If you have ever had a computer problem, at some point the thought that it could have been caused by a virus has crossed your mind. Perhaps your virus checking program has started telling you about all kinds of things it thinks it has found. Even if neither of those has happened, you will ever be confused with a problem from a virus. Perhaps even a backdoor virus or backdoor Trojan.
Disguise is the name of the game for these viruses. They will appear to be one thing but are really something else. They open a backdoor into your computer allowing the REALLY malicious acts to take place. Something could be installed on your computer or it could be something on your computer that simply watches your actions until it something catches its interest. Then this Trojan jumps into action and transfers whatever information it found to the computer it has been told to talk to. Your personal information can be stolen very easily in this manner. You have no idea it's even happened.
Viruses and Trojans typically have names that do not tell you much about it. What is really helpful is for the virus protection program to tell you the file or files that house and hold the code that runs the viruses. A good virus protection program should provide that information on most viruses it detects.
The virus protection program can attempt to disinfect you computer. Formatting your hard drive is the only guarantee you will get rid of a virus. But a good virus protection program can help a great deal. It will do its work, and provide information. Then if problems are still occurring the burden falls on you to try to eradicate the problem. This is where even more information can help.
You often will be told to search for files on your hard drive. Sometimes you will be given a directory to look in. However, one trick virtual all Trojans and viruses use is to have file names that look files currently in your operating system. This makes it more difficult and confusing to find the correct file. It could be just the extension is different or perhaps a single letter has been added to the file name. Below is a list of files that are used by some of the most common Trojans and viruses.
esktop.exe – Belongs to the Backdoor.SdBot.md Trojan and the FFIsearch Spyware.
desktop.smm – Belongs to the Backdoor.SdBot.md Trojan and the FFIsearch Spyware.
ddhelper32.exe – Contains the backdoor software BDS / Sub7-220.Srv and Backdoor.SubSeven.
sys.plg – Belongs to the Backdoor.ICR Trojan.
gld.exe – Belongs to the Backdoor.Zagaban Trojan.
rlid.exe – Added by LIXY Backdoor virus.
winupdate.exe – Added by WORM_FALSU and is a backdoor Trojan.
wupdt.exe – Added by IMISERV virus and backdoor Trojan.
tskdbg.exe – Added by FLOOD.E VIRUS.It and is a backdoor Trojan.
winstat.exe – Belongs to Kodorjan Trojan.Kodorjan backdoor Trojan.
There is much more information available. Using a search engine, search for the file that you are concerned about. You will get a list of links that describe the file or process you are searching for. There are many, many other viruses and Trojans. Many use other files. So it is necessary to always search.
Using Windows Task Manager (Ctrl + Alt + Del), and selecting the process tab you could see a process that seems to be doing a tremendous amount of work. But for some reason nothing is really happening. All that effort spent by the process could be going on behind the scenes. It's being performed by a backdoor Trojan virus. To get more information on what may be happening, go to the website stated above and search for the process name. It will tell you whether that process is safe. If it is not safe, often a course of action to follow is recommended. It may also give you some idea as to why it is working so hard!