Remove Dafterdod from Your Computer - How to, Technology and PC Security Forum |

Remove Dafterdod from Your Computer

Cinemax Video 1.9cV24.02Dafterdod or trojanproxy:bat/dafterdod.f is classified as a Trojan infection capable of downloading and installing different programs on the compromised machine without the user’s knowledge. The threat can be used by cybercriminals to hide their identity and perform various tasks from the affected computer. Malware researchers recommend the use of a competent anti-malware application to delete Dafterdod from your computer.

The Trojan has been detected as Trojan.Win32.Bicololo.begl by Kaspersky and as TROJ_DAFTERDOD.SM23 by Trend Micro.

Download a System Scanner, to See If Your System Has Been Affected By Dafterdod.

Dafterdod’s Symptoms

Microsoft experts report that once installed, the Dafterdod Trojan creates the following files on the affected machine:

  • %ProgramFiles%\house\dorm\crypts.exe
  • %ProgramFiles%\house\dorm\instagramm.bat
  • %ProgramFiles%\house\dorm\uninstall.exe

The threat is known to modify the registry so it would be launched with every system start up. Such modifications can be:

→In subkey: HKLM\software\microsoft\windows\currentversion\run
Sets value: “Dorm”
With data: “%ProgramFiles%\house\dorm\crypts.exe”


→In subkey: HKLM\software\microsoft\windows\currentversion\uninstall\dorm 1.4
Sets value: “DisplayName”
With data: “dorm 1.4”

Dafterdod can also create a mutex on the compromised computer (sITPSxqgNkbX or Global\Mp6c3Ygukx29GbDk).

Trojan infections are usually employed by hackers to gain access to the affected computer by connecting it to a remote server. They are also able to block security tools, avoid AV detection and reduce the system performance.

Hackers can employ Dafterdod to perform the following tasks:

  • Download files on the affected PC
  • Steal information
  • Modify or delete files
  • Receive instructions from the C&C server

Dafterdod’s Distribution Technique

Trojans are often distributed to the user’s computer through a malicious attachment or link in a spam email message. They can also infiltrate the system in a freeware bundle or as the user visits corrupted websites.

Malware researchers recommend performing your downloads from verified sources and never opening emails attachments from unknown senders.

How to Remove Dafterdod from Your PC

Typical for Trojans is their stealth behavior, which makes them hard to detect. This is why our experts recommend running a full scan of your system and removing the threat in Safe Mode. The detailed instructions below will help you delete Dafterdod permanently from your computer.

Spy Hunter scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool. Find Out More About SpyHunter Anti-Malware Tool

1. Start Your PC in Safe Mode to Remove Dafterdod
2. Remove Dafterdod automatically with Spy Hunter Malware - Removal Tool.

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share