Threat Database Trojans Trojan.Adject

Trojan.Adject

By GoldSparrow in Trojans

Threat Scorecard

Ranking: 13,306
Threat Level: 80 % (High)
Infected Computers: 3,642
First Seen: March 8, 2018
Last Seen: September 14, 2023
OS(es) Affected: Windows

Trojan.Adject is a detection name, which not all AV vendors utilize in their databases. The Trojan.Adject detection name points to a a generic Trojan, which is often found on fake software update packages and cracked copies of shareware. Threat actors may use Trojan.Adject to inject HTML and JavaScript code on Web pages loaded by compromised users. Trojan.Adject can be used to divert Web traffic to phishing pages, direct users to download other threats and show advertisements that are not native to pages. The Trojan.Adject threat may be flagged by AV engines as:

  • Trojan-Clicker.Win32.VB.dn
  • Win32/TrojanClicker.VB.DN
  • SecurityRisk.Downldr
  • MEM:Trojan-Spy.Win32.Agent.gen
  • Malware.UDM!0.BEBCD1E
  • UDS:DangerousObject.Multi.Generic

Trojan.Adject is reported to write files to the Windows directory and add tasks to the task scheduler. The Trojan.Adject program might be found in the startup list on Windows and drop files to the AppData directory. We have seen Trojan.Adject write 'cryptfd.sys' and 'wfcre.sys' to 'C:\Windows\System32\drivers' and 'C:\Users\username\AppData\Roaming\curl.' Also, Trojan.Adject might add 'HKLM\System\ControlSet001\Services\wfcre\wfcre' and 'HKLM\System\ControlSet001\Services\cryptfd\cryptfd' to the Windows registry. That way the Trojan can boot with Windows and potentially circumvent some detection mechanisms. Trojan.Adject might change the Internet settings and register a background service to avoid detection. PC users who notice strange hyperlinked words and experience many browser redirects should run a complete computer scan with a reputable cybersecurity utility and remove the files related to Trojan.Adject safely.

SpyHunter Detects & Remove Trojan.Adject

Registry Details

Trojan.Adject may create the following registry entry or registry entries:
Regexp file mask
%WINDIR%\system32\drivers\knwfd.sys
%WINDIR%\System32\drivers\prilock.sys
SYSTEM\ControlSet001\Services\knwfd
SYSTEM\ControlSet001\services\prilock
SYSTEM\ControlSet002\Services\knwfd
SYSTEM\ControlSet002\services\prilock
SYSTEM\CurrentControlSet\Services\knwfd
SYSTEM\CurrentControlSet\services\prilock

Trending

Most Viewed

Loading...