~~ Click To Learn More About ~~
How To Change Your Life In 124 Days
By their very nature trojan horses virus are difficult to find but how to remove trojan is not too hard. Unlike viruses they will not corrupt files or delete things you might notice, they do their best to stay out of sight and avoid detection. That said, they are pieces of software and no software can run on any computer without leaving some trace of its existance. Below I will cover three basic trojan removal tools that will uncover the presence of the majority of trojan horses. None of these costs any money, in fact two of them are already installed on every windows computer!
You may be familiar with the Task List that appears if you press CTRL+ALT+DEL within windows. This is supposed to be a list of all the programs running on your computer at the second you pressed those keys - it is not. For reasons best known to themselves Microsoft hid a great many processes from display in the task list, possibly to avoid confusing novice users. In doing this, they gave trojan writers the perfect tool to hide their own creations from your view as well.
Less well known is the System Information Utility (msinfo32.exe) that hides in the C:\program files\common\microsoft shared\msinfo folder on your disk. This tool can uncover almost every process that is running on any windows system, even those that are "hidden" from the task list. Better yet, on windows 98 & ME the same tool provides an easy way to selectivly disable any suspect processes at the next reboot. To use this when hunting for trojans, look down the task listings for running tasks & services for any which you do not recognise. Check the paths and filenames. Check the file properties and run the executable or .dll through your virus scanner.
If you find nothing but still are not sure of the trojan removal, use the Startup Programs editor in the tools menu to disable the process then reboot your machine (make a backup of your system files first!). If nothing complains, leave the process disabled for now and carry on looking at the others. Eventually you will have only those processes you really need running on your machine which will have the benefit of not only killing off any trojans but also making your PC seem more responsive and generally quicker to start up.
All trojans need to communicate. If they do not do that they are useless for their intended purpose. This is the second major weakness of most trojan horses, their communication leaves a trail you can follow to remove the trojan.
The Netstat command lists all the open connections to and from your PC and are great to remove trojans. To use it, open a DOS box and enter the command netstat -an this will list all the open connections to and from your PC, along with the IP address of the machines on either side. If you see a connection you do not recognise, you need to investigate it further and track down the process that is using it. For this you need the third tool in the armoury, TCPView.
TCPView is a free utility by Sysinternals which not only lists the IP addresses communicating with your computer, it tells you what program is using that connection. Armed with this information you can locate whatever program is sending data out of your machine and deal with it. I recommend renaming the offending file then rebooting - that way if you make a mistake you can put it right easily.
Trojans often modify the startup files of your computer, add or change lines in the system registry and even overwrite system files to make sure they are run every time you boot up. For that reason, removing them by hand takes time, patience and an understanding of what you are doing. It is fraught with dangers, including trashing your registry or loosing the ability to run programs so it is definetly not for everyone - even those who know exactly what they are doing often prefer to use automated tools when removing a trojan horse.
Each trojan has its own specific removal routine, see the Cleaners & Fixes pages for details on those. They do however all conform to the same basic patterns:
The steps involved in removing a trojan are simple: