The Trojan has many functions, such as controlling a remote computer, obtaining other people's Internet accounts, hacking, and more. Most often, people themselves do not suspect that this program exists on their computer, since they download it themselves, mistaking it for harmless, and sometimes useful. It is difficult, but necessary, to detect and cure a Trojan.
Instructions
Step 1
Decide on the type of your Trojan, that is, understand what exactly is going wrong. There are three main types of Trojans. The first is Mail Sender, which independently connects to the accounts of Internet services (mail, ICQ, etc.) and sends the same Trojan to everyone on the contact lists. With its help, another person can read your mail or withdraw money, for example, from your electronic account. The next one, that is, Backdoor, has approximately the same functions, only with its help you can almost completely control a remote computer. For example, delete or upload files. Finally, the last one is the Log Writer, which reads all the information entered from the keyboard and writes it to a specific file, which will later be transferred to the Trojan's host. The meaning is roughly the same as Mail Sender. Do not forget that Trojans are not limited to three types, these are just the main ones!
Step 2
Find the RegEdit program on your computer (just enter its name in the start-up or look at the address c: windowsRegEdit.exe).
Step 3
In the registry, look for directories such as soft, windows, run, runonce and others for suspicious exe files. In which section to search for a trojan, what you did in the first paragraph will help you - determining the type of trojan. If you are afraid to delete files, then just rename them and see what has changed.
Step 4
If cleaning the registry did not help, then you can use the XRun or CTask utilities, which will give complete information about the programs currently running. You can also look at the task dispatcher, but this can be ineffective.
Step 5
So, in the fight against a Trojan, the main thing is attentiveness and caution. Be extremely careful with your work on the network and use high-quality antiviruses so that you do not have to treat your computer.