Trojan.Dropper is a Trojan that’s explicitly-built to install other PC threats. Unlike Trojan.Downloader variants that perform similar functions, Trojan.Dropper-based PC threats are often one of the first files in an attack against a PC and will, accordingly, disguise themselves as something else until they can install their independently-designed payload. A Trojan.Dropper may be disguised in the form of a software update, codec, movie player, game crack or other type of benign file and may or may not require your interaction or consent to install other PC threats. Trojan.Dropper often has limited or even no functionality once its payload has been delivered, but since programs that can be installed by Trojan.Dropper may include high-level threats such as spyware or rootkits, SpywareRemove.com malware experts recommend that you remove Trojan.Dropper from your PC as soon as you can access suitable anti-malware applications to perform the job.
Preventing Trojan.Dropper from Getting the Drop on You
Trojan.Dropper-based PC threats can and have been delivered in a wide range of forms but must always be present as some type of separate file that you can, ideally, prevent from being installed on your PC. Common delivery mechanisms that SpywareRemove.com malware experts have discovered include:
- Fake software updates, particularly codecs for movie formats that are hosted on malicious websites.
- File attachments from mass-mailed e-mail messages – these attachments may pretend to be UPS delivery notifications, account security data or other forms of official communications.
- Picture files and other types of media that are friendly for sharing on social-networking sites; in many cases, although the media content may be real, it also includes a Trojan.Dropper in its .exe bundle.
Most installation files for Trojan.Dropper Trojans are distributed in the .exe format, although they may use the file name or icon of a different format. In most cases, SpywareRemove.com malware researchers are glad to note that you should be able to avoid a Trojan.Dropper infection by staying away from suspicious file sources and by paying attention to warning messages when you attempt to launch a file.
How a Drop from Trojan.Dropper Can Ruin Your PC
A Trojan.Dropper can be configured to install an effectively-unlimited range of PC threats and, typically include these PC threats as part of their overall package (as opposed to downloading them, which is typical for a Trojan.Downloader). Since, typically, their only purpose is to install their payload, you generally don’t need to worry about further attacks from a Trojan.Dropper after that point, although SpywareRemove.com malware experts still recommend that you remove Trojan droppers once a Trojan dropper is spotted.
Trojan.Dropper can be used to install spyware that steal private information, rogue security programs that display false alerts, browser hijackers that redirect your online searches and even backdoor Trojans that let criminals control your PC. Since not all of a Trojan.Dropper payload can be obviously-visible, SpywareRemove.com malware research team recommends that you remove Trojan.Dropper with a complete scan of your entire PC to be certain of detecting every possible PC threat.
RemoteAdmin.ARL [AVG]Riskware/ESurveiller [Fortinet]not-a-virus:Monitor.Win32.007SpySoft.308 [Ikarus]Trojan.Net-TCPHost/SYS [SUPERAntiSpyware]e-Surveiller [Sophos]SPR/Tool.E.Surveiller.D [AntiVir]Application.E.Surveiller [F-Secure]Riskware.Monitor.Win32.007SpySoft.308!IK [Emsisoft]not-a-virus:RemoteAdmin.Win32.eSurveiller.120 [Kaspersky]Virus in password protected archive [eSafe]
More aliases (255)
Trojan.Dropper Automatic Detection Tool (Recommended)
Is your PC infected with Trojan.Dropper? To safely & quickly detect Trojan.Dropper, we highly recommend you run the malware scanner listed below.
Download SpyHunter's* Malware Scanner to detect Trojan.Dropper What happens if Trojan.Dropper does not let you open SpyHunter or blocks the Internet?
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
- The following files were created in the system:
# File Name Detection Count 1 fcmrtioih.exe 703 2 sfev.exe 679 3 system.exe 621 4 AnyTrialControl.exe 541 5 qdahkvf.exe 248 6 %WINDIR%\ GoogleToolbarUpdate.exe 37 7 %WINDIR%\ system32\ explorer\ winlogon.exe 28 8 %WINDIR%\ system32\ evans.exe 21 9 %TEMP%\ scvhost.exe 12 10 %WINDIR%\ System32\ regsvr.exe 12
Posted: June 6, 2006 | By SpywareRemove
Threat Level: 9/10
Rate this article:
Detection Count: 4,710