Security Stronghold threat catalog
Worm | Rat | Trojan | Malware | Adware | Virus | Hijacker | Parasite | Badware | Keylogger | Spyware | Downloader | Dialer | Toolbars | Pop-ups | Ransomware | Rogue Software | Cookies
Threats type: Trojan
Deftesrg.exe XMRig CPU Miner
Dialupass A Trojan
Dllhost.exe *32 COM Surrogate
DNS Changer Trojan
Downloader Agent PWS Trojan
Downloader Autoit E Trojan
Downloader BEH Trojan
Downloader BGQ Trojan
Downloader FWF Trojan
Downloader QwertyBot Trojan
Downloader Tiny AX Trojan
Downloader Tiny FZ Trojan
Downloader Tiny Trojan
Downloader VB AJC Trojan
The term "Trojan horse" or "trojan" came from the story of capturing Troy by ancient Greeks. A malicious program related to trojan masks itself as a valid program and in contrast to viruses doesn’t create multiple instances of itself. Trojan itself is responsible to unauthorized access to the host machine. Hiding behind useful programs trojan performs undisclosed malicious actions. Trojan is the two-faced Janus which makes evil under the mask of good.
There are some functional types of trojans subject to its malicious actions:
Denial-of-service attack (DoS),
Server Trojan (Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.),
Disable security software.
To get rid of all kinds of trojans you may download Stronghold AntiMalware and be sure in your protection.
Security Stronghold threat catalog: 957, current: 181 — 210