TR/ATRAPS/Gen 2
Posted: January 10, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Ranking: | 5,982 |
---|---|
Threat Level: | 2/10 |
Infected PCs: | 7,954 |
First Seen: | January 10, 2012 |
---|---|
Last Seen: | October 16, 2023 |
OS(es) Affected: | Windows |
TR/ATRAPS.Gen2 is a rootkit and Trojan that's used to install spyware – PC threats that specialize in theft of private information, but in this case, especially in theft of passwords and account information for MMORPGs (Massive Multi-player Online Role Playing Games; such as World of Warcraft). Along with this considerable danger, SpywareRemove.com malware researchers also note that TR/ATRAPS.Gen2 is also used as an alias for native files that have been modified by similar PC threats and by backdoor Trojans that allow criminals to have limited access to your PC via a command server. As a considerable threat to your personal information and to your computer's security, TR/ATRAPS.Gen2 should be deleted hastily and with extreme prejudice as long as you can access anti-malware scanners that are able to deal with high-level threats like rootkits. Failure to do this can be considered as good as inviting criminals to steal financial or gaming-related information for a variety of crimes, including account theft.
TR/ATRAPS.Gen2: Having Fun at Your Expense
TR/ATRAPS.Gen2 is used to detect several types of PC threats that are associated to one another by being part of a spyware attack against gaming-related information. TR/ATRAPS.Gen2 may be installed by files from suspicious sources, but SpywareRemove.com malware researchers also warn that drive-by-downloads and other types of PC threats (such as Trojan droppers) can be equally-complicit in a TR/ATRAPS.Gen2 attack. Since many variants of TR/ATRAPS.Gen2 were only identified in December of 2011, updates for your anti-malware scanner's threat definitions are important for properly-identifying and, therefore, deleting TR/ATRAPS.Gen2.
TR/ATRAPS.Gen2's primary variant is that of a Trojan dropper that launches Trojan-PWS:Win32/Frethog; the Frethog spyware will then attempt to steal passwords, account names and similar types of information that are related to World of Warcraft, Age of Conan, Lord of the Rings Online and other mmorpg-genre games. If you suspect that TR/ATRAPS.Gen2 or related PC threats have compromised your computer, you should contact the relevant companies to take measures for securing your accounts against potential break-ins by hackers.
The Many Names and Secondary Features of a TR/ATRAPS.Gen2 Attack
Some variants of TR/ATRAPS.Gen2 are also known to be backdoor Trojans that, as SpywareRemove.com malware experts have noted, can allow criminals to control your entire PC and force it to commit to self-destructive actions. Backdoor access to your computer may be used to steal other types of information besides the types that are targeted by Trojan-PWS:Win32/Frethog, install other PC threats, alter system settings or even destroy files. Secondarily, TR/ATRAPS.Gen2 is also used to identify normal files that have been contaminated by related PC threats – usually in the process of compromising security or stealing information. Infected files should be disinfected or deleted by appropriate anti-malware software.
Since TR/ATRAPS.Gen2 often contains rootkit functions that allow TR/ATRAPS.Gen2 to infect normal system processes and easily-evade deletion, only highly-competent anti-malware products should be used to remove TR/ATRAPS.Gen2. TR/ATRAPS.Gen2 may also be detected by quite a few aliases; SpywareRemove.com malware researchers have also noted TR/ATRAPS.Gen2 being detected by the names of Trojan:Win32/Woripecs.gen!A, Virus:Win32/Frethog.E, Virus:Win32/Frethog.F, W32/Patched.S.gen!Eldorado, Trojan.Win32.Patched.al, Trojan.Generic.4984397, Trojan.Patchep!sys and Win32.Loader.jx (among others).
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.