How to Remove Certificate Malware Error from Your PC

How to Remove Certificate Malware Error from Your PC

This instructive article aims to explain to you what is Trojan Horse and how to remove it from your computer completely.

A new Win32 infection, taking advantage of the file in Windows has been detected. The virus is believed to be a Trojan horse, most likely a Kelihos Trojan variant and it may perform a set of malicious activities, such as collect account information, log keystrokes and perform a set of other activities on your computer system, like DDoS attacks, monitor the network traffic and even send spam e-mails from the victim’s IP address. If your computer has been infected by the malware, it is strongly recommended to immediately to detect and remove it, preferably by using information like the one stated in this article.

Threat Summary Trojan
TypeTrojan Horse
Short DescriptionMay download other malware on the infected server/computer or may include it in a botnet (zombie network). May also steal information from it.
SymptomsYou may see errors with the certificate of the file. Other than that, the malware aims to stay undetected, showing no symptoms of presence.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by Trojan


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Trojan. Malware – How Did I Get Infected

This Trojan horse is a bit more sophisticated than other malware, since it has a lot of functions, that are pre-programmed to ensure that your computer is at the hacker’s disposal. The infection methods are not so sophisticated, in fact there has been only one that is reported so far and it is via malicious e-mail messages being spammed. The messages are of different character and contain the virus infection file embedded as an e-mail attachment, which poses as a legitimate document. Here is an approximate example of how spam e-mails carrying the malware as an attachment may appear like:

Dear Customer,
We could not deliver your parcel.
You can review complete details of your order in the file attached.

Warm regards,
Marshall Hampton,
Sr. Operation Agent.

The usual form of the attachment is an executable file that is archived in a .zip or .rar archive. However, the file may also be a Microsoft Office document, embedded with a malicious macros inside of it. If the file is a fake document, the following activities happen:

Besides an e-mail attachment, the malicious file may also be uploaded on a third-party website and a link to it may be posted in the e-mail. The black hat hackers usually use Google Drive, Dropbox and other online file-sharing services, since they are not blocked by e-mail providing companies. Malware – Analysis

When an infection with the malware takes place, the virus immediately modifies the Windows Registry Editor by adding registry values in the following locations:

→ HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

After this has been done, the malware connects to the following web links in order to download the root certificates via the files and authrooseq.txt.


This ensures that the malware stays obfuscated and undetected as an administrator of your computer.

When this is done, the malware, associated with, connects to multiple hosts, reported by researchers to be the following:


After connecting to them, the virus uses multiple web resources and Windows functions in order to perform the following activities on the infected computer:

  • Encrypt it’s outgoing and incoming communication.
  • Receive a list of computers to be attacked by automatically sending spam e-mail messages to them from the infected computer.
  • Include the victim computer in a botnet (zombie network) of computers.
  • Turn the infected computer or server to serve as a proxy network for the hacker.
  • Monitor what you do online.
  • Collect the keystrokes typed by you.

In addition to the many activities of this Trojan, it also aims to steal your offline BitCoin wallet, if there is such present on your computer. This is done by scanning for your wallet.dat file, usually located in the %AppData% directory:

→ %AppData%\Bitcoin\wallet.dat

Furthermore, it is unknown as of yet why, but the malware also scans for the following files on the infected computer:

→ avi mov wmv mp3 wave wav wma ogg vob png jpg jpeg gif bmp exe dll ocx class msi zip 7z rar jar gz hxw hxh hxn hxd

After doing so, the malware may have the ability to directly copy those files and send them over to the server of the hacker.

Another activity, which this Trojan is created to perform is to send spam e-mails to a large pre-configured list of e-mail addresses. This is done with the one and only purpose to either influence those servers or computers with what is written in the message or infect them with a version of itself via the spam mails. The messages sent are usually related to stock price speculation, but they may become different at any time in the future. Here is one e-mail sent from an infected server with this Trojan:

“Breaking News: Worldwide Market Demand for Gold Might Hit to $221 . 5 Billion this Year. One company made sure to secure their claims for the richest gold
find – worth of billions of the GOLD

The symbol is SR_G__L

Go getting some of SR_G_L on Monday in the low $0.27


Company Name: Source Gold Corp,

Latest Pricmgt $.027

Short Term Target Pace” 80.39

Tap into the Nat Gold Rush Global gold demand could top 4,400 tons in 2012
worth 8221.5 bilion – an increase of16% over 2011. Early-in investors in

this ONE stock up can surely convert ten grands into fifiy. Acqu’ue SR_G_L

on Monday October 8th. call you broker or visit Etrade!”

Remove Malware from Your Computer

To show you how to eliminate malware, we have created removal instructions in the steps below. They can help you isolate the threat and look for all the registries and files it has created on your computer system. However, for fast and effective removal, security professionals often recommend to use an advanced anti-malware program, that is sure to help you remove malware automatically and fully and detect other malware as well, if present on your PC. Furthermore, installing such software also makes sure that your computer stays protected against future infections as well.

Manually delete Trojan from your computer

Note! Substantial notification about the Trojan threat: Manual removal of Trojan requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove Trojan files and objects
2. Find malicious files created by Trojan on your PC

Automatically remove Trojan by downloading an advanced anti-malware program

1. Remove Trojan with SpyHunter Anti-Malware Tool
Optional: Using Alternative Anti-Malware Tools

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share