{"id":4450,"date":"2018-05-03T17:15:39","date_gmt":"2018-05-03T11:45:39","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=4450"},"modified":"2020-08-21T13:41:43","modified_gmt":"2020-08-21T08:11:43","slug":"what-is-trojan-horse-virus","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/","title":{"rendered":"What is a Trojan Horse Virus? And How to Remove Trojan Virus"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3082 aligncenter\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/02\/Fake-Trojan-Flash-Security-Update.jpg\" alt=\"Trojan Horse Virus\" width=\"650\" height=\"300\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/02\/Fake-Trojan-Flash-Security-Update.jpg 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/02\/Fake-Trojan-Flash-Security-Update-300x138.jpg 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/02\/Fake-Trojan-Flash-Security-Update-225x104.jpg 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>Trojan horse is a type of malware created by hackers to look more like a legitimate software. It attaches itself to genuine files that are downloaded from the internet. Trojan horses find their way to the victims\u2019 system through some social engineering tricks to load and run the trojans on the victim\u2019s system. Once the Trojans find its place, it empowers the hackers to extract users\u2019 information without their knowledge and creates a backdoor for them to gain granular access to the system.<\/p>\n<div itemtype=\"https:\/\/schema.org\/ItemList\">\n<h2 itemprop=\"name\">How Trojan horses Perform<\/h2>\n<ol itemprop=\"itemListOrder\" href=\"https:\/\/schema.org\/ItemListOrderAscending\">\n<meta itemprop=\"numberOfItems\" content=\"5\" \/><\/p>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"1\" \/> <\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Delete Data<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"2\" \/> <\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Modify \/ Alter Data<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"3\" \/> <\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Block Data<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"4\" \/> <\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Copy Data<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"5\" \/> <\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Interrupts the regular performance of the system or networks<\/li>\n<\/div>\n<\/div>\n<\/div>\n<\/ol>\n<\/div>\n<p>Unlike viruses, Trojan horses are not created to spread themselves in the infected system, however, it is downloaded either as a payload of some other virus files or as a malicious file from the internet. Other than stealing the users\u2019 information from the infected system, it can also download malicious content onto the infected system. Traditional anti-viruses are not much effective to shoo away the Trojan horses, hence removing trojan horses manually come in handy.<\/p>\n<div class=\"article\">\n<div class=\"article-content\">\n<h2>Follow the simple steps to remove the Trojans manually<\/h2>\n<\/div>\n<\/div>\n<p><strong>Identify the Trojan<\/strong> \u2013 once the <a title=\"Trojan Horse Definition\" href=\"https:\/\/enterprise.comodo.com\/trojan-horse-definition.php\" target=\"_blank\" rel=\"noopener\">Trojan horse<\/a> is identified from an infected file, it becomes easier to remove the Trojans. When the system is infected with the Trojan attack, it gives a DLL error. You can further do a research on the affected .exe file online.<\/p>\n<p><strong>Terminate the system restore function<\/strong> \u2013 this is to avoid the system from restoring files that are already deleted.<\/p>\n<p><strong>Restart the computer<\/strong> \u2013 Press F8 and then choose the safe mode to start the system<\/p>\n<p><strong>Add or Remove Programs<\/strong> \u2013 This option is available in the control panel, users can remove trojan infected programs.<\/p>\n<p><strong>Remove the extensions<\/strong> \u2013 This is done by deleting all the program files from the Windows System folder.<\/p>\n<p>Sometimes, Removing a Trojan Horse from the infected system manually cannot always be the right option. So it is essential to equip the system with a future-proof antivirus or a <a title=\"Virus Protection\" href=\"https:\/\/antivirus.comodo.com\/virus-protection.php\" target=\"_blank\" rel=\"noopener\">virus protection<\/a> software to help users stay ahead of trojan attacks.<\/p>\n<p>Comodo Internet Security provides the user with smart and robust protection techniques that help any individual or an organization with <a href=\"https:\/\/antivirus.comodo.com\/free-antivirus.php\" target=\"_blank\" rel=\"noopener\">virus removal<\/a> and to stay ahead of threats. It features containment technology to run any unknown files in a virtual environment to ensure hassle-free user experience, integrated firewall to filter out the threats from entering the system, effective cloud-based <a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-windows-7\/\" target=\"_blank\" rel=\"noopener\">best antivirus<\/a> to scan, detect and remove the known threats, Spyware scanning, Secure Shopping, Live Virus Removal, and Defense + Technology which works together to drive away any possible trojans from entering the system. This security product from Comodo is user-friendly, not just for tech-savvy but also for regular PC users. This security system is efficient as it integrates multiple security technologies all in one product.