A trojan horse is a type of malware that poses as benevolent software, while secretly installing other malware in your system.
Questions tagged [trojan]
125 questions
507
votes
9 answers
Did I just get hacked?
I am developing a consumer product, and it is supposed to be connected to the Internet, so as expected, it is connected to the Internet so that I can properly develop it.
I went away for an hour or two, and when I came back to my office I noticed…
vaid
- 3,539
- 5
- 16
- 19
15
votes
3 answers
Why can I get a virus or trojan from visiting a website?
I have seen these a lot lately. You click the link, and instant trojan. No need to download or anything.
How is this possible? Is there a way I can scan the links before visiting to make sure I won't be infected?
Rob
- 737
- 2
- 12
- 24
13
votes
3 answers
Google Chrome detected as PWS:Win32/Zbot by MSE
Microsoft Security Essentials detected Google Chrome as a Password Stealer:
PWS:Win32/Zbot
Category: Password Stealer
Description: This program is dangerous and captures user passwords.
Recommended action: Remove this software immediately.
Security…
PabloC
- 233
- 2
- 6
11
votes
4 answers
Can you really get a trojan in an image file and if so how will it be executed?
I've just digitized a couple of LPs and needed some cover art. My scanner isn't big enough to scan the album so I searched for and downloaded the images off the net.
When I did so Avast reported that one of them contained the "Win32:Hupigon-ONX"…
ChrisF
- 41,278
- 17
- 101
- 154
9
votes
5 answers
Download Virus/Malware Purposefully
Where can I download a virus, work, trojan, etc. for analysis? Yes, I'm actually hunting for malware, rather than keeping it at bay and hiding behind antivirus software and firewalls. I plan to analyze it in a lab for a project, but don't know where…
Matt Hanson
- 932
- 3
- 17
- 30
9
votes
2 answers
How can I determine if a file or executable has a keylogger included with it?
I had a program created for me recently and didn't really think about it being executable posing a threat since I pretty much trust the source, but not completely.
I then thought about the fact that a keylogger, or any kind of spyware or malicious…
user36250
8
votes
0 answers
How I analyzed svchost high CPU utilization problem
My machine was attacked by a trojan that manifested itself as a service in the netsvcs svchost process. This process can be identified using Process Explorer as 'svchost -k netsvcs'.
The symptoms I had indicating my machine had been infected were: …
user64842
- 181
- 1
- 3
8
votes
4 answers
Detecting damage done by virus
This morning after I went to college, a virus infected my PC without any user interaction at my end. When I came home my computer was completely frozen and infected with lots of trojans. I have not typed anything important since returning so keys…
user38471
- 81
- 2
7
votes
8 answers
Is software from NCH Software safe?
I just downloaded Fling from them (an automatic ftp uploader) having been looking for a good app to do this for a long time. It just seems to good to be true to finally stumble across what looks to be a good piece of software.
Here's their site:…
Matt
- 408
- 1
- 6
- 17
5
votes
4 answers
locale.exe and tzset.exe trojans in Cygwin
I was updating wget this morning and Symantec notified me of trojans detected in locale.exe and tzset.exe
Does this mean my cygwin installation is infected?
Sinsanator
- 153
- 4
5
votes
6 answers
Software with Malicious Intent binded to executable?
I had some software created for me by a coder overseas. I'm a little suspicious since the software is executable. I started thinking about the possibility that they could have binded a key logger to the application they made for me or any kind of…
Brandon
4
votes
3 answers
How do I properly check if a program is a virus/trojan in VMware?
How I should check if a program is a virus in VMware? Some programs I do need admin ability to install and it makes sense. But how do I know if it's doing more than I want? Some thoughts are:
How many processes open when I launch the…
user3109
4
votes
1 answer
Accessing rights of worms,viruses,etc
If I create a folder named nul (or con, prn,etc) which are DOS reserved names, I will not be able to edit (or modify or delete) files inside it directly. So my doubt is that, if the PC is infected with a worm (or virus or trojan), will it be able to…
Jack
- 41
- 1
4
votes
3 answers
Leftovers of a trojan cause popups saying "crss.exe" cannot be found
I am helping out a coworker with Winodws XP 32-bit, and took off a Trojan using Malwarebytes, Spy-bot Search and Destroy, and Trojan remover with total annihilation of the Trojan. I also had to find the folder and delete the folder that the Trojan…
David
- 7,339
- 6
- 33
- 51
4
votes
1 answer
What should I do AFTER finding out that some Trojans were found and deleted on my computer?
I ran a full virus/spyware scan on my computer last night for the first time in a while and it found and deleted three items that have only been registered on the Malware Protection Directory since July 3rd (today is July…
Lynx
- 403
- 1
- 7
- 10