TROJAN.WIN32.TRX.XXPE1
Windows

Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This is a detection from the Trend Micro Predictive Machine Learning mechanism. It uses advanced machine learning technology to correlate threat information and perform in-depth analysis to detect emerging unknown security risks. It does this through digital DNA fingerprinting, API mapping, and other file features analysis.
A Trojan horse program is a malware that is not capable of automatically spreading to other systems. Trojans are usually downloaded from the Internet and installed by unsuspecting users.
Trojans, as the term implies, may come in disguise when in your system. It can:
- Be disguised as a legitimate software component
- Come as a gaming app
- Mimic a seemingly legitimate announcement from an entity you trust, like the police
Trojans typically carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They may also modify system settings to automatically start. Restoring affected systems may require procedures other than scanning with an antivirus program.
SOLUTION
Step 1
Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.
Step 2
For Trend Micro Customers
Scanning your system with your registered Trend Micro security solution removes this malware.
Trend Micro products are powered by the Trend Micro™ Smart Protection Network™, a technology designed to protect you from all kinds of online security threats, regardless of type, attack vector, or behavior.
If you suspect a false positive (i.e. you believe the detected file to be non-malicious), kindly submit a sample of the detected file through the following channels for analysis:
For Non-Trend Micro Customers
You may download, install, and scan your system with HouseCall, our highly popular and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.
Did this description help? Tell us how we did.