Home Malware Programs Trojans Trojan.Cosisrop!rts

Trojan.Cosisrop!rts

Posted: December 2, 2011

Threat Metric

Threat Level: 8/10
Infected PCs: 5
First Seen: June 29, 2011
OS(es) Affected: Windows

Trojan.Cosisrop!rts is a malicious Trojan infection that spreads via insecure downloads of shareware programs. Trojan.Cosisrop!rts can also spread via a drive-by download, that is, when you open a random website that contains a download and installation file of Trojan.Cosisrop!rts inserted. Once installed, Trojan.Cosisrop!rts does not allow you know of its existence. Trojan.Cosisrop!rts's remains hidden in the system background by using a legitimate system process. Eliminate Trojan.Cosisrop!rts's immediately after detection.

Aliases

Trj/CI.A [Panda]Generic13.HOU [AVG]W32/Agent.BWCL!tr [Fortinet]Trojan-Banker.Win32.Banker [Ikarus]Trojan.Win32.Generic!BT [Sunbelt]Win-Trojan/Agent.375296.Q [AhnLab-V3]Trojan:Win32/Cosisrop!rts [Microsoft]Trojan Horse [Symantec]Win32/ASuspect.GEOVU [eTrust-Vet]Mal/Generic-A [Sophos]Trojan.Agent.bwcl [McAfee-GW-Edition]WORM_SILLY.MCL [TrendMicro]TR/Agent.bwcl [AntiVir]TrojWare.Win32.Agent.bwcl [Comodo]Trojan.Generic.2195728 [BitDefender]
More aliases (27)

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%TEMP%\svchost.exe File name: svchost.exe
Size: 375.29 KB (375296 bytes)
MD5: 60635edc6dae105ed3b0c783451c317e
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%
Group: Malware file
Last Updated: June 29, 2011

One Comment

  • Rahayu says:

    My sister who's ex is a IT tecniichan got in her computer when it was off and unplugged not knowing her passwords only knowing her IP address and screwed it up big time.He would change her name and passwords deleted all her info' apply new bogus info and send nasty emails from him with her name and email address' so yes they can do almost anything they want' as long as they have the tools and computer know how.Why not put it to a good use like helping kids get a good educations not wrecking computers of women and children who cannot afford to buy other computers.

Loading...