Remove Dafterdod from Your Computer - How to, Technology and PC Security Forum | SensorsTechForum.com
THREAT REMOVAL

Remove Dafterdod from Your Computer

Cinemax Video 1.9cV24.02Dafterdod or trojanproxy:bat/dafterdod.f is classified as a Trojan infection capable of downloading and installing different programs on the compromised machine without the user’s knowledge. The threat can be used by cybercriminals to hide their identity and perform various tasks from the affected computer. Malware researchers recommend the use of a competent anti-malware application to delete Dafterdod from your computer.

The Trojan has been detected as Trojan.Win32.Bicololo.begl by Kaspersky and as TROJ_DAFTERDOD.SM23 by Trend Micro.

Download a System Scanner, to See If Your System Has Been Affected By Dafterdod.

Dafterdod’s Symptoms

Microsoft experts report that once installed, the Dafterdod Trojan creates the following files on the affected machine:

  • %ProgramFiles%\house\dorm\crypts.exe
  • %ProgramFiles%\house\dorm\instagramm.bat
  • %ProgramFiles%\house\dorm\uninstall.exe

The threat is known to modify the registry so it would be launched with every system start up. Such modifications can be:

→In subkey: HKLM\software\microsoft\windows\currentversion\run
Sets value: “Dorm”
With data: “%ProgramFiles%\house\dorm\crypts.exe”

Or

→In subkey: HKLM\software\microsoft\windows\currentversion\uninstall\dorm 1.4
Sets value: “DisplayName”
With data: “dorm 1.4”

Dafterdod can also create a mutex on the compromised computer (sITPSxqgNkbX or Global\Mp6c3Ygukx29GbDk).

Trojan infections are usually employed by hackers to gain access to the affected computer by connecting it to a remote server. They are also able to block security tools, avoid AV detection and reduce the system performance.

Hackers can employ Dafterdod to perform the following tasks:

  • Download files on the affected PC
  • Steal information
  • Modify or delete files
  • Receive instructions from the C&C server

Dafterdod’s Distribution Technique

Trojans are often distributed to the user’s computer through a malicious attachment or link in a spam email message. They can also infiltrate the system in a freeware bundle or as the user visits corrupted websites.

Malware researchers recommend performing your downloads from verified sources and never opening emails attachments from unknown senders.

How to Remove Dafterdod from Your PC

Typical for Trojans is their stealth behavior, which makes them hard to detect. This is why our experts recommend running a full scan of your system and removing the threat in Safe Mode. The detailed instructions below will help you delete Dafterdod permanently from your computer.

donload_now_250
Spy Hunter scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool. Find Out More About SpyHunter Anti-Malware Tool

1. Start Your PC in Safe Mode to Remove Dafterdod

1. Start Your PC in Safe Mode to Remove Dafterdod.

1. Remove all CDs and DVDs, and then Restart your PC from the “Start” menu.
2. Select one of the two options provided below:

For PCs with a single operating system: Press “F8” repeatedly after the first boot screen shows up during the restart of your computer. In case the Windows logo appears on the screen, you have to repeat the same task again.

For PCs with multiple operating systems: Тhe arrow keys will help you select the operating system you prefer to start in Safe Mode. Press “F8” just as described for a single operating system.

3. As the “Advanced Boot Options” screen appears, select the Safe Mode option you want using the arrow keys. As you make your selection, press “Enter“.
4. Log on to your computer using your administrator account

While your computer is in Safe Mode, the words “Safe Mode” will appear in all four corners of your screen.

2. Remove Dafterdod automatically with Spy Hunter Malware - Removal Tool.

2. Remove Dafterdod automatically with Spy Hunter Malware – Removal Tool.

To clean your computer with the award-winning software Spy Hunter – donload_now_140
It is highly recommended to run a system scan before purchasing the full version of the software to make sure that the current version of the malware can be detected by SpyHunter.

Avatar

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...