TrojanDropper:Win32/Fedripto.A is a dropper Trojan that can install a wide range of other forms of hostile software, including spyware, other Trojans, viruses and fake security software. The distribution method that TrojanDropper:Win32/Fedripto.A uses is somewhat innovative – TrojanDropper:Win32/Fedripto.A pretends to be a .jpg screenshot of a random gaming application’s item that an anonymous player wishes to trade or sell to you. If you’re a fan of item-trading in virtual card games or similar game economies, you may be tempted to lower your guard and click this ‘screenshot’ link, but doing so will only infect your PC with TrojanDropper:Win32/Fedripto.A. SpywareRemove.com malware experts strongly encourage you to scan your PC with a suitable anti-malware program, if you suspect that you’ve fallen for this item-trading scam, which is capable of causing severe harm to your PC if left untreated for a prolonged period of time.
Why That E-Card Screenshot Might Be a Lurking TrojanDropper:Win32/Fedripto.A
TrojanDropper:Win32/Fedripto.A is often seen in the form of a link that’s sent out by instant messaging spammers, although TrojanDropper:Win32/Fedripto.A may also be present in other formats such as spam e-mail messages. Along with the link to TrojanDropper:Win32/Fedripto.A’s fake JPEG file, there is typically an included message that tries to make you think that the file is a screenshot for a popular online game item. TrojanDropper:Win32/Fedripto.A’s scam may even offer an extremely rare item for an unusually low rate to garner especial interest. This form of scam is capable of targeting World of Warcraft players, Second Life players, Team Fortress 2 players and players of various other types of games that include some form of item-collecting and trading.
SpywareRemove.com malware experts have also noted that, in addition to Troj/VB-FPL’s initial .jpg link disguise, TrojanDropper:Win32/Fedripto.A will even imitate the icon of a .jpg file and may even display an actual .jpg picture for a distraction.
Spurning TrojanDropper:Win32/Fedripto.A’s Rotten Trading Deal
TrojanDropper:Win32/Fedripto.A infections, although they have few symptoms, can cause considerable damage to your PC if allowed to function freely and without impediments. Common dangers that are associated with TrojanDropper:Win32/Fedripto.A and similar dropper Trojans include (but aren’t limited to):
- The installation of a backdoor Trojan program that attacks your computer’s network and firewall security, such as Backdoor:Win32/Zegost.H. Backdoor Trojans make your computer vulnerable to additional attacks and can allow your PC to be co-opted into botnets for DDoS attacks, spamming and other crimes.
- The installation of scamware programs, such as fake anti-virus scanners, fake Registry cleaners or fake anti-spyware applications. Rogue applications that are security or diagnostic-oriented will tend to create fake system errors as part of their scam to acquire your credit card number.
- Altered system settings, such as exceptions that have been added to your firewall or network ports that have been opened. In most cases, you will not be able to undo these negative changes, until you remove TrojanDropper:Win32/Fedripto.A.
SpywareRemove.com malware researchers encourage the removal of any TrojanDropper:Win32/Fedripto.A with appropriate anti-malware programs, since TrojanDropper:Win32/Fedripto.A will corrupt the Windows Registry and may install other infections that can be difficult to delete without any software-based aid. Several full system scans in Safe Mode may be required to remove all components of a TrojanDropper:Win32/Fedripto.A infection.
TrojanDropper:Win32/Fedripto.A Automatic Detection Tool (Recommended)
Is your PC infected with TrojanDropper:Win32/Fedripto.A? To safely & quickly detect TrojanDropper:Win32/Fedripto.A, we highly recommend you run the malware scanner listed below.
Download SpyHunter's* Malware Scanner to detect TrojanDropper:Win32/Fedripto.A What happens if TrojanDropper:Win32/Fedripto.A does not let you open SpyHunter or blocks the Internet?
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
Posted: October 11, 2011 | By SpywareRemove
Threat Level: 9/10
Rate this article:
Detection Count: 178