• Main Menu
  • Trojan Virus

    A Trojan virus is a piece of software designed to look like a useful file or software program but performs a possibly nefarious function once installed on a client computer. The virus takes its name from the “Trojan Horse” from Greek mythology setup outside of the city of Troy. Trojan horse viruses differ from other computer viruses in that they are not designed to spread themselves. Instead Trojan horse malware is either delivered as the payload of another virus or piece of malware or through manual end-user action by downloading infected files or inserting infected drives into a computer. Once a computer is infected with a Trojan virus, the malware can be designed to steal end-user information, perform destructive harm on the target computer, or even download additional computer malware. Trojan horse viruses comprised more than 80% of all computer malware detected in the world over the past year and the number continues to grow.

    What are the Components of a Trojan Virus?

    A Trojan virus will normally consist of a server and client component. The client component is the portion of the malware that infects the end-user’s computer. Once established or executed, the virus can be designed to establish a certain level of control over the infected computer. Based on the desired purpose of the malware author, the client Trojan can deliver additional malware components such as a key logger, spyware, or perform destructive features on the computer.Trojan Virus

    How Do Trojan Horse Viruses Spread?

    Trojan viruses can infect client computers in several ways. One of the most prevalent means of infection is through email attachments. The malware developer will either use a broad email list to spam the virus to a large number of people disguised as a potentially useful attachment or even pornography. Once the user opens the file it will then infect their computer. More recently, targeted spam called spear phishing has been used to target high visibility personnel in business and in government. The same technique of spoofing someone they individuals may know or pretending to be a useful email attachment is used, just with a higher profile potential target set. Another common method used to distribute Trojan viruses is via instant messenger programs such as Skype or Yahoo Messenger. Finally, another well-known technique is to send copies of the virus to all contacts listed in the address book(s) found on the computer after infection.

    What Type of Damage Can Trojan Viruses Do?

    Typically a Trojan virus will be designed to provide some form of remote access to a hacker or criminal on an infected computer. Once the Trojan virus has been installed the hacker will be able to perform tasks on the computer based on the user’s account privilege level. Some of these actions could be: to steal the user’s login and password data, credit card information, or bank account data; using the computer to conduct a denial-of-service attack against another user, company, or organization; installing other software to include additional computer malware; download or upload files on the user’s computer, log keystrokes or take screen captures of sensitive websites; crash the user’s computer; and to web surf in an anonymous fashion. Hackers do not have to directly distribute Trojan viruses; however, as many of the better known malware is designed to infect a computing system and respond to remote commands from hackers who did not originally deploy the malware. The hacker can conduct a scan of computers on a target network and once finding computer’s infected with the desired Trojan virus issue follow-on commands to control the computer.

    What Are the Types of Trojan Horse Viruses?

    In recent years, Trojan horse viruses have significantly advanced in their complexity, methods of infection and payload. The categories currently used to define the different variants of Trojan viruses include: remote access, password sending, destructive, key loggers, password stealers (or senders), denial of service, proxy, FTP, software detection killers, and Trojan downloaders.

    What Does a Remote Access Trojan Virus Do?

    A remote access Trojan virus remains the most encountered Trojan in the wild. This virus will give the hacker/attacker full control over the targeted computer equivalent to the user’s permissions. Once access is gained to the computer, the hacker can then access any personal information the user has stored on their computer to include logins, passwords, credit card numbers, financial statements, and other personal information. Many times, this information can then be used to steal the individual’s identity or to apply for credit card/banking information in the person’s name.

    How Does a Password Sending Trojan Virus Work?

    When a computer is infected by a password sending Trojan virus, the malware will search for all cached passwords and copy those that are entered by the end-user. At preset or scheduled points the Trojan will send the collected information to a preset email or collection of email addresses. These actions are performed without the end-user’s knowledge and the Trojan is particularly dangerous for computers that are not running any type of antivirus software. All types of passwords are vulnerable to this attack to include secure websites, email services, FTP, and instant messaging programs.

    How Do Key Logger Trojans Work?

    Key loggers are a variant of Trojan virus that is designed to record the keystrokes on an infected computer and then send the log files to a remote server or email account. The more advanced key loggers are capable of searching for login and password data and other pre-programmed personal data in the log files to reduce the overhead of the information sent to the remote hacker. Some key loggers are able to record their information online, where the ones that are designed to send the data via email record information offline. To avoid detection, the offline recording Trojan key loggers will send information or daily or longer intervals based on the configuration set by the malware author.

    What Do Destructive Trojan Viruses Do?

    A destructive Trojan virus’s primary purpose is to delete or remove files on the targeted computer. They are designed to attack the computer’s core Operating System files but can also be programmed to remove data. The more sophisticated destructive Trojan viruses will be programmed to attack based on a certain date or logic requirement being met. They can be used in blackmail attempts, although this use is not widely reported (yet).

