This Trojan dropper, as its name suggests, is to install malicious code on a victim's computer. These malicious programs are installed on your computer or other malicious software previously installed a new version of the pest. Trojan dropper is often used to move the computer a few completely unrelated malicious programs, which can vary with the behavior or even be created by different coders. As a result, they provide a kind of malicious program file containing many different types of malicious code. They may also include a joke or hoax, to distract users from the actual destination dropper or adware or "pornware". Droppers are often used to carry known Trojans, since it is much easier to write a dropper than a completely new Trojan, the antivirus program will not be able to detect. Most droppers are written using VBS or JavaScript, so they are easy to create and can be used to perform various tasks.
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |