot may be found), and all the ones found will be deleted. , if prompted to refuse deletion, just skip it first and delete everything that can be deleted.

2. Go to safe mode and delete all information 2345 in the registry.

The process of this step is similar to the previous step, except that this step is performed in safe mode, because the operating system in safe mode loads the least things, and the protection of the software itself is also weakened. But in fact, I found that one of the 2345 items is to enter the system service, Tencent Butler It will also run in safe mode, but regardless of it for now, operate in the same way as the previous one. In the registry editor, use "Whole Word Match" to search for "2345Soft" and delete them all.

3. Delete files corresponding to rogue software

The directory of 2345 is in the C drive, under the Program Files directory, there is 2345Soft. Of course, you can also delete it by searching for files. Similarly, delete what you can delete first. It may be that it cannot be deleted while it is currently running, or it cannot be deleted due to protection. , then you can delete as much as you want first, especially after cleaning the registry, restart the computer and then delete it. If you can't delete it at first but can delete it later, congratulations, it means that its protection is disintegrating step by step. Deleting files corresponding to rogue software can be done in both normal mode and safe mode. You can do it wherever you can, with the purpose of deleting it.

The above three steps can be done in a loop. In fact, the way to judge whether the file has been deleted is to see whether the file can be deleted. If the file can be deleted, it means that it is not running and has no protection. If the file deletion is rejected, it means that it is still running or has protection measures. , you can also press ctrl+alt+delete and then "Start Task Manager" to see if there is the word 2345 in the process.

If "Whole word match" is deleted to the point that it cannot be deleted, but the file still cannot be deleted, then uncheck "Whole word match" and continue to search and delete it in the registry. Repeat the above three steps, "Whole word match" and "Incomplete word match" Basically, after a few rounds, 2345 will be disintegrated, and when the 2345 file can be deleted and is no longer running, there will still be a lot of fragmentary things in the registry. At this time, you can use tools to assist. Cleaning, for example, there is a software called ccleaner (official website: http://www.piriform.com/ccleaner), a specialized registry cleaning software, so that 2345 will disappear without a trace.

The principle of the method is as follows. You need to understand it and master it flexibly. The search keywords are very important. For example, if you search for 2345Soft, you can also search for "2345Explorer", "HaoZip", "2345Pic", "www.2345.com"

, understand, everything related to it and crossing boundaries will be deleted. The same goes for deleting files. As long as they are suspected to be 2345 files (because they are also "regular" software, their file names have not been specially renamed and can be identified with the naked eye), especially system files, they must be deleted. 2345 has formed a system, and leaving one behind may attract all of them, so we must kill them all.

Next, it’s up to Tencent to manage:

Originally, the method of Tencent Butler is the same as above, but I still have to say it separately. Tencent Butler is more "rogue" than 2345. The rogue thing is that it also runs in safe mode and some registry keys cannot be deleted, so the previous 1, 2, 3 has more repetitions than 2345. 2345 can be killed in only 1-2 rounds, while Tencent Butler can kill it more than once.

Keywords deleted by Tencent Butler include: QQPCMgr, QQPCTray.exe, Tencent

The file directory is in the c drive, Program Files/Tencent directory.

The stubbornness of these rogue software is related to the degree of implantation. Some system versions only run pure green, which is easier to clean. For more stubborn ones, a combination of the above methods is required. However, in general, the registry is familiar with all kinds of monsters and rogue software, not to mention rogue software.

My idea of ​​​​installing the system is generally like this. First, make sure the system is clean and the drivers are installed. Then I will make a clone backup of myself. Then I will install the common software I will use, and then make a clone backup. The system is placed on the c drive, and the application is installed on the d drive. The d drive can also be cloned and backed up. Try not to put your own files on these two drives. If you need to reinstall the system in the future, you only need to restore the c drive and d drive. Nowadays, it only takes 2 minutes to restore the computer, or no more than five minutes at most.

The above is about how to completely clean up the rogue software in the computer. Some users think that it is better to uninstall it directly. This method of uninstalling these rogue software cannot completely clean up the rogue software. There will still be these rogue software in the registry and other information. Traces, so if you want to clean it thoroughly, it is best to follow the above method.

Related articles