Tuesday, March 10, 2015

Trojan.Multi.Cerstor.a Removal Instruction

Trojan.Multi.Cerstor.a is one of the latest must- avoid Trojan that has successfully taken over millions of computers. Commonly, if you run junk email attachments, download free software from unsafe sources, browse hacked websites or click on the malicious links posted in forums, you are likely to download this Trojan onto your computer. Therefore, you have to be very careful when surfing the net.

The threat can enter the target machine furtively and install itself in a very short period of time. It starts to do evil things set by the cyber criminals once it roots the computer system. The Trojan horse has the ability to get registry value executed on purpose to keep malicious activities performing stably. Furthermore, the affected system will be frequently halted without any reason. Firstly, it inserts malicious codes into Windows registry and modify browser settings and other settings as well. The running programs or even the PC usually turns off without notifying you, which disrupts the system severely. What’s worse, cyber criminals can drop malevolent files on the compromised machine in order to spy on your online activities. This means the criminals will know whatever you do on the internet. They will use the information for illeagal purpose. We sincerely advise you to eliminate it immediately.


The normal antivirus programs cannot delete the infection easily because the Trojan pretends to be part of your system and it is difficult for security protections to remove all the malicious files. Thus, you can try the manual removal below if you know computer well. Be careful when performing the removal to prevent any wrong operation damaging the computer system.


Manual removal instructions:



This Trojan horse is so canny that it will first block your antivirus program from working, in order to avoid detection and removal by the antivirus program, so you can try manually removing it from the infected system. Please back up the important data and registry before you start the manual removal in case of any losses during the process. Then follow the steps below to handle the threat:

Step one: Boot up your computer in safe mode.
1) Restart your affected computer and hit F8 key multiple times before Windows Advanced Options Menu starts.
2) Use the up and down arrow keys to navigate the "Safe Mode with Networking" option when the Windows starts. And then hit Enter key to process.

Step two: Eliminate show hidden files and folders.
Open Control Panel from Start menu and go to Folder Options.

Under View tab, check Show hidden files and folders and non-check Hide protected operation system files (Recommended). Finally, click OK.

Search for and eliminate all the following files created by the Trojan from your PC.

%AllUsersProfile%\[random]
%AppData%\Roaming\Microsoft\Windows\Templates\[random]
%AppData%\Local\[random].exe

Step three: Kill the process related to the Trojan in Windows Task Manager.
Right-click on the taskbar (or press CTRL+SHIFT+ESC keys together) to start Windows Task Manager.
Navigate to the Processes tab, search for its running processes of the Trojan and then kill them by clicking on “End Process” button.

Step four: Remove the registry entries of the Trojan.
Press Windows + R keys and input regedit into the box and then click OK to open Registry Editor.

When Registry Editor opens, search for and remove all the registry entries of the Trojan. You’d better make a backup of your registry in case of data loss.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\[RANDOM CHARACTERS].exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ‘Random’
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Random

Step five: After all the steps are done, please reboot your computer normally to apply all changes.


Trojan horse TDSS.CA is very dangerous that it gives the remote hackers privileged access to your computer and brings other threats without your knowledge. Be more careful when downloading an attachment or click a link from the unknown email. After this Trojan horse is removed, you should pay much attention to your online habits in order to keep your computer away from malware, such as avoid downloading free software from websites that you don’t 100% trust. Lots of Trojan horses can spread themselves via spam emails. So you have to be wary of the drive- by downloads and suspicious websites. The Trojan may add other viruses to your computer silently without permission. In short, it is necessary to remove Trojan.Multi.Cerstor.a as soon as possible. Anyway, Trojan horse TDSS.CA should be cleaned up from your computer as quickly as possible.

For more information about other types of malware, please visit here: http://www.malwaretips.org

No comments:

Post a Comment