Trojan.Hosts.5858 Description

By using Trojan.Hosts.5858, criminals can scam inexperienced computer users with browser redirects while at the same time compromising the infected computer's security, potentially putting it under the control of malicious individuals. While Trojan.Hosts.5858 works together with other malware threats, this Trojan in particular is a browser hijacker. Basically, Trojan.Hosts.5858 is designed to divert online traffic in order to direct inexperienced computer users towards a scam website. Through this scam, criminals use Trojan.Hosts.5858 to obtain their victims' credit card information.

Trojan.Hosts.5858 Attack Involves Various Kinds of Malware Infections

Trojan.Hosts.5858 will take advantage of a preexisting malware infection known as the Backdoor.Andromeda Trojan. This malware infection opens up a backdoor into the infected computer system, a term commonly used to refer to an unauthorized opening in the infected computer system's security. By using this backdoor, much like a criminal can take advantage of an unguarded back door in order to enter someone's home, criminals can infect the victim's computer with various dangerous Trojan infections. Trojan.Hosts.5858 will rarely appear alone on a corrupted computer system. Trojan.Hosts.5858 will often be bundled with two other Trojans, an IRC bot (a malware infection designed to integrate the infected computer into a botnet so that it can be controlled from afar via IRC commands) and a spam bot Trojan (a Trojan designed to use the infected computer system to send out spam email, potentially spreading Trojan.Hosts.5858 to other computer systems).

How Trojan.Hosts.5858 Attacks Your Computer System

While there are many ways to cause browser redirects, some more intrusive than others, Trojan.Hosts.5858 goes as far as to change fundamentally how your computer system connects to the Internet. Basically, Trojan.Hosts.5858 makes changes to the HOSTS file, an important file contained in the System folder that is responsible for mapping a computer's connection to IP addresses. By changing how your computer system connects to websites, Trojan.Hosts.5858 can replace commonly-visited websites such as Google, Gmail and Facebook with its own malicious scam website. This malicious website will claim that your Internet access has been blocked, displaying a message entirely in German. Furthermore, this message will claim that the only way to regain access to the Internet is to provide your credit card details.

Infected with Trojan.Hosts.5858? Scan Your PC for Free

Download SpyHunter's Spyware Scanner
to Detect Trojan.Hosts.5858
* SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

Security Doesn't Let You Download SpyHunter or Access the Internet?

Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
  • Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
  • Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
  • Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
  • IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.

If you still can't install SpyHunter? View other possible causes of installation issues.

Technical Information

File System Details

Trojan.Hosts.5858 creates the following file(s):
# File Name
1 %AllUsersProfile%\Local Settings\Temp\
2 avg.exe
3 Autorun.inf

Site Disclaimer

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.

IMPORTANT! To be able to proceed, you need to solve the following simple math.
Please leave these two fields as is:
What is 11 + 11 ?