    What Is a Denial of Service Attack Trojan Virus?

    A denial of service (DoS) attack Trojan virus will be designed to use the infected computer as a bot to attack another web server or computer. Combined with other computers that are infected, the Internet connection for the attacked computer can become too busy to allow regular users to make use of the site. A variation of this Trojan is the Mail Bomb Trojan virus which is designed to infect as many computers as possible while sending potentially malicious emails to all addresses found on the targeted machines.

    How Does a Proxy Trojan Work?

    A proxy or Wingate Trojan virus is designed to make the infected computer act as a Wingate or proxy server. As a result of the infection, the targeted computer can then be used by other to surf the Internet in an anonymous fashion. This is normally used to conduct other illegal activities such as using stolen credit cards to access pornographic websites, shop online, or purchase other websites or domain names.

    What is a FTP Trojan Virus?

    A FTP Trojan virus is one of the most basic Trojan viruses in the wild and is one of the most outdated. The primary purpose of the malware is to open port 21 on the infected computer. Once opened, anyone can then connect to the computer using the FTP protocol. For the more advanced versions of this variant of Trojans password protection is enabled so that only the hacker can gain access to the infected machine.

    What Are Software Detection Killer Trojans?

    A software detection killer Trojan virus is commonly used in conjunction with other computer malware such as scareware. The purpose of this variant of Trojan virus is to disable known antivirus and computer firewall programs. Not only will they disable installed versions of known computer security software, but the Trojan will also preclude installation of new security programs that are well-known. Once they are active, other computer malware can be bundled with the Trojan in order to perform additional malicious tasks.

    What is a Trojan Downloader Virus?

    A Trojan downloader virus is a fairly recent development over the past several years. This version of Trojan is designed to infect a target computer in a similar manner to other Trojan viruses. The sole job that a Trojan downloader does on the infected computer is to download additional computer malware onto the infected computer. Some Trojan downloaders can also be used to grant remote access to the target machine to a remote server or individual as part of their work.

    How to Remove Trojan Viruses

    One of the most frustrating tasks a home computer user will have to do is recover from a Trojan virus infection. The following steps are general in nature, but intended to help the average computer user recover from a Trojan and other computer malware infection.
    Step 1 – Gain access to a non-infected computer that allows you to save files to a CD-R or memory stick. Then, launch the computer’s web browser and download the RKill process killer application produced by Bleeping Computer and save to the portable drive or place in a temporary folder to burn to CD.

    Step 2 – Download the free version of the Malwarebytes antimalware application. If using a portable drive, copy the install file to the drive. One thing to consider is copying two version of each file with the second version being a unique file name such as your first name or something that does not have anything to do with computer security since some Trojan viruses will prevent RKill or Malwarebytes from being installed.  If burning a CD, wait to burn the CD until you have renamed the second version of each file

    Step 3 – Restart the infected computer in Windows Safe Mode if the computer will allow you to do so.

    Step 4 – Copy the files on the memory stick or CD onto the desktop of the infected computer.

    Step 5 – Run the RKill application by double clicking either the primary or alternatively named file icon on the computer’s desktop. RKill should stop all known computer malware processes from executing on your infected computer. Note that RKill can take a few minutes to execute.

    Step 6 – Once RKill finishes executing, turn off Windows System Restore on your computer. To access the System Restore properties, right click the “My Computer” icon and then select the “Properties” menu option. Select the “Turn Off System Restore” menu choice and choose the default menu prompts to complete the action.

    Step 7 – Run the Malwarebytes installation file that you have already copied to the computers desktop. Note that you may need to run the renamed version of this file based on the Trojan virus that has infected the computer. Accept all default menu prompts and then run a complete antivirus scan of your computer’s drives.

    Step 8 – After Malwarebytes has completed running, ensure you select the menu options to remove all infected files discovered.

    Step 9 – Restart your computer after the infected files are deleted and the Trojan virus will be removed.

    Step 10 – After the computer has restarted, turn Windows System Restore back on.

    Step 11 – If you were not running a commercial antivirus program prior to the Trojan virus infection, consider purchasing one from Malwarebytes, Avast, AVG, Norton, or McAfee to prevent future infections.

    How to Protect Your Computer from Trojan Horse Virus Infection

    The best way to defend against Trojan viruses is to take countermeasure to never get your computer infected. To prevent future infections there are a number of prudent measures that you can take to minimize your risk. First, never open unsolicited email attachments contained in received mail. This is one of the most used methods by hackers to infect targeted computers. Next, do not click links that you did not solicit. An increasingly popular method by hackers is to send malicious links out in spam email vice attachments since more users are becoming educated to the threat that email attachments play. If you have not purchased antivirus software and leave it running, you are long overdue. Additionally, ensuring that you run regular updates for your computer’s operating system, installed programs, and leaving the default firewall turned on is another must in today’s threat environment.

    Emerging Trends with Trojan Horse Viruses

    One of the emerging trends with Trojan viruses is the bundling of Trojans with computer scareware. Scareware is designed as a payload of Trojans or Trojan downloaders. Once installed on the target computer it will disable the computer’s antivirus software (if installed), and then proceed to display fake infection warnings to the user. When the warnings are selected, a fake virus scan will be conducted that then entices the user to pay money to download the commercial version of the scareware. If/when they do, the credit card information is then used for nefarious means, money charged, and additional computer malware is downloaded onto the computer. The number of scareware packages numbers in excess of 15,000 and has seen a greater than 500% increase in the past three years. Some scareware will even go as far as to mimic the look and feel of known computer virus programs. Users must use their best judgment in detecting scareware and be leery of any application that tries to charge you money to do its job!

    Videos Related to Trojan Horse Virus

    • hugo

      😐 my computer has a trojan horse what the fcuk am i spose to doo about it or shuld i just fck the cunt up myself ?
      i would also like to know if i shuld kick his sternum and then feed it to my giraffe? i would love for yu to reply but if yu dnt im gna find yu n feed yu to mu HIPPOPOTOMAS !

      • Al

        Had major problems awhile back. Have Norton protection, but….everyone has one sneak in once in a while. After a mate helped me get back and operating, I downloaded “malware bytes” (it’s free). First scan came up with seven (7) Trojans. It then prompltly got rid of them. I now run it every week or so and computer has been clean ever since. Good luck.

    • Daniel Memenode

      To remove a trojan from your computer you should use trojan removers. There are some instructions here and here that might be helpful.

      Please don’t feed me to your hippopotomas! 😆

    • Fifi


      • nina

        If you can, go on the internet and download Malwarebytes’ anti-malware, or AVG anti-virus free.
        They’ll help you get rid of viruses & trojans asap.

    • Charlotte x

      I clicked aomething and i got this trojan thing from it. Ihave a thing on my toolbar that warns me if it detects something suspicious about the page. I was wondering if you could tell me why it didn’t warn me? It tells me every time i’m on the internet. xx thanks 🙂

      • Evelyn Right


            The Trojan horse is designed to look harmless and if it was advanced and high tech enough, it may have been able to trick your computer into thinking it was not a virus. Also, you’re virus detector is capable of changing settings that allow pop-ups right through instead of warning the user. This could be just a freak thing that happens on accident or it can be set that way by a person on the computer. Good luck with your computer problems!

    • Daniel Memenode

      Charlotte, what’s the toolbar? Not all software that claims something really does it well, and there are unfortunately some software which claim to be antivirus software, but are actually just the opposite (trying to gain your trust so they can infect your computer).

    • L.T

      😆 To remove a trojan from your computer you should use trojan removers. x

    • Marygoodgirl

      download the trend micro titanium trial it will delete virus,spyware and cookie.so i help that it will help a lot bye bye 😉

    • kewlio

      ok my friend told me too go too this website(it was po)rn and ended up getting all thses worms and trojans i cant even go on my game wizard 101 it say worm infected this and is trying too send credit card data what do i do!! :sigh:

      • nina

        Um, just don’t go on porn sites?

        Or you could download AVG anti-virus free. lol

    • Thomas Robinson
    • Daniel Memenode

      Originally posted by kewlio: “ok my friend told me too go too this website(it was po)rn and ended up getting all thses worms and trojans i cant even go on my game wizard 101 it say worm infected this and is trying too send credit card data what do i do!! :sigh:”

      Check this article. You can use a malware removal tool to get rid of it.

      Last resort is to backup your data if you can and do a clean install of Windows.

    • Alexia

      Hi umm my computer keeps saying i have trojans but i cant fix it cuz when i try to click on the link it said would help it says i have to pay (the program being My Sercuity Sheild) and i dont have money but the thing is nothing seems to be happening to my computer besides the annoying popups the program keeps sending me whats going on???????

    • Daniel Memenode

      Originally posted by Alexia: “Hi umm my computer keeps saying i have trojans but i cant fix it cuz when i try to click on the link it said would help it says i have to pay (the program being My Sercuity Sheild) and i dont have money but the thing is nothing seems to be happening to my computer besides the annoying popups the program keeps sending me whats going on???????”

      My Security Shield is a fake anti-malware program. It poses as an anti-malware program while itself being malware. There’s a video guide showing you how to remove it. You have appropriate links in the video description.

      EDIT: If you’d like a text version of the guide here is it.

    • Whoareyou

      For anyone that has malware on their computer please download at least one anti-virus software such as avg,avast, or any other free anti-virus and after that is installed run a full computer scan and it should show the infections(if there are any on the computer), after that download Malwarebytes anti-malware for free at any trusting site such as download.cnet.com and after it installs do a quick scan and it should remove any trojans,viruses, or malware completely off your computer.Malware will remove anything that the anti-virus software missed,vice versa.I also had a problem with a fake anti-virus called Security Tool and was popping up threatening message on my screen,so I got rid of the f*cker already with all this.Hope I helped.Good luck

    • Trojan Curer

      If you have norton antivirus, thats all you need…
      1. Press and Hold the power button while browsing through your computer, so it can’t turn its self off.
      2. Next, activate Norton and let it take care of the trojan.
      Job done. Works on me when i had a trojan 😉

      • Lolo

        Not a fan of Norton…

        • techy

          Microsoft Security Essentials did it for me. I had no idea about anything, and suddenly it comes up with a trojan warning, and it allows you to delete the trojan immediately. I highly reccomend using it.

    • Isaac

      Well,i have a kespersky internet wutever and i got 10 trojans which liek Maplestory,Blackshot,cheatengine and som sht,which i used it liek EVERYDAY and i got  a trojan tht atted me so i cant even play for 4 days.Diaoz

    • xoxo_bella

      I have McAfee and I was on the internet not looking at anything bad or stuff like that I actually was on a makeup tutorial site I think and it popped up with a little box and it said it detected a trojan and I had to restart my computer to delete it… which I did of course. Haven’t had trojan problems since.

    • dam

      I have  worms, trojan or virus on my laptop. Anytime am playing audio/video file on my system, it’s automatically trip-of my system after about 5-20mins. What can i do after using an avast antivirus?

      • Will.Spencer

        What do you mean “trip-of my system”?

        • dude waz up

          $20 says he means it crashes

    • allison

      They just attacked my computer for the tenth time in the past hour THANK YOU NORTON!!!!!!!!

    • j

      MY AVG free edition will remove a trojan horse virus

      • Alex

        I have avg anti virus but it will not get rid of the virus and i cant find out why.

        • memenode

          Does it say anything about it at all?

    • Kyle

      My screen is blue and everything I hit says it’s infected. Won’t let ms open anything. And my security didn’t work. I don have money.. For the anti virus and the free windows one was corrupted and executed. It has a huge warning message as my wall paper and everything.. HELP PLEAE!

      • memenode

        Well when you put it that dramatically maybe you should just reformat your drive, re-install Windows and start over. There are some good free antivirus software you can use, and Windows actually recommends some (at least Vista and Windows 7). 

        If you have data you need to backup before reformatting you can try booting from a LiveCD and accessing your drive that way just to copy your data to an USB stick or an external drive.

        • Kyle

          Thanks I’ll consider. Sorry I’ma kid the messages were freaking me out. Is there a way to like download software on a USB from another comp and then transfer it to mine? ( anti virus software) so I can just clear out te viruses and move on?

    • Cloie

      I was trying to download some Jillian michaels workouts and it came up with 22 threats being Trojan horses, worms and one that said bank something. I restarted the pc and it popped up that the threats were cleared but now I can’t access explorer or googlechrome and my boyfriend is away and he is guna kick my ass if I have fucked the pc. HELP!!! :/

      • memenode

        What does it say when you try to access them?

        You could maybe try reinstalling Chrome (from google.com/chrome) and Internet Explorer (from here).

    • liz

      One new type of Trojan that you forgot to mention in your article are the ones traveling on USB drives. I just found out that my flash drive has one from work (it’s a school). >.>
      Since a lot of commentators on this page seem to be kids and teens, they really should be warned about this sort of thing. They’re called “Autorun.inf” viruses and in order to removed them you really need to get the help of an adult or someone who knows how to edit core files.

      • memenode

        Good advice. I added a note about those.


      • dude waz up

        o so im just a kid i see im just a teen ur real nice

      • beth

        i just did a scan and found i have two trojan files. i went to %appdata% to find them but they wont come up in the search, they have to be hidden somehow, but i don’t know how to find them… 🙁

      • beth

        NVM! ^-^ avg just kicked it! muahaha.. Now i feel a tad retarded. o.O

        • memenode

          Nah, you tried and fixed it yourself, which is great. A lot of people commenting on this site don’t even seem to be doing that much. They just expect someone to magically solve their problems for them while they don’t even bother to do as much as read existing solutions.

    • dude waz up

      i have norton but my internet (google to be exact) detected Trojans and found the files they were hiding in i want to now if i should trust this info im running a diagnostic (actually 3) right now but its just popping up with the same thing (a tracking cookie) … what should i do do i turst google or what?????

