Technical details:
Categories: Trojan
[Kaspersky]Trojan-Spy.Win32.Agent.ni,Trojan-SPy.Win32.Agent.ir;
[McAfee]Proxy-Agent.aj;
[Other]Win32/Ieok,Win32.Ieok.M,trojan-Spy.win32.Agent.mn,Win32.Ieok.L,Win32.Ieok.K,Win32/Ieok!generic
Ieok Files:
[%WINDOWS%]\system\ctldlg32.dll
[%WINDOWS%]\system\ctldlg32.dll
Ieok Registry Keys:
HKEY_CLASSES_ROOT\clsid\{06849e9f-c8d7-4d59-b87d-784b7d6be083}
HKEY_CLASSES_ROOT\clsid\{30569401-8721-8345-2ca1-873581cf4101}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{06849e9f-c8d7-4d59-b87d-784b7d6be083}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{30569401-8721-8345-2ca1-873581cf4101}
Ieok indications of infection
This symptoms of Ieok detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
AOHell Trojan Symptoms
Offshoreclicks.Tracking.Cookie Tracking Cookie Removal instruction
Voice.Spy Trojan Information
No comments:
Post a Comment