sorry to bother you again when u posted ur first reply to my problem you said that i had a Trojan Dropper.
please can you tell me which trojan dropper you think i have as i have found a small list of them
This is a primitive Win32 Trojan. It is written in C, and packed using PecBundle and PECompact. The packed file is approximately 48KB in size, and the unpacked file is approximately 114KB in size. It creates a synchronization object named "BaloonMutex". This checks the system for active copies of...
Checkin is a "downloader" trojan that downloads a given file from a certain site and runs it. The trojan itself is a Windows PE EXE file, written in MS Visual C++. The trojan file sizes are of the following approximate sizes: "Checkin.a": 50Kb "Checkin.b": 45Kb The trojan EXE file does not...
This program is an "improved" version of the TrojanDropper.Win32.ExeStealth. In addition to "ExeStealth" is is able to carry and drop files with following filename extensions: COM, BAT, CMD, VBS.
This program is not "trojan programs" itself, but it is designed: to hide other EXE files inside itself to install these EXE files to other machines in silent mode I.e. this program was designed to hide, deploy and install not asked EXE files to victim machines. So, it is a usual...
This primitive Trojan is written in Assembler and is packed using FSG. The packed file is approximately 6KB in size, and the unpacked file is approximately 60KB in size. When launching, it saves a file named eplrr9.dll (which contains Trojan.Win32.StartPage.nu) to the %System% directory. It then...
This Trojan installs and executes a Trojan downloader program. It is written in Visual C++ and packed using UPX. The size of the packed file is 55296 bytes, and the size of the unpacked file is 108544 bytes. When launched, this Trojan creates and then executes a file named hrlypn35.dll in the...
Programs which belong to this Trojan family are written in Visual Basic Script. They are coded to install a range of viruses on victim machines. Malicious programs installed by versions of TrojanDropper.VBS.Zerolin range from primitive key logging programs to multi-functional backdoors and worms.