      • memenode

        I’m not sure what you mean by Google detecing the trojans. How does this look like? If Norton doesn’t detect anything I’d say there’s nothing there. Sometimes there are scams on the net telling you that you have viruses and trojans just to get you to click on something that might be actually dangerous.

    • katy

      So I was on mozilla looking for spring break clothing essentials. And I tried getting on seventeen mag website and something popped up and hacked my computer! My dads gonna FREAK:/ I’m running SUPERAntiSpywear free edition right now and it has 372 threats so far. System alerts keep popping up telling me trojans have infected my comp and “security hole detected” will the super anti spywear delete the trojans and other virus?? PLEASE HELP!

      • memenode

        I don’t know what’s giving you all these threat alerts, but to check and clean up your computer from viruses, trojans and such you need more than an anti-spyware tool. You should get an anti-virus program like AVG, Panda etc. 

        Keep in mind some sites will pop up with messages saying you’ve been hacked and have threats and security holes and whatnot, just to get you to click the ad and install something, but they are lying and trying to scam you. If that’s what you are seeing the best thing to do is ignore them. Get an anti-virus, do a scan, and if it finds anything quarantine or delete it and that should be it.

        • Andew

          Yes, I have used AVG for about 5 years now! And I have never got a virus! But I have got threats, but they clear them  in a mater of 10 sec!

    • Gladys Greene

      Search it on Google on how to get rid of Trojans. There are available antivirus software to download.

    • Kyle

      I got rid of mine by going in windows safe mode with networking ( from boot up) and download avast. Restart your computer after following it’s instructions and let avast clean it up.( before windows is actually launched) don’t go norton or avg or mcafee. Avast is the only one that seemed to work. Take the 30 day free trial. . Then after you can get another 365 day free trial. Just got 1 year and 1 month protection free.

    • James

      hi what should i do if i get a virus

    • Gretchen

      My AVG just came up with 3 trojans (trojan horse generic22.BCIP) in three different places.  Two of the places AVG said it could not access those files.  Anyone have a suggestion on how to get it out of places that can’t be accessed?  I’m not very computer literate… 🙁

    • help

      msn-en az egyik haverom küldött egy linket.
      nem tuttam mi ez, és rá mentem.
      többször is, mert nem hozott ki semmit, és idegesített.
      a barátaim mondták h mi ez mi ez?
      és mondtam h mi?
      mondták h küldtem nekik egy linekt.
      de én nem küldetem senkinek sem.
      ez volt az a link amit a barátnőm küldött nekem is.
      és mondták h biztos egy virus.
      mondtam hogy aha lehet.
      az egyik barátnőm mondta h lehet h a troján.
      és rögtön ki hozta a virus írtóm azt h virus van a gépen, és ez a troján.
      mit csinájjak??
      semmit sem tudok a virusokról, főleg nem a trojánról.
      csak annyit h nagyon nehéz kitörölni a gépből.

    • beth

      yeaaaaaaaa it is so not that easy. ^-^ Finding it is half the trouble. >:(

    • Libby

      My roommates mcAfee found a trojan and deleted it from her computer but now she can’t get onto the Internet or into her windows email? She also can’t log into her email through her phone. We’ve tried rebooting and reinstaling the modem/router for her, but still nothing. Any help would be greatly apprecaited!

    • Derek

      Just switched antivirus software  from VET, (which I have been with for years) to McFee. The first scan picked up a Trojan straight away (also identified it). Q. Why would VET miss this?

      • Marlon Franco

        Maybe your VET’s virus definitions aren’t up to date. Good thing Mcafee was able to detect it. Make sure to update Mcafee’s virus definitions too. Thanks

    • mmkshmul

      I need a trojon virus. How can i get it?

      • Marlon Franco

        is this a joke. Why would you like a trojan virus on your machine? This will certainly harm your computer

    • Stella

      I got one on my and my bf’s laptop and it affected my 1t harddrive. made all my files on the hard drive shortcuts and now I cannot access any of my files!! A friend suggested that he could format all 3 these infected items. Do you think it’s wise?  He cannot find the source of the Trojan, he tried everything!!

      • Marlon Franco

        can you ask your friend to give us a background on what he has done to fix the issue? Maybe we provide further troubleshooting.

    • AZ007

      None of my programs are working…not even my AVG..the only way I can open my firefox is by reinstalling it from the downloads file and launching it…can someone help me? before all this happened an alert popped up and said something about a trojan horse, I closed it not sure what it was and then nothing on my computer works….help

      • Marlon Franco

        Use an anti-malware program, you might want to try Malwarebytes to scan, clean your HDD from malwares/viruses

    • nick

      its written on the ftp trojan section

    • mary jane

      why is it name Trojan horse?and some virus name
      zeus virus??just wanna know why..

