Trojan.Dropper Description

A Trojan.Dropper is designed to deliver a payload onto the victim's computer system. However, a Trojan.Dropper will usually lead a large-scale attack, usually not the end infection itself. Typically, one of the main goals of computer criminals is to find ways to install malware onto their victim's computer without alerting the victim of the intrusion. A Trojan.Dropper is a typical method that is quite common. Typically, a Trojan.Dropper contains a malware infection within itself which is designed to deliver the infection by copying it onto the victim's computer's file system. A Trojan.Dropper will usually install and execute the malware installed and then will often delete itself or simply remain harmless on the victim's computer system.

A Trojan.Dropper will usually be confusing to the victim, and designed to cause no symptoms. A typical example of a Trojan.Dropper is a fake screen saver which, when opened, will simply display an error message. However, even though the error message may look genuine, it will actually have been part of the Trojan.Dropper's tactics to install its payload without the user being aware of the problem. Many Trojan.Dropper infections will include an encrypting algorithm of some kind of obfuscator or packing algorithm to make their detection and removal much more difficult than normal.

Usually, a Trojan.Dropper is created as a way to distribute malware, since a Trojan.Dropper is relatively cheap and easy to distribute. A Trojan.Dropper is also low risk for the criminals that create it, since it is easy for them to cover their tracks when there are several steps to an infection. However, one of the features of Trojan.Dropper infections that make them attractive to criminals is that they can be easily disguised by simply changing their icon and file name. The payload of a typical Trojan.Dropper will vary from one case to the next. Typically, they will drop executable files, which can then infect the victim's computer system or download malware from a remote location.

There are few symptoms associated with a Trojan.Dropper. Some kinds of Trojan.Dropper infections will display a fake error message while dropping their payload. However, most of the time a Trojan.Dropper will display no signs of infection at all. Usually, the symptoms on an infected computer system will have been caused by the Trojan.Dropper's payload rather than by the dropper. Some examples of Trojan.Dropper infections will be associated with rootkits that hide the Trojan.Dropper's payload and may also make changes to the System's settings and the Windows Registry.

Aliases: Application.E.Surveiller.D [MicroWorld-eScan], RemoteAdmin.ARL [AVG], Generic PUP.d [McAfee], Unwanted-Program [K7AntiVirus], W32/eSurveiller.A [F-Prot], TROJ_GEN.RFFC8HV [TrendMicro-HouseCall], Virus in password protected archive [eSafe], not-a-virus:RemoteAdmin.Win32.eSurveiller.120 [Kaspersky], Riskware.Monitor.Win32.007SpySoft.308!IK [Emsisoft], Riskware/ESurveiller [Fortinet], not-a-virus:Monitor.Win32.007SpySoft.308 [Ikarus], Trojan.Net-TCPHost/SYS [SUPERAntiSpyware], e-Surveiller [Sophos], SPR/Tool.E.Surveiller.D [AntiVir] and Application.E.Surveiller [F-Secure].

Infected with Trojan.Dropper? Scan Your PC for Free

Download SpyHunter's Spyware Scanner
to Detect Trojan.Dropper
* SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

Security Doesn't Let You Download SpyHunter or Access the Internet?

Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
  • Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
  • Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
  • Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
  • IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.

If you still can't install SpyHunter? View other possible causes of installation issues.

Technical Information

Infection Statistics

Our MalwareTracker shows malware activity across the world. Explore real-time data of Trojan.Dropper outbreaks and other threats from global to local level.

File System Details

Trojan.Dropper creates the following file(s):
# File Name Size MD5 Detection Count
1 %LOCALAPPDATA%\SystemDir\nethost.exe 933,376 e090572a3eb5ac6f1453926eae14ecec 3,345
2 explorers.exe 498,765 8135ad5d2966e8791cae5e80a79d8e87 92
3 AnyTrialControl.exe 170,302 ac3dc7bc634421d169fe0841a661e068 74
4 %ALLUSERSPROFILE%\AppData\vscrtapp.exe 68,608 1aca09c5eefb37539e86ec86dd3be72f 64
5 ctfmun.exe 37,890 1fa78f38a099d191bdeef71a14ecd928 54
6 aulfma.exe 63,488 168f99a649d0cb6dcee94f6467ec9675 53
7 appletsun.exe 454,366 41897cb2a36bd3f71b8115f91f300094 27
8 drm.exe 692,736 ccd63de22be14961e4357cca58eb8c5c 27
9 ehxnfgur.exe 249,856 b11ea01513e57f2bccf998f737b8f38f 16
10 a.exe 91,652 61fda050ca7d9f7d49cd3fc97b8d4545 11
11 %WINDIR%GoogleToolbarUpdate.exe 111,616 ce7679af9d8ad929a58e4398a8d382f8 7
12 %WINDIR%\system32\explorer\winlogon.exe 169,352 155cca87bd1630c1550c15eff43c2b7a 5
13 %WINDIR%\system32\evans.exe 485,376 fc1c976f0884c1b8e70b76a17d4ab6a3 4
14 %WINDIR%\System32\regsvr.exe 617,343 e9f7627d4710e414b579003332287f05 2
15 %TEMP%scvhost.exe 147,968 b751e973a0fa7cffcf60a548552ce45e 2
More files

Related Posts

Site Disclaimer

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.

IMPORTANT! To be able to proceed, you need to solve the following simple math.
Please leave these two fields as is:
What is 13 + 4 ?