Technical details:
Categories: BHO
FavoriteMan.SpyAssault Files:
[%SYSTEM%]\ss32.dll
[%WINDOWS%]\system\ss32.dll
[%SYSTEM%]\ss32.dll
[%WINDOWS%]\system\ss32.dll
FavoriteMan.SpyAssault Registry Keys:
HKEY_CLASSES_ROOT\clsid\{ebbd88e5-c372-469d-b4c5-1fe00352ab9b}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{ebbd88e5-c372-469d-b4c5-1fe00352ab9b}
HKEY_CLASSES_ROOT\typelib\{ebbd88e5-c372-469d-b4c5-1fe00352ab9b}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{ebbd88e5-c372-469d-b4c5-1fe00352ab9b}
FavoriteMan.SpyAssault indications of infection
This symptoms of FavoriteMan.SpyAssault detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Mass.Bomber DoS Removal
Whiter Trojan Removal
Remove Geschenk Trojan
No comments:
Post a Comment