    • Richard

      Advanced system care-Malware function-shows various trojan files including a backdoor file, but accespts the files as ok.

      any advice?

    • Richard

      Sory-wrong email address

    • Richard

      When I use Advance System Care, the Malware feature, it shows a number of trojan files including a backdoor file. The computer appears to be functioning ok but has some problems with a few programs. When the Malware portion of Advance System Care runs, it passes the trojan files as ok.   Please advise.

    • val

      AVG identified a trojan horse, but when I say to remove it the system warns me that removing could make my system crash.  I don’t know if it is safe or not.  I thought maybe it says that for every find no matter what it is.  How can I decide if I should remove it or not?

      • Marlon Franco

        Can you get the file name of the said file?

        • val

          I will see and get back to the post with it.  Thanks

          • val

            “”;”C:\Program Files\SIFXINST\VISTAMHDC4.5.EXE”;”Trojan horse Generic4_c.ALZA”;”Infected”

            • Paula C. Benoit


              I just found this same problem on my computer “C:\Program Files\SIFXINST\VISTAMHDC4.5.EXE Trojan horse Generic4_c.ALZA Infection”.

              Right now my AVG Anti-Virus Program has it stored in the “Virus Vault”.  In fact when AVG found it my computer froze during the computer scan.

              I found your website while doing a search via Google and read this post.

              This is the first time I have ever had any problem with trojan horses, virus’, etc. ad I do not know what to do about it.

              Did you by any chance figure out what this is and how to get rid of it.

              Thank you for any information you have on this.


    • john mendez

      email me this info please!

      • valerie

        emails per your request

    • Paula C. Benoit

      I just found this same problem on my computer “C:\Program Files\SIFXINST\VISTAMHDC4.5.EXE Trojan horse Generic4_c.ALZA Infection”.
      Right now my AVG Anti-Virus Program has it stored in the “Virus Vault”.  In fact when AVG found it my computer froze during the computer scan.
      I found your website while doing a search via Google and read this post.
      This is the first time I have ever had any problem with trojan horses, virus’, etc. ad I do not know what to do about it.
      Did you by any chance figure out what this is and how to get rid of it.
      Thank you for any information you have on this.

    • keith

      Has anyone found out how to remove this trogan without damaging your computer? If so please email me back.

    • hur

      Hi, I have a Trojan Horse Hider.mpr (vddqduhj)
      and have no idea how to get rid of it. It’s making my laptop incredibly slow, and won’t let me run msn. When I try to move it to the virus vault (avg), it says the file is inaccessible. Any help in getting rid of it would be really appreciated :/

      • Marlon Franco

        Ok, make sure your AVG’s database or it is at its latest version. Try to scan again, and if the AVG can’t remove it, just let me know

        • tom

          hey, i have just descovered i have a trojan horse virus and i think it might be in “my computer, vista, windows” but im not to sure. i think i might have downloaded it with a client called curse. its a world of warcraft add on.
          i have had a look at your guide but im still very confused with this and would like some help
          hope to hear from you soon
          please may you email me: tom.holroyd@live.co.uk

          • Marlon Franco

            OK. Make sure to scan your PC using your antivirus software. If it does not work, download and run trojankiller – this can be downloaded for free.

    • Pamela

      Help please. My AVG detected this

      File Name c:/windows/assembly/GAC_MSIL/Desktop.ini
      Threat Name Trojan Horse BackDoor.Generic14.AVBQ

      Since then every time I use any search engine, I am redirected to
      another site. The address raresearchsystem.com is something I commonly see at the bottom.

      Also since then. AVG has acted goofy. It is detecting components of AVG as viruses and even my photoshopelementsfileagent as a threat when it has been on my computer for a long time. This all started when the mentioned trojan was detected and when I chose to place the trojan into the AVG vault.

      In desperation, I purchased the AVG 2012 and now it won’t install. My current one won’t install either. I tried removing all old components and nothing works…

      • Trevor

        This may be coming late but it may help someone else.

        Trojan Horse BackDoor.Generic14.AVBQ does more than redirect.  Check your internet connection.  You’ll probably find that the Status indicates you are uploading megabytes of info.  Ie. Someone is stealing your critical data eg. banking info.

        I found I couldn’t erase c:/windows/assembly/GAC_MSIL/Desktop.ini (even though I could replace other infected files) and leaving it on appeared to result in the re-infection of the other replaced files.

        Try this:  Download tdsskiller from Kapersky.  Run it.  It found redbook.sys and sptd.sys to be infected and took care of them.
        I then found that I could erase GAC_MSIL/Desktop.ini.  And using a spare XP drive as my master, copied good files over the infected files.

