GridinSoft Threat Intelligence
Trojan detection reports
Malware disguised as legitimate software or delivered through deceptive packaging.
Detection category
Trojan threat reports
Malware disguised as legitimate software or delivered through deceptive packaging. ThreatInfo groups these records so analysts and users can review related filenames, hashes, and GridinSoft detection names from one place.
Trojan reports focus on files that imitate legitimate software or arrive through deceptive packaging.
Observed detection families
Common Trojan verdicts
These are the most frequent GridinSoft detection names in the latest reports shown below. Repeated families help users recognize whether a file belongs to a broader campaign or bundled software cluster.
Analyst focus
What to check first
For Trojan triage, verify the hash and origin first, then scan the system for related files created at the same time.
- A familiar filename with an unfamiliar hash, publisher, or install location.
- Unexpected network activity, loaders, droppers, or secondary payload behavior.
- Reports where signed metadata and observed behavior do not agree.
Frequent metadata
Publishers and products
GridinSoft Anti-Malware
Scan for Trojan detections
If a file from this category appears on your computer, verify the exact report and run a full system scan. GridinSoft Anti-Malware is used to detect and remove threats listed in ThreatInfo reports.
Use the MD5 value from the report. A filename alone is not enough because unrelated files can share the same name.
Check the publisher, product name, certificate, and file path for mismatches or unfamiliar install locations.
If the file is unexpected, scan the device and remove related startup entries, bundled components, and leftover files.
Recent reports
Latest Trojan file records
Questions
Trojan FAQ
How should I use this category page?
Use it to find recent reports in the same detection family, then open the exact file report and compare the hash, publisher, path, and detection name.
Why can the same filename have different verdicts?
Attackers and bundlers often reuse common filenames, so the MD5 hash and metadata are more reliable than the name alone.
What should I do if a listed file exists on my device?
Do not rely on the filename only. Verify the hash, review the file location, and run a full system scan before keeping or removing it.