Malware Removal Instructions

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 14 June 2013

Remove TR/ATRAPS.Gen2, removal instructions

Posted on 09:30 by Unknown
Cyber crooks and third parties that buy stolen data are increasingly using more and more sophisticated techniques, in a variety of different ways to steal your information for financial gain or to simply cause havoc on your computer seemingly for their own twisted sense of enjoyment. One of these dangers to look out for is called TR/ATRAPS.Gen2 which is a piece of malicious software in disguise. This Trojan is a tough one to remove because most of the time it comes bundled with TR/Sirefef which is a rather sophisticated malware from the Sirefef or ZeroAccess malware family. So, if you are getting a pop-up from your antivirus about this infection then your current security product is unable to remove it properly.

As far as I can tell, TR/ATRAPS.Gen2 is distributed in various ways, using infected websites, malicious emails and even game cracks or free premium account generators. Just because a program says it’s a game and it looks like a game, it is not necessarily a game and it might actually be a Trojan horse. In fact some types of Trojan horse software are programs that masquerade as anti-virus software - although they’re actually infecting you with viruses and are the very thing they claim to be protecting you against! Learn more: Rogue Antivirus software.

Access to file containing the virus or unwanted program 'TR/ATRAPS.Gen2' was blocked. 

As with types of viruses and malware, not all Trojan horses are the same either and they are split into categories depending on how they access your computer’s system and the type of damage they cause. TR/ATRAPS.Gen2 may be used to steal sensitive information, display ads on your computer or redirect your web browser to infected websites. It can also download additional malware modules onto your computer. As you can see, this Trojan horse is really well designed and coded. Detection ratio speaks for itself, it's usually below 50%, see this. I've seen some fresh samples that were detected by only two or three antivirus programs which means, this malware uses advanced techniques to bypass antivirus protection.

Unfortunately for computer users, whether it’s just you at home alone on your laptop or a network administrator in a busy corporate environment, attacks by Trojan Horses are increasing not only in amount but in sophistication too. They affect users in all countries across the globe and no one is immune so how do you protect yourself from falling victim?

The thing to remember is that just as the people of Troy were fooled by the Greeks into letting them into their city to capture it, computer Trojan horses operate on the same principle. An attacker will try to convince you to run TR/ATRAPS.Gen2 on your computer by making you think it’s perfectly safe. It is for this reason that most Trojan Horses are hidden inside games or other popular downloads.

Luckily a good (genuine!) anti-malware program will detect and delete the TR/ATRAPS.Gen2 virus before you have a chance to run them, thus installing them on your PC. It goes without saying, therefore, that you should always have decent anti-malware software installed and you should also make sure it is the most up to date version.

You should also take care not to do as the Trojans did and let ‘the horse’ in. This means never clicking on an email attachment from a sender you do not know and not downloading or installing games, anti-viruses or other programs from sources that you do not trust or are unsure about. To remove TR/ATRAPS.Gen2 from your computer, please follow the removal instructions below. If you have any questions, please leave a comment below. Good luck and be safe online!

Written by Michael Kaur, http://deletemalware.blogspot.com


TR/ATRAPS.Gen2 removal instructions:

1. Please reboot your computer is "Safe Mode with Networking". As the computer is booting tap the "F8 key" continuously which should bring up the "Windows Advanced Options Menu" as shown below. Use your arrow keys to move to "Safe Mode with Networking" and press Enter key.


NOTE: Login as the same user you were previously logged in with in the normal Windows mode.

2. Download recommended anti-malware software (direct download) and run a full system scan to remove TR/ATRAPS.Gen2 from your computer.

3. Reboot your computer as normal. Download and run TDSSKiller. Press the button Start scan for the utility to start scanning.



4. Wait for the scan and disinfection process to be over. Then click Continue. Please reboot your computer after the disinfection is over.



Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Trojans | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • What is wrtc.exe and how to remove it?
    wrtc.exe - by Perion Network Ltd. What is wrtc.exe? wrtc.exe is a part of IncrediMail software, digitally signed by Perion Network Ltd. This...
  • Remove ShopperReports (Uninstall Guide)
    ShopperReports is defined as adware or a potentially unwanted program that displays marketing related results in a side pane of the browser...
  • Trojan.MBRlock, Внимание! Ваш компьютер заблокирован
    Trojan.MBRlock is a very disturbing piece of malicious code which infects the master boot record (MBR) and prevents Windows from starting. ...
  • False Positive: Ikarus and Comodo detecting TDSSKiller as a Trojan horse
    This awkward moment when you realize that your favorite rootkit removal utility is detected as malware. I probably wouldn't even have no...
  • Remove RiskTool.Win32.BitCoinMiner (Uninstall Guide)
    RiskTool.Win32.BitCoinMiner is a risk tool or potentially unwanted application that may use your computer's resources to generate bitco...
  • Remove Rattlingsearchsystem.com (Uninstall Guide)
    Rattlingsearchsystem.com is a ZeroAccess/Sirefef rootkit-related browser hijacker that redirects users to shady websites while searching on...
  • Remove TR/ATRAPS.Gen2, removal instructions
    Cyber crooks and third parties that buy stolen data are increasingly using more and more sophisticated techniques, in a variety of different...
  • Remove Ask Search and Ask Toolbar (Uninstall Guide)
    Ask Search and Ask Toolbar are very often incorrectly classified as virus/spyware that may cause search redirects. The majority of us pref...
  • How to remove 'TidyNetwork' adware virus from your computer
    As internet users most of us have seen those irritating little pop-up windows that are advertising something that we normally have little or...
  • Remove Windows Attention Utility (Uninstall Guide)
    Windows Attention Utility is a rogue security application that generates misleading warnings about nonexistent viruses and attempts to lure...

Categories

  • Adware
  • Answers
  • Antivirus software
  • Browser Hijackers
  • Cloud Computing
  • Fake Alerts
  • Giveaways
  • Hoax
  • How-To
  • IaaS
  • Internet
  • Malicious websites
  • Malware
  • PaaS
  • Parental Controls
  • Passwords
  • Phishing
  • Process Information
  • Ransomware
  • Rogue programs
  • Rootkits
  • SaaS
  • Security Advisories
  • Spam
  • Spyware
  • Trojans
  • Viruses
  • Web Browsers
  • Worms

Blog Archive

  • ▼  2013 (173)
    • ►  December (6)
    • ►  November (13)
    • ►  October (11)
    • ►  September (20)
    • ►  August (4)
    • ►  July (17)
    • ▼  June (31)
      • How to Remove DomaIQ, removal instructions
      • Remove bizcoaching.info, removal instructions
      • What is CltMngSvc.exe and how to remove it?
      • What is Search Assistant WebSearch 1.74 and how to...
      • What is Search Protect by conduit and how to remov...
      • What is IB Updater Service and how to remove it?
      • Remove vGrabber, removal instructions
      • Remove inksdata.com, removal instructions
      • How To Get Rid of the "FBI Your computer has been ...
      • PC Health Boost Review and Removal Instructions
      • Remove OtShot, removal instructions
      • What is Macromedia.exe and how to remove it?
      • Is it safe to use a VPN service to change IP? How ...
      • What is wrtc.exe and how to remove it?
      • What is DTUpdate.exe and how to remove it?
      • Remove "Value Apps" pop-up, removal instructions
      • Remove start.search.us.com homepage redirect (Unin...
      • Remove TR/ATRAPS.Gen2, removal instructions
      • How to remove 'TidyNetwork' adware virus from your...
      • What is stij.exe and how to remove it?
      • What is wscript.exe and how to remove it?
      • How to remove Luhe.Sirefef.A Trojan virus (Uninsta...
      • What is minerd.exe and how to remove it?
      • What is wssetup.exe and how to remove it?
      • Alert: Fake Google Chrome Update
      • Fixing ievbz.com redirection/hijacking problem
      • What is dmwu.exe and how to remove it?
      • WebCake Adware Removal Guide
      • Remove trustedoffer.com pop-ups and redirection (U...
      • Fake Flash Player Update Virus Removal
      • V9 Portal Site Removal Guide
    • ►  May (25)
    • ►  April (15)
    • ►  March (17)
    • ►  February (7)
    • ►  January (7)
  • ►  2012 (86)
    • ►  November (2)
    • ►  October (4)
    • ►  September (6)
    • ►  August (6)
    • ►  July (11)
    • ►  June (1)
    • ►  May (5)
    • ►  April (7)
    • ►  March (7)
    • ►  February (17)
    • ►  January (20)
  • ►  2011 (239)
    • ►  December (8)
    • ►  November (18)
    • ►  October (21)
    • ►  September (24)
    • ►  August (28)
    • ►  July (32)
    • ►  June (16)
    • ►  May (23)
    • ►  April (15)
    • ►  March (16)
    • ►  February (9)
    • ►  January (29)
  • ►  2010 (2)
    • ►  December (2)
Powered by Blogger.

About Me

Unknown
View my complete profile