Trojan.Modified
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 90 % (High) |
Infected Computers: | 5 |
First Seen: | September 27, 2013 |
Last Seen: | June 12, 2022 |
OS(es) Affected: | Windows |
If your anti-virus program is displaying a Trojan.Modified infection, this typically means that it has detected a potentially unsafe file that is exhibiting suspicious behavior. The Trojan.Modified detection is used by Microsoft Security Essentials, Norton Antivirus and several other anti-virus programs. Usually, files detected as Trojan.Modified are not guaranteed to be unsafe since it contains features or exhibits behavior that is commonly associated with several kinds of threats.
Trojan.Modified is a generic detection that may be very broad. Anti-virus engines will usually have measures in place that allow them to detect threats that are not entered in their databases but that exhibits behaviors or possess characteristics that have been associated with malware. This is due to a feature used by many advanced security programs known as behavior monitoring that may classify certain files as potentially threatening. When a particular memory process is exhibiting behavior that could be potentially unreliable, the security program may display a Trojan.Modified detection or several other similar types of detection names.
Since the Trojan.Modified detection is generic in nature, a broad spectrum of malware programs may fit this description. These types of infections may install themselves or may copy their executable file to system folders and then make changes to the Windows Registry to start up automatically when Windows starts up. This is accomplished by modifying the HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run registry key. Some other characteristics that may trigger a Trojan.Modified detection include the following:
- Redirecting online traffic and forcing your Web browser to visit specific Web pages.
- Make unauthorized changes to certain Windows or application configuration settings.
- Installing other programs on your computers.
- Attempting to connect to a remote server and download and run a remote file.
Some Trojan.Modified Detections May be False Positives
Not all files that are reported as Trojan.Modified may be suspicious. Some may be classified as PUPs (Potentially Unwanted Programs) and are Web browser toolbars that are used to generate advertisement revenue by freeware developers. Other programs detected as Trojan.Modified may be harmless files that have flaws that may be exploited due to poor coding or development. If your security program is insisting that a particular file is a Trojan.Modified infection and you are unsure on whether Trojan.Modified may be a false positive, ESG security researchers advise submitting this file so that PC security researchers can ascertain whether Trojan.Modified is unsafe or not.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.