2015年5月10日星期日

How to Immediately Remove TR/ATRAPS.Gen2 - Remove Trojan Horse from Your Computer?

Does your antivirus program keep displaying alerts on the screen for notifying you that TR/ATRAPS.Gen2 is attempting to infest your computer? It is a piece of malicious software which can severely corrupt the system and you have to remove it immediately. But the problem is your antivirus program failed to remove it. What should you do, then? Want to find an effective and quick removal? Actually, you can read through this post and learn how to get rid of this infection.

Friendly Reminder: Please try a professional trojan horse removal tool to remove this trojan horse once you can't remove it through the manual removal guide below.


Description of TR/ATRAPS.Gen2


TR/ATRAPS.Gen2 is a Trojan horse which is detected newly by some famous antivirus programs such as Avast, Avira and Norton. It can result in a complete system disruption for the purpose of obtaining illegal gains and sneak into the computer with the same objective. You will meet a series of problems if your system is infected. The Trojan virus is able to disguise itself as a part of Windows files and make it difficult for security tools to remove it. Furthermore, if you have never noticed the presence of TR/ATRAPS.Gen2 on the computer, you may mistakenly remove crucial system files which will lead to a complete system disruption. In many cases, if the Trojan stay long in your computer and can’t be removed in time, the performance of your computer will gradually and drastically delince.
Usually, this Trojan hides in some unsafe websites that have been hijacked by cyber criminals, and it has the ability to sneak into your computer through spam emails and malicious malware programs. Also, this virus can come from other infected program. If you want to avoid attack of this Trojan horse, you should try not to download and install any free software which comes from trustless sources on your computer. This Trojan horse is very harmful that it drops some malicious files to the local hard disks randomly, changes system settings and names of some system files, and injects its own registry entries to Windows registry. Thus, it can damage system files, hides itself and blocks some important programs (such as firewall and antivirus program) from running normally. Unexpected Blue Screen of Death error messages, abrupt system shutdown and undesirably automatic restart will completely mess up the system and result in crucial system file corruption. If you don’t take effective steps to remove it, more and more computer viruses will get into the target computer. Even worse, the Trojan virus is designed to easily take over the system. It can corrupt your documents and record users’ sensitive information on the computer. Gradually, users will find the infected computer become rather slow and instable. But it should be pointed out that, manually removing the Trojan horse is a cumbersome task which should be performed by users who acquire a good knowledge of computer.
The manual removal is not an easy task because it needs you to have rich virus removal experience and sufficient computer knowledge and skills. If you are a computer newbie, use a professional removal tool instead.

How does the Trojan virus harm your computer?


1. Drip a hole to drop cyber hacker into the computer to completely manage the PC. 2. It causes various system problems like blue screen of death and disables important programs. 3. When you use your search engine, you will be redirected to websites with malicious contents and disgusting pop ups on your screen. 4. It monitors users’ Internet activity and records specific keywords that the user enters into search fields on various web sites.

