Questions tagged [trojan]

A trojan horse is a type of malware that poses as benevolent software, while secretly installing other malware in your system.

126 questions
505
votes
9 answers

Did I just get hacked?

I am developing a consumer product, and it is supposed to be connected to the Internet, so as expected, it is connected to the Internet so that I can properly develop it. I went away for an hour or two, and when I came back to my office I noticed…
vaid
  • 3,569
15
votes
3 answers

Why can I get a virus or trojan from visiting a website?

I have seen these a lot lately. You click the link, and instant trojan. No need to download or anything. How is this possible? Is there a way I can scan the links before visiting to make sure I won't be infected?
Rob
  • 747
13
votes
3 answers

Google Chrome detected as PWS:Win32/Zbot by MSE

Microsoft Security Essentials detected Google Chrome as a Password Stealer: PWS:Win32/Zbot Category: Password Stealer Description: This program is dangerous and captures user passwords. Recommended action: Remove this software immediately. Security…
12
votes
4 answers

Can you really get a trojan in an image file and if so how will it be executed?

I've just digitized a couple of LPs and needed some cover art. My scanner isn't big enough to scan the album so I searched for and downloaded the images off the net. When I did so Avast reported that one of them contained the "Win32:Hupigon-ONX"…
ChrisF
  • 41,540
10
votes
5 answers

Download Virus/Malware Purposefully

Where can I download a virus, work, trojan, etc. for analysis? Yes, I'm actually hunting for malware, rather than keeping it at bay and hiding behind antivirus software and firewalls. I plan to analyze it in a lab for a project, but don't know where…
9
votes
2 answers

How can I determine if a file or executable has a keylogger included with it?

I had a program created for me recently and didn't really think about it being executable posing a threat since I pretty much trust the source, but not completely. I then thought about the fact that a keylogger, or any kind of spyware or malicious…
user36250
8
votes
0 answers

How I analyzed svchost high CPU utilization problem

My machine was attacked by a trojan that manifested itself as a service in the netsvcs svchost process. This process can be identified using Process Explorer as 'svchost -k netsvcs'. The symptoms I had indicating my machine had been infected were: …
user64842
  • 181
  • 1
  • 3
8
votes
4 answers

Detecting damage done by virus

This morning after I went to college, a virus infected my PC without any user interaction at my end. When I came home my computer was completely frozen and infected with lots of trojans. I have not typed anything important since returning so keys…
user38471
  • 81
  • 2
7
votes
8 answers

Is software from NCH Software safe?

I just downloaded Fling from them (an automatic ftp uploader) having been looking for a good app to do this for a long time. It just seems to good to be true to finally stumble across what looks to be a good piece of software. Here's their site:…
Matt
  • 432
6
votes
4 answers

locale.exe and tzset.exe trojans in Cygwin

I was updating wget this morning and Symantec notified me of trojans detected in locale.exe and tzset.exe Does this mean my cygwin installation is infected?
Sinsanator
  • 163
  • 4
5
votes
6 answers

Software with Malicious Intent binded to executable?

I had some software created for me by a coder overseas. I'm a little suspicious since the software is executable. I started thinking about the possibility that they could have binded a key logger to the application they made for me or any kind of…
Brandon
4
votes
3 answers

How do I properly check if a program is a virus/trojan in VMware?

How I should check if a program is a virus in VMware? Some programs I do need admin ability to install and it makes sense. But how do I know if it's doing more than I want? Some thoughts are: How many processes open when I launch the…
user3109
4
votes
1 answer

Accessing rights of worms,viruses,etc

If I create a folder named nul (or con, prn,etc) which are DOS reserved names, I will not be able to edit (or modify or delete) files inside it directly. So my doubt is that, if the PC is infected with a worm (or virus or trojan), will it be able to…
Jack
  • 41
4
votes
3 answers

Leftovers of a trojan cause popups saying "crss.exe" cannot be found

I am helping out a coworker with Winodws XP 32-bit, and took off a Trojan using Malwarebytes, Spy-bot Search and Destroy, and Trojan remover with total annihilation of the Trojan. I also had to find the folder and delete the folder that the Trojan…
David
  • 7,393
4
votes
4 answers

What triggers a Trojan file to be executed after it gets downloaded to your machine?

I posted a question earlier about some Trojans (they seem to be Java-related) that were found and deleted from my machine by a recent scan. But what I don't know is whether these Trojans ever actually executed. When you download a regular…
Lynx
  • 413
1
2 3
8 9