Поиск в Поддержке

Избегайте мошенников, выдающих себя за службу поддержки. Мы никогда не попросим вас позвонить, отправить текстовое сообщение или поделиться личной информацией. Сообщайте о подозрительной активности, используя функцию «Пожаловаться».

Подробнее

Process explorer found Trojan.Win.32.YY.Gen3 in my Firefox browser. How do I get rid of this? I won't use Firefox till it is gone.

  • 1 ответ
  • 1 имеет эту проблему
  • 10 просмотров
  • Последний ответ от John99

more options

I use Process Explorer as one of the ways to find out if something on my computer is infected. When running it, I noticed that Trojan.Win.32.YY.Gen3 is on my Firefox browser. I originally found it a couple of months ago, so I deleted Firefox from my computer and scanned it for all viruses, malware and spyware, and then re-downloaded Firefox. It was clean for about 2 days, and then the Trojan appeared again. Not going to use Firefox until it is gone. Just to let you know, Firefox is my favorite browser, I have been using it for almost 10 years. Thank you!!

I use Process Explorer as one of the ways to find out if something on my computer is infected. When running it, I noticed that Trojan.Win.32.YY.Gen3 is on my Firefox browser. I originally found it a couple of months ago, so I deleted Firefox from my computer and scanned it for all viruses, malware and spyware, and then re-downloaded Firefox. It was clean for about 2 days, and then the Trojan appeared again. Not going to use Firefox until it is gone. Just to let you know, Firefox is my favorite browser, I have been using it for almost 10 years. Thank you!!

Все ответы (1)

more options

You will not be getting malware from Firefox. Firefox will be getting Malware from your computer or the sites you visit.

I was not aware Process Explorer detected malware although obviously it is an aid used to select files to remove and identify suspicious activity.

I note from this article that this sort of trojan could apparently hide in Windows System files

I suggest you scan with multiple and up to date tools as suggested in

The article also lists security fora for obtaining further advice if required.