How to Remove Trojan Virus from Computer

Level of difficulty: Intermediate

In a traditional sense, a Trojan or Trojan horse is a type of computer application intentionally designed to mislead the user into thinking that it is a useful or innocent program but in reality, it executes some type of malicious action without the user’s knowledge or opens an unauthorized access port to the infected machine. These types of security threats are often deployed by hackers as part of an initial attack on a targeted computer system in an attempt to weaken its defenses and provide the attacker with a way of introducing more threats into the infected machine. The manual removal of these types of security risks is normally tedious and often dangerous because of the possibility of corrupted file components that may leave the computer system inoperable. To remove these threats from the infected machine, updated anti-Trojan program is required. This should be capable not only of removing the source of the threat but also file components.

Materials Needed:
- Anti-virus application
- computer
- Operating System installer
- backup files
Step 1
Since these threats normally remain active in system memory, the initial step is to restart the computer system in order to clear the memory of any resident processes. If the protection software is capable, reboot the machine in Safe Mode.
Step 2
Start the protection application and initiate a scanning of the entire system including the system memory. Make sure that the automatic healing (when applicable) is disabled.
Step 3
When a threat is identified, the security program will normally prompt the user for a preferred action like delete, quarantine, or repair among others. Normally, Trojan components are very similar to legitimate Windows system files so choose accordingly.
Step 4
Have the installation CD of the Operating System handy in case any of the system files need to be reinstalled due to corruption or infection. These system files are normally stored under the i386 folder in the CD installer.
Step 5
After completing the scanning and cleaning process, exit the security program and restart the machine allowing it to load in normal mode.
Step 6
When the desktop appears, remove the contents of the Recycle Bin by right clicking it and choosing the option 'Empty Recycle Bin'.
Step 7
Click on the 'Start' Menu and right click on the 'My Computer' icon and select the 'Properties' option. Select the 'Turn off System Restore' option in the 'System Restore' tab and click 'Apply'. Click on 'Yes' and then 'OK' to confirm the action. This is done to prevent the possibility of reloading the Trojan that may have been saved in the System Restore points of the machine.
Step 8
Update the virus definitions of the protection software by connecting to the Internet. After completion of the update process, rescan the machine in normal mode to make sure that any remaining Trojan components are deleted.
Step 9
Restart the machine to complete the process. Remember to keep the definition database engine of the protection program updated to prevent any future infections.