Trojan.Modified
Posted: September 26, 2013
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Threat Level: | 9/10 |
|---|---|
| Infected PCs: | 14 |
| First Seen: | September 27, 2013 |
|---|---|
| Last Seen: | April 12, 2024 |
| OS(es) Affected: | Windows |
Trojan.Modified is a heuristic detection for a file that exhibits behavior similar to that of a Trojan. Because Trojan.Modified is a generic label applied to many kinds of PC threats, Trojan.Modified may refer to native Windows components that have been contaminated, or to normally benign files from other programs that have been modified for enabling various attacks against your computer. Although some versions of Trojan.Modified may show obvious symptoms like search engine hijacks, SpywareRemove.com malware experts warn that there are no guarantees of Trojan.Modified showing any symptoms at all. Anti-malware products should be used heavily for detecting and removing Trojan.Modified infections – or, preferably, preventing them ever from occurring.
When to Worry About a File Modification and When to Shrug and Let It Go
Trojan.Modified is a broad detection category for Trojan components involving files that normally are safe but have been modified to include questionable behavior. One common example of a potential Trojan.Modified alert is that of a software-bundled Trojan, or a Trojan that's packaged with an unrelated program that normally wouldn't install the Trojan. Malware authors often use such techniques to distribute ambiguous software through Flash updates, media player installers and warez-related downloads.
A common variant of Trojan.Modified, Trojan.ModifiedUPX, applies to UPX-compressed executable files that are unsafe. Because many Trojans use UPX compression as a way to confuse anti-malware detection features, this variant of Trojan.Modified is quite common, and you always should be careful about launching archived files from sources that you aren't sure are safe. However, malware researchers also note that the sheer commonality of this issue also makes a false positive highly likely, and there's no need to panic over an inaccurate Trojan.Modified alert – as long as you're reasonably certain that the file is safe.
Keeping Your PC from Being Modified in Turn by a Trojan.Modified Attack
The appropriate response to a Trojan.Modified alert depends on a rough identification of what type of Trojan.Modified has been detected. If you're certain that your Trojan.Modified alert is a false positive, SpywareRemove.com malware researchers recommend contacting the relevant security company so that their databases can be updated to exclude the file in future versions of their software. If you're scanning a file attachment or download link and see a Trojan.Modified alert, you should be careful to delete any messages or files associated with Trojan.Modified. In the case of social networking-based spam, you also may want to consider contacting your friends and associates to be certain that they aren't distributing Trojan.Modified by accident.
However, the worst scenario involving Trojan.Modified is a legitimate Trojan.Modified warning that applies to software that already is installed on your PC. In this case, malware researchers warn that you should consider your computer compromised, and any private information on it to be potentially at risk of being stolen. Fortunately, any anti-malware tools capable of detecting Trojan.Modified usually should be able to remove Trojan.Modified at the same time, too.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.