Analysis by: Jennifer Gumban

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also contribute to information-stealing attacks by other malware. Trojans may also modify an infected system's settings to automatically execute during startup. Restoring infected systems may require procedures apart from scanning with an antivirus software.

Trojans may be downloaded off the Internet. These may also be dropped by other malware onto systems or may be unknowingly installed by users into their systems.

  SOLUTION

Minimum Scan Engine: 9.850

NOTES:

For Trend Micro Customers

Scan your system with your registered Trend Micro security solution removes this malware.

If you suspect a false positive (i.e. you believe the detected file to be non-malicious), kindly submit a sample of the detected file through the following channels for analysis:

  • For premium customers, click here here.
  • For non-premium customers, click here here.

    For Non-Trend Micro Customers

    You may download, install, and scan your system with [i]HouseCall[/i] [link to http://housecall.trendmicro.com/], our highly popular and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.


    Did this description help? Tell us how we did.