|Detected||Sep 03 2010 16:01 GMT|
|Released||Sep 04 2010 00:21 GMT|
If you’d like to find out more about how programs of this type function, please read about the general behavior of programs in the same class or sub-class (see right).
Because many programs of this type are slight modifications of older versions, the descriptions for these older versions may be of interest. Links to any available descriptions are displayed under the general description on the right of the screen.
If you can’t find a suitable description on our site, you can get more help from the Contact Us section.
Trojan-Dropper programs are designed to secretly install malicious programs built into their code to victim computers.
This type of malicious program usually save a range of files to the victim’s drive (usually to the Windows directory, the Windows system directory, temporary directory etc.), and launches them without any notification (or with fake notification of an archive error, an outdated operating system version, etc.).
Such programs are used by hackers to: