Social Networks Follow us on Twitter Like us on Facebook You Tube Channel
Threat Encyclopedia Mobile Page
Quick Links
  • Save & Share
  • Export page to PDF
  • Choose your country:
Malware type: Trojan
Destructive: No
Platform: Windows 2000, Windows XP, Windows Server 2003
In the wild: Yes

Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also contribute to information-stealing attacks by other malware. Trojans may also modify an infected system's settings to automatically execute during startup. Restoring infected systems may require procedures apart from scanning with an antivirus software.

Trojans may be downloaded off the Internet. These may also be dropped by other malware onto systems or may be unknowingly installed by users into their systems.

Leveraging the power of the Trend Micro™ Smart Protection Network™, Trend Micro products detect and consequently remove malicious files classified as Trojans if these are found in locations where malware are usually installed and if the files exhibit common malware characteristics.

Minimum scan engine: 8.900


For Trend Micro Customers

Scanning your system with your registered Trend Micro security solution removes this malware.

Trend Micro products are powered by the Trend Micro™ Smart Protection Network™, a technology designed to protect you from all kinds of online security threats, regardless of type, attack vector, or behavior.

If you suspect a false positive (i.e. you believe the detected file to be non-malicious), kindly submit a sample of the detected file through the following channels for analysis:
  • For premium customers, click here.
  • For non-premium customers, click here.

For Non-Trend Micro Customers

You may download, install, and scan your system with HouseCall, our highly popular and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.

Did this description help? Tell us how we did.
Analysis By: Christopher Daniel So