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&amp;track=16678&amp;af=16678\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\" \/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resources<\/strong><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/five-best-virus-and-malware-removal-tools\/\" target=\"_blank\" rel=\"noopener\"><strong>Best Virus Removal Tool of 2019<\/strong><\/a><\/p>\n<p><strong><a href=\"https:\/\/webinspector.com\/website-malware-scanner\/\" rel=\"noopener\">Website virus checker<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/website-status-checker.php\" rel=\"noopener\" target=\"_blank\">Website Status<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trojan horse is a type of malware created by hackers to look more like a legitimate software. It attaches itself to genuine files that are downloaded from the internet. Trojan horses find their way to the victims\u2019 system through some social engineering tricks to load and run the trojans on the victim\u2019s system. Once the [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":1500,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[26,97],"class_list":["post-4450","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comodo-news","tag-malware","tag-virus-removal"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Trojan Horse Virus? | How to Remove Trojan Virus from Computer<\/title>\n<meta name=\"description\" content=\"Trojan horse virus is a type of malicious software. Once installed, it helps the hackers to extract user\u2019s information. Know more about trojan horse virus!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Trojan Horse Virus? | How to Remove Trojan Virus from Computer\" \/>\n<meta property=\"og:description\" content=\"Trojan horse virus is a type of malicious software. Once installed, it helps the hackers to extract user\u2019s information. Know more about trojan horse virus!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-03T11:45:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-21T08:11:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_14.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"170\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/\",\"name\":\"What is Trojan Horse Virus? | How to Remove Trojan Virus from Computer\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_14.jpg\",\"datePublished\":\"2018-05-03T11:45:39+00:00\",\"dateModified\":\"2020-08-21T08:11:43+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Trojan horse virus is a type of malicious software. Once installed, it helps the hackers to extract user\u2019s information. Know more about trojan horse virus!\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_14.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_14.jpg\",\"width\":225,\"height\":170},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Trojan Horse Virus? And How to Remove Trojan Virus\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Trojan Horse Virus? | How to Remove Trojan Virus from Computer","description":"Trojan horse virus is a type of malicious software. Once installed, it helps the hackers to extract user\u2019s information. Know more about trojan horse virus!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/","og_locale":"en_US","og_type":"article","og_title":"What is Trojan Horse Virus? | How to Remove Trojan Virus from Computer","og_description":"Trojan horse virus is a type of malicious software. Once installed, it helps the hackers to extract user\u2019s information. Know more about trojan horse virus!","og_url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2018-05-03T11:45:39+00:00","article_modified_time":"2020-08-21T08:11:43+00:00","og_image":[{"width":225,"height":170,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_14.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/","url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/","name":"What is Trojan Horse Virus? | How to Remove Trojan Virus from Computer","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_14.jpg","datePublished":"2018-05-03T11:45:39+00:00","dateModified":"2020-08-21T08:11:43+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Trojan horse virus is a type of malicious software. Once installed, it helps the hackers to extract user\u2019s information. Know more about trojan horse virus!","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_14.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_14.jpg","width":225,"height":170},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/what-is-trojan-horse-virus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is a Trojan Horse Virus? And How to Remove Trojan Virus"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/4450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=4450"}],"version-history":[{"count":27,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/4450\/revisions"}],"predecessor-version":[{"id":15149,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/4450\/revisions\/15149"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/1500"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=4450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=4450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=4450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}