        AVG10 (AVG 2011) was used to detect the infected files but it itself showed infection.  So I erased it and downloaded AVG 2012.  Note: That I had to kill the infection before I could download AVG 2012 because it’s 60 MB in size and the virus while active takes uploading-downloading precedence.

    • Linda

      Hi I ran a scan on my computer because it was hanging alot and certain things wouldn’t load. I have Clamwin and it detected trojan Horses in my java Web Start and 2 other areas. How do I remove these? I have been looking it up, I haven’t found anything useful. If you can help I thank you.. 

    • DaLt0n

      Hello to everyone, some days before i did a computer scan with my antivirus and a Trojan Horse Virus was founded. I hope to delete it but now when i download some praograms and i try to install them or to run them, it appeared an error:

      ? s??ta??t?? ???μat?? a??e???,t?? ???μat?? ?ata????? ? t?? et???ta??
      t??t?μ??e??a? esfa?μ???.
      What’s going on here? Is that problem of virus or something else?

    • STrivette

      … a Trojan Virus?… Now, there are Trojan Horses and there are viruses, but there’s no such thing as a Trojan Horse virus. In fact, the very definition of each precludes any chance of there being such a thing. A Trojan does not replicate. Viruses do. That fact alone means there can never be a “Trojan Horse virus” or “Trojan Virus”. I am seeing people more and more calling a Virus a Trojan Virus. 🙁

      • somguy

        this is what we call being too picky… what most everyone is trying to say is that some inconvenient program is on their computer. vernacular (especially if you are familiar with the issue’s properties) becomes nothing more than a trivial label when the proverbial crap hits the fan.

    • Suzee

      I have just had a warning on my anti virus about Trojan Horse Hider.OLM  I cant find any information and when the HEAL option is initiated it states that it has been interrupted by user…………. Any ideas?

    • Joanna

      Hi! I have the same problem as Suzee :/ I’m using free AVG Anti-Virus. I can’t do anything with that Trojan Horse Hider.OLM. Could you please help me to remove the bastard from my comp?

      • Rich

        looked at trying to remove the same Trojan Horse which was picked up by AVG ,can someone stear me/us  in the right direction ?

    • dude

      any info on this trojan?   Trojan:JS/Iframe.Z

      i seem to have gotten rid of it by starting windows in safe mode,then running two separate antivirus programs,but im still leery. is it really gone,or is it just fooling my firewall? 

      • Marlon Franco

        It’s most likely gone if you have used to 2 AVs already to get rid of it. But hey, make sure to check for symptoms.

        • dude

          seems to be working fine so far…no lag,warnings,or popups. anything specific i should watch for?

          • Marlon Franco

            You might want to check task manager and see if there are suspicious processes running from the background. Please monitor the CPU Usage it should not be spiking anywhere between 20-90%. Thanks

            • rhea

              so if it is spiking between 20-90 does dat mean i have trojan because my laptop- cpu usage is most of the time between 20 and 90

    • ello

      um well my computer recently got infected with a ‘backdoor trojan’.
      I believe my computer got infected when i inserted my friend’s z-drive into my computer. I have a Norton Security thingy on my computer and it said that backdoor trojan was detected in my computer and right underneath it said to click a link that took me to a norton site and it said to download this thing that is suppose to find and kill this virus. However, after i downloaded it and ran it, it said that no trojan backdoor was to be found. I then did a full system scan with my norton security thingy and the only thing it found and removed were tracking cookies and some cloud thing. I then looked at the virus records and it said that it encountered trojan horse and backdoor trojan several times over the course of 4 months. Now im stuck trying to figure how this virus even got to my comp, after being frustrated that two of my securtiy systems arent detecting it, i downloaded another trojan killer[stopzilla]. After downloading it, it said it would run after restarting my computer. After i clicked restart my computer, the computer restarted halfway. It froze. So, i turned it off and turned it back on and it said that there was an error and it was most likely due to a new download. so then i click start windows normally and log in. I then wanted to see if this trojan horse is even in my computer since two of my security thingies didnt pick it up after i did two full system scans; so i clicked msn once and two internet windows opened. One window took me to my home page and the other was some ad that had a letter of the alphabet [C] with a picture of a car and the definition. I exited out of the ad one.  I then went to google to see if the trojen horse is really still there and it redirected me to another ad site. finally after the 3rd try it took me to google. i searched something and clicked the link and it took me to the site i clicked on for a second or two and then on the url it said hop1, than it said hop2 and than, i find myself on ANOTHER AD SITE! i want this virus gone 🙁 i dont want it taking my passwords and etc. since the day i found out i had the virus i was already logged into 3 different things. and i logged into facebook 3 minutes later[being unaware that i had the trojan virus] because i did not click on the notification box thingy when it first detected it because i did not know it detected a virus. so please please please please help me!

