Trojan Analyser allows to determine if a suspicious file is useful or harmful.
Now it works with Windows 95/98/Me. Version for Windows NT/2000/XP is in developing.
Trojan Analyser traces all files that the application tried to open or write, and all registry operations.
Trojan Analyser has two methods to begin tracing:
- You may browse for a execution file. Trojan Analyser will run this file and watch until it finishes, or while you stop.
- You may choose one or all of the processes that are already working. (excluding system processes). To trace all process check the option "Monitor All Processes".
Note!
You may enable option "Enable Write-Protect Mode".
This option prevents creating, deleteing, renaming files with extensions:
- exe
- com
- dll
- sys
- 386
- vxd
- cpl
This feature will protect your system files against dangerous actions.
Be careful, if you try to launch the installation package with this option enable. It may cause an abnormal working of the installation program.
After finishing tracing Write-Protection mode will be automatically cancelled.
2) Trojan Analyser automatically checks your execution file extensions (exe, com, pif, bat) before starting tracing and after finishing. If the file extensions will be changed they will be restored by Trojan Analyser. This will protect you against viruses actions.
We suggest you to check your system by WatchDog or run Start Control to restore changes in the startup.
After the application finished, or you stop its work, you will see the results in the Results window. You may quickly inspect changes by using search and sort operations. Also, you may export results to CSV file format. You may use Excel or another application to analyse them.
Look at the sample results of the Klez virus actions:
Trojan Analyser doesn't allow to create virus file.
RegRun Start control will warn you about changes in the registry startup keys and allow to decline these changes.
Read more information >>