Threat Database Trojans Exploit.Drop.2


By JubileeX in Trojans

Threat Scorecard

Ranking: 2,593
Threat Level: 10 % (Normal)
Infected Computers: 20,516
First Seen: September 22, 2011
Last Seen: September 20, 2023
OS(es) Affected: Windows

Exploit.Drop.2 is a noxious Trojan infection, which may download and install rogue security programs onto the infected PC. Exploit.Drop.2 may show falsified warning messages and distribute annoying pop-up ads. Exploit.Drop.2 may also change Windows settings, modify the registry and enable remote attackers to gain control to the corrupted PC system. Exploit.Drop.2 can download and installs third-party components that can keep track of your Internet habits without your consent. Exploit.Drop.2 has to be deleted immediately after detection.

File System Details

Exploit.Drop.2 may create the following file(s):
# File Name Detections
1. %AllUsersProfile%\Application Data\.dll
2. %AllUsersProfile%\Application Data\.exe

Registry Details

Exploit.Drop.2 may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = '1'
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ".exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ""
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system "DisableTaskMgr" = '1'


Exploit.Drop.2 may call the following URLs:


Most Viewed