      • Marlon Franco

        Download Malwarebytes, Rogue Killer, PureRa over at http://ninite.com/ and see if these apps will work. If not, try to download and use trojankiller and Hitman Pro! These apps are all FREE by the way.

    • Jessica

      My AVG 2012 has detected trojanhorsehider.ovf. I have looked online and not found anything about this. My AVG has not put in virus vault says it is whitelisted and should not be removed. Also I already had Malware installed on my laptop under a different name and ran that and it is not detecting it. Any suggestions? Please help!

      • Marlon Franco

        Try using MalwareBytes Jessica, it is a reliable malware program!

    • Skamila

      My laptop was infected yesterday night when I was searching some Online Marketeting Firm website (as I am building my own now. Came from a Website name was marketingwisepublishing.com (?? I did not remember clearly).
      I had AVG 2012 trial running and it detected Trojan generic…..(rest I forgot). I then did full scan with AVG and locked the Trojan to Virus Vault in AVG. Then I uninstalled AVG and installed my Norton 360 (which I just purchased few days back) and ran it for full scan. It showed nothing. My all desktop icons were gone and none of my drives were opening, no programs were working, no CD/DVD/USB drives were responding. I tried to restore my system to a back date but my restore system was turned off and I was not able to open any of my files and folders. I Googled and with their information I reboot my PC in a safe mode etc but it did not work.

      I Googled for more information on how to make sure my laptop is free of the beast and how to get back everything. I found many people recommending Malwarebytes so I downloaded it and ran. It detected 12 problems, 7 of them were in Registry Key (Hijack….something) 3 from C drive and 2 from other places. It also said it repaired and deleted them successfully.

      Then I again Googled on how to get back all my icons and folders and files. I knew they were there as I found them in searching and in Control Panel but looked like they were hidden. According to pcbleeping.com or something similar recommendation–i downloaded unhide.exe and ran it and instantly found all my desktop icons back. Still i was missing all my programs in Start menu. I again tried another recommendations and downloaded two programs which gave me back my Accessories folders in my Start menu but I am still missing all other programs in my Start Menu-Programs-… Notepad, Pdfcreator, Microsoft office, skype, Realtime, quick, iTunes, IntervideowinDVD, GIMP, Games, Ccleaner, AT&T, system check——-these all are still showing Empty. How can I get them back?

      I still feel uncomfortable to open my personal accounts and all emails etc. I have AT&T net connection and Norton 360 plus Malwarebytes running. Is it now safe to use everything as I again ran Malwarebytes today morning and found nothing plus my Norton 360 found nothing for full scan (Norton is less reliable as yesterday it said nothing and Malwarebytes found 12 threats.)
      Is it require to do anything else to make sure 200% everything is gone? i checked Task manager—it shows nothing extra running and CPU bellow 20%.
      Is it ok to do all my staff on this machine?
      How to get back all my Start menu programs?
      Also best suggestion on how to avoid further infection.
      Any help would be appreciated. Thank you so much

    • Jeff Hinish

      Its like you read my mind! You appear to know a lot about this, like you wrote the book
      in it or something. I think that you could do with some pics to drive the message
      home a little bit, but instead of that, this is great blog.
      A great read. I will definitely be back.

    • wisin

      2 things that u well never be infected 1:’active antivirus 2:” scan pc 3 times in week and always scan when u download

    • pam

      is this for how trojan virus spread in microsoft windows operating systems?

    • Zeth Austin

      How do i send a remote access virus?

    • Snap

      my desktop keeps changing and my computer is running slow, I have ran about 4 or 5 diffefent types if scans and they all say its clean yet just today when I was running a scan a window keeps trying to open to my bank logon page.
      Help is someone trying to steal my bank info? I continue to close it and it reopens. I ran tdsskiller from Kapersky, and it said nothing.

    • Hiba Smaily

      Today i installed a winrar software or something like that (the link was sent by someone) on my laptop, few hours later porno videos started appearing on their own and played on my windows media player and even vlc player. Also google chrome started opening porn pages by itself. I immediately knew that the software i installed before was the cause and i uninstalled it, and i permanently deleted the install file. Also a warning appeared from avast that the winrar file that i uninstalled had 2 files still present on my computer and that i need to upgrade avast to remove them(which of course i have to pay for that) so i didn’t upgrade. Also i noticed that after i removed the software the porn stuff stopped appearing. And i want to note that before uninstalling the software i noticed that if i disconnect the laptop from the internet the videos stopped popping. I want to know 3 things now: was the virus deleted when i uninstalled the “winrar” application? Second question is, will the videos appear if i leave my computer without conneting it to the internet. Third question: if i connect my phone to the laptop will it get infected? I hope you answer my question and thank you in advance.

    } 248 queries in 0.918 seconds.