The constantly growing number of malware infections caused by a virus called Trojan.Multi.GenAutorunReg.a is the reason why we have assembled the article below. We have tried to explain everything about Trojan.Multi.GenAutorunReg.a’s  nature and the potential serious damage such a program could result in. 


The Trojan.Multi.GenAutorunReg.a Virus can steal your sensitive data

Hopefully the details below will be enough to help you understand the essence of your current issue. In order to assist you in removing this virus, we have attached a guide. Make sure you follow all the instructions and your problem should be easily solved.

What is typical for any Trojan virus?

When it comes to malware infections, most of them are caused exactly by various versions of Trojans. These viruses are indeed the most widely spread and multifunctional ones. They can be distributed in practically any way. We have mentioned some of the most common ones in the next paragraphs. What’s more, they could have such diverse purposes that the possible consequences coming from them might be really varying. Of course, we have discussed the main usages of this type of malware below. The common denominator of all these viruses is their ability to become incorporated in your system in a stealthy way, without directly or indirectly asking for your permission. Also, one more common threat is their ability to stay hidden until the time comes to show their true face (just like the horse they are named after from the famous Trojan War tale).

Possible ways of distributing Trojan.Multi.GenAutorunReg.a:

  • Such viruses could be incorporated into web pages, torrents and shareware.
  • They might come from video-sharing websites.
  • Another possible scenario is to get infected after opening a contagious letter from your email or any attached file, even and image or text document. (Typically, in such a case the Trojan could be distributed together with a Ransomware virus. This possibility is among the worst ones.)
  • You may sometimes see some suspicious but genuine-looking update requests on your screen. Please, do not fall into this trap. Such alerts might actually lead to infected pages and you may become a victim of Trojan.Multi.GenAutorunReg.a.
  • One more way of catching such malware is via any fake pop-up ad you may come across on the web. Such ads can either directly contain the malicious script or they might redirect you to web addresses containing the virus.

Potential purposes Trojan.Multi.GenAutorunReg.a could have

A virus like Trojan.Multi.GenAutorunReg.a could be exploited for a number of different harmful purposes. Some of them we will mention in the list below. Nonetheless, we cannot name every single usage in one article only, as the range of possibilities of a Trojan is truly spectacular.

  • The hackers might just feel the need to DESTROY something. Unfortunately, this might be your system. It could be crashed with such malware. Some of your data might get destroyed, deleted, corrupted or even encrypted. Your OS might get so damaged, that an entire reinstallation might be necessary.
  • The cyber criminals behind Trojan.Multi.GenAutorunReg.a might want your MONEY or your IDENTITY for some reason. That is why Trojans are often exploited for recording account credentials, which will later allow the hackers to drain your bank account or hijack your online identity. Some online crimes could also be committed on your behalf, which may lead to legal actions being taken against you for something you never did.
  • Sometimes such viruses are used for simply sneaking other malicious programs into your system. Trojans are very often used to transport Ransomware. This scenario is an awful one, as Ransomware is a type of malware specialized in encrypting data and demanding ransom for it. No guarantee is given for the recovery of the hijacked data, no matter whether the victim user refuses or accepts to complete the requested payment.
  • The hackers could also be prone to physically abusing people. Some of them use such malware to hack your PC and record your every step – both online and in the real world. They turn on all your devices, such as mics and cameras, to spy on you all the time. Also, they keep track of all your cyber activities. Such a case is particularly disturbing.

What to do to remove such a nasty virus?

If you are looking for a way to get rid of Trojan.Multi.GenAutorunReg.a, you will find plenty of opportunities. In our opinion, you should use our Removal Guide for that purpose. Carefully following the instructions will get your issue resolved.


Name Trojan.Multi.GenAutorunReg.a
Type Trojan
Danger Level  High (Trojans are often used as a backdoor for Ransomware)
Symptoms Very subtle way of functioning, which makes such infections truly horrible.
Distribution Method Many possibilities – from an infected torrent to a fake update notification.
Detection Tool

Keep in mind, SpyHunter’s malware detection tool is free. To remove the infection, you’ll need to purchase the full version.
More information about SpyHunter and steps to uninstall.

Remove Trojan.Multi.GenAutorunReg.a

If you are looking for a way to remove Trojan.Multi.GenAutorunReg.a you can try this:

  1. Click on the Start button in the bottom left corner of your Windows OS.
  2. Go to Control Panel -> Programs and Features -> Uninstall a Program.
  3. Search for Trojan.Multi.GenAutorunReg.a and any other unfamiliar programs.
  4. Uninstall Trojan.Multi.GenAutorunReg.a as well as other suspicious programs.

Note that this might not get rid of Trojan.Multi.GenAutorunReg.a completely. For more detailed removal instructions follow the guide below.

If you have a Windows virus, continue with the guide below.

If you have a Mac virus, please use our How to remove Ads on Mac guide.

If you have an Android virus, please use our Android Malware Removal guide.

If you have an iPhone virus, please use our iPhone Virus Removal guide


Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).



Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 


Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
This scanner is free and will always remain free for our website's users.
This file is not matched with any known malware in the database. You can either do a full real-time scan of the file or skip it to upload a new file. Doing a full scan with 64 antivirus programs can take up to 3-4 minutes per file.
Drag and Drop File Here To Scan
Analyzing 0 s
Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
    This scanner is based on VirusTotal's API. By submitting data to it, you agree to their Terms of Service and Privacy Policy, and to the sharing of your sample submission with the security community. Please do not submit files with personal information if you do not want them to be shared.

    After you open their folder, end the processes that are infected, then delete their folders. 

    Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections. 


    Hold together the Start Key and R. Type appwiz.cpl –> OK.


    You are now in the Control Panel. Look for suspicious entries. Uninstall it/them. If you see a screen like this when you click Uninstall, choose NO:



    Type msconfig in the search field and hit enter. A window will pop-up:


    Startup —> Uncheck entries that have “Unknown” as Manufacturer or otherwise look suspicious.

    • Remember this step – if you have reason to believe a bigger threat (like ransomware) is on your PC, check everything here.

    Hold the Start Key and R –  copy + paste the following and click OK:

    notepad %windir%/system32/Drivers/etc/hosts

    A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:


    If there are suspicious IPs below “Localhost” – write to us in the comments.


    Type Regedit in the windows search field and press Enter.

    Once inside, press CTRL and F together and type the virus’s Name. Right click and delete any entries you find with a similar name. If they don’t show up this way, go manually to these directories and delete/uninstall them:

    • HKEY_CURRENT_USER—-Software—–Random Directory. It could be any one of them – ask us if you can’t discern which ones are malicious.
      HKEY_CURRENT_USER—-Software—Microsoft—-Windows—CurrentVersion—Run– Random
      HKEY_CURRENT_USER—-Software—Microsoft—Internet Explorer—-Main—- Random

    If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!


    About the author


    Maria K.


    Leave a Comment