Manually Remove TR/ATRAPS.Gen2 - Remove Trojan Horse Virus Step by Step


TR/ATRAPS.Gen2 serves as an undesirable program that can sneak into the deep of the system without gaining user’s consent firstly. It will reduce system performance and obtain access to the malware outside to get into the system. To make things worse, this Trojan steals users’ information and sends them to unknown remote hackers. The earlier you remove it, the less damage the computer will suffer. You can follow the instructions to perform the task.
1: Boot up your computer in Safe Mode with Networking:
Method One
1: Press “Windows” and “R” keys together to open the Run box
Use Windows key and R key to boot in Safe Mode on Windows 8
2: Type “msconfig” in the the Run box and click OK
3: Click the Boot tab, then check the box that says “Safe boot” and “Network” under the Boot options section Click OK.
4: Click Restart when it informs that you need to restart your computer.
Method Two
1:Press the “Windows” + “C” keys, and then click Settings.
Win + C keys to open Settings on Win 8
2: Click Power, hold down Shift key on your keyboard and click Restart.
3: Click Troubleshoot button
4: Click Advanced options button
5: Click Startup Settings button
6: Click Restart button enable Safe Mode on Win 8
7: Press 5 on your keyboard to Enable Safe Mode with Networking.
2: Show all hidden files:
On Windows XP
* Close all programs so that you are at your desktop.
* Click on the Start button. This is the small round button with the Windows flag in the lower left corner.
* Click on the Control Panel menu option.
* When the control panel opens click on the Appearance and Personalization link.
* Under the Folder Options category, click on Show Hidden Files or Folders.
* Under the Hidden files and folders section, select the radio button labeled Show hidden files, folders, or drives.
* Remove the checkmark from the checkbox labeled Hide extensions for known file types.
* Remove the checkmark from the checkbox labeled Hide protected operating system files (Recommended).
* Press the Apply button and then the OK button.
On Windows 7 / Vista
* Click and open Libraries
* Under the Folder Options category of Tools , click on Show Hidden Files or Folders.
* Under the Hidden files and folders section, select the radio button labeled Show hidden files, folders, or drives.
* Remove the checkmark from the checkbox labeled Hide extensions for known file types.
* Remove the checkmark from the checkbox labeled Hide protected operating system files (Recommended).
* Press the Apply button and then the OK button
On Windows 8 /8.1
* Click on Windows Explorer ;
* Click on View tab;
* Check the “Hidden Items” box
3: End TR/ATRAPS.Gen2 associated files
%commondesktopdir%TR/ATRAPS.Gen2.lnk
%windows%System32drivers[**Random**].sys
C:WindowsSystem32drivers[Random].sys
%program files%TR/ATRAPS.Gen2 .lnk
%ProgramFiles%Protected SearchTaskSchedulerCreator.exe
%System%driversUAC[RANDOM CHARACTERS].sys
%Documents and Settings%[UserName]Application Data TR/ATRAPS.Gen2
4: Stop TR/ATRAPS.Gen2 related processes in the Windows Task Manager
On Windows XP
Press Ctrl+Alt+Del keys together to open Windows Task Manager ;
Under the Processes tab, right-click on the processes related with the virus and click End Process
On Windows 7 / Windows Vista
Right-click on Task Bar and click click Task Manager;
Under the Processes tab, right-click on the processes related with the virus and click End Process
On Windows 8 / 8.1
Right-click on Task Bar and click click Task Manager;
Under the Processes tab, right-click on the processes related with the virus and click End Process
5.Open the Registry Editor
Method 1
(Available on Windows XP, Windows 7 /Vista, and Windows 8 /8.1):
Call out “Run” box by pressing “Windows” key + “R” key on your keyboard;
Type “Regedit” into the Run box and click OK to open Registry Editor
Method 2
(Available on Windows 7/ Vista):
Click on Start button to open Start Menu
Type “Regedit” into the search box and click on Regedit to open Registry Editor
6: Delete Registry Entries created by TR/ATRAPS.Gen2
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesActiveDesktop “NoChangingWallPaper” = ’1
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesAttachments “SaveZoneInformation” = ’1
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem “DisableTaskMgr” = ’1
HKEY_LOCAL_MACHINEsoftwareclassesurlsearchhook.toolbarurlsearchhook
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerToolbar
HKEY_LOCAL_MACHINESOFTWAREMozillaFirefoxextensions,
HKEY_CURRENT_USERsoftwaremicrosoftinternet explorertoolbarwebbrowser
HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain “Use FormSuggest” = ‘yes’
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerAdvanced “ShowSuperHidden” = 0


Note: Of course, it's highly recommended that you should remove trojan horse in a professional way if there are still some similar problems with your computer.


TR/ATRAPS.Gen2 has infected numerous computers. It can cause many problems to the infected computer. Most users don’t even know where and how it comes, let alone knowing how to kill this infection. There are many ways for it to intrude PC. If the user visits hacked websites, opens files or programs contained in a junk email, or clicks on the malicious links posted at forums by the hackers, they are likely to download and install the Trojan horse unwittingly. The worst thing is that hackers are able to manipulate your computer because of this Trojan. Thus, your important data and information may end up being stolen by the hackers. So, you’d better get rid of the malicious Trojan virus promptly. Furthermore, it's rather necessary for you to use a professional malware removal tool to get away from all the malware. 

没有评论:

发表评论