A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from the Trojan Horse story in Greek mythology.
Purpose and operation Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.
Operations that could be performed by a hacker on a target computer system include:
Use of the machine as part of a botnet (i.e. to perform spamming or to perform Distributed Denial-of-service (DDoS) attacks)
Data theft (e.g. passwords, credit card information, etc.)
Installation of software (including other malware)
Downloading or uploading of files
Modification or deletion of files
Keystroke logging
Viewing the user's screen
Wasting computer storage space
Crashing the computer
Trojan horses require interaction with a hacker to fulfill their purpose, though the hacker need not be the individual responsible for distributing the Trojan horse. In fact, it is possible for hackers to scan computers on a network using a port scanner in the hope of finding one with a Trojan horse installed, which the hacker can then use to control the target computer.[1]
A trojan differs from a virus in that only a file specifically designed to carry it can do so. http://en.wikipedia.org/wiki/Trojan_horse_(computing)
Follow this instructions to Remove Trojan Virus in you Computer.
Restart You Computer Safe Mode with Networking
1. Log out and reboot your machine.
2. When the machine starts the reboot sequence, press the F8 key repeatedly.
3. Select Safe Mode with Networking from the resulting menu.
4. Login. If the malware has changed your password, try logging in as
Administrator. By default, Administrator has no password.
5. The machine will continue booting, but the Windows desktop will look different.
Then in The Safe With Networking .Download by using Rkill press here http://www.bleepingcomputer.com/forums/topic308364.html
Download and Scan By Using Malwarebytes’ Anti-Malware http://download.cnet.com/Malwarebytes-Anti-Malware/3000-8022_4-10804572.html?tag=contentMain;contentAux
Download and Scan By Using Super Anti-Spyware Press here http://www.superantispyware.com/
Download ATF is a new, freeware, temporary file cleaner for Windows, IE, Firefox and Opera with a simple, easy-to-use interface.
The main screen allows the user to either clean all temporary files, or select files for cleaning. The program also knows if Firefox and or Opera is being used, and gives the option of cleaning the temporary files associated with those applications.
ATF Cleaner provides the user with a window showing the total bytes freed upon completion. The program is small (36kb), quick to run and no installation required. to Download ATF Cleaner press this link http://download.cnet.com/ATF-Cleaner/3000-18512_4-89432.html
Download and Scan By using
Remove Fake Antivirus 1.64 press here http://www.softpedia.com/progDownload/Remove-Fake-Antivirus-Download-127588.html
After Finish Scan and Remove all Virus,Restart you Computer to be Normal.
Then
Download and Scan again By using Norman Malware Cleaner Press here http://www.norman.com/support/support_tools/58732/en This is to make sure you Virus, Malware, Trojan, Worm,
Rogue Fake Anti-Virus, Hijack Web Browser, Pop up Advertisements,
Rootkit and Spyware it is not on you Computer Forever. Please give me the feedback and Rate Me