
This file may lead the user to a payment page for the ransom. The virus may also create files on the %Desktop%, like the following: The files may have different names than Windsk. Since the virus is believed to be a variant of another ransomware project, called PClock, it may create the following files as well: When it has been executed on your computer, the CryptoCat virus may drop several files in the following Windows folders: Users should use e-mail services with advanced spam filters and always check the attachments and URLs if they believe they are suspicious before opening them. They usually aim to fool users that the URL or the attachment is important.

The spam messages that may spread CryptoCat may be of various character. SpamBots to quickly spread spam web links or malicious e-mail attachments.

Malware obfuscators otherwise known as cryptors that hide the malicious file from real-time shields.Not only this, but the virus may also use a combination of tools that ensure a successful infection takes place: As soon as the user opens them, the malware may execute a drive-by-download of a malicious file and it’s may start it automatically on the user PC to begin encrypting files. For it to replicate, CryptoCat acts just like a real cat – it hunts and waits for it’s victims to open it’s malicious e-mail attachments or files.
