Crypt Trojan

Crypt virus description
Technical details:
Categories: Trojan,Downloader
Crypt Aliases:
[Kaspersky]Trojan.Win32.Crypt.g;
[Other]Trojan Horse,TROJ_CRYPT.BG

Crypt Files:
[%SYSTEM%]\sysdpt.exe
[%SYSTEM%]\sysdpt.exe

Crypt Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Crypt indications of infection

This symptoms of Crypt detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVEJ Trojan Removal instruction
Adware.Virtumundo Adware Cleaner
Remove PrankMaster Trojan
Delf.DZX Trojan Removal
SubSeven.deutsch Backdoor Symptoms

No comments: