Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Infected with Java/ByteVerify


  • Please log in to reply

#1
vice0

vice0

    New Member

  • Member
  • Pip
  • 5 posts
Today, while surfing the internet, my AV program (eTrust) informed me that my computer had become infected with Java/ByteVerify. After scanning for it, I quickly identified the location of the infected files and deleted them all, except for one. No matter what I do, this file will not allow me access to delete it. I tried starting in SafeMode, loading without my startup items, removing Java from my computer, deleting the java applets. Nothing. All it says is that its being used by another person or program and I can't delete it. I really don't know what to do. Any help would be much appreciated.

This is the location of the infected file:
C:\Documents and Settings\user 2\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar

With the infected file being:
dialarch.jar-56e86951-75e09214
  • 0

Advertisements


#2
djgotee

djgotee

    Member

  • Member
  • PipPipPip
  • 269 posts
Hello Im steve. How good do you think you can be at creating a boot Cd that you can boot off of to run your malware scans from outside of windows? Youll also have complete access to the windows registry so you can stop dead all malicious running processes. If you think you can make this CD (Ill help you) respond to me here in this forum and ill give instructions where you can download this great preinstalled environment for free. I can also help you build it and configure it. Or if you wish, Ill give you my email so I can help you.
  • 0

#3
vice0

vice0

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
While I do believe that I have the capabilities to make such a CD, I'm not very computer literate. I know enough to get by, but I don't have much confidence in my abilities to do what you oulined, so I would much appreciate any help in setting it all up.

And thank you for responding so quickly! I thought I would have to wait until tomorrow for a reply.
  • 0

#4
djgotee

djgotee

    Member

  • Member
  • PipPipPip
  • 269 posts
Hello viv0, Im steve. Im not working for or with geeks to go. Im just a regular guy like you. However, I do follow the IT tech forums and have found that all you need to analyse and repair a computer in most cases is reasonable intellgence and patience. If you are wanting to learn, which means a lot of reading and comprehension, Ill help you make this CD and who knows? you might even be able to repair other peoples computers with it and make a little money> Its up to you, steve
  • 0

#5
vice0

vice0

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
Well, I'll try and follow any instructions you give me. However, I'd first like to be assured that this isn't going to screw up my computer. I've known from previous forumns that there are people who like to trick newbs such as myself into damaging their own systems, and seeing as how I do not know you, I need to know what it is this process will be doing to my computer. I do not intend to offend you by doing this, I'm just trying to be careful.
  • 0

#6
djgotee

djgotee

    Member

  • Member
  • PipPipPip
  • 269 posts
Ill tell you what, go to http://www.reatogo.de/
Read as much as you wish, then decide if youd like to build this cd? fair enough? Its free and ill explain how to make spybot search and destroy work with this boot Cd. and other scanners and programs
  • 0

#7
vice0

vice0

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
Alright, I'd like to build this CD. Fire away.
  • 0

#8
djgotee

djgotee

    Member

  • Member
  • PipPipPip
  • 269 posts
Ok, of course your problem with byte verify may be able to be eliminated with other instructions. Do you also want other instructions first? Go to these first and try these steps :
http://castlecops.co...yte_verify.html
and here :
http://www.bleepingc...ify-t12975.html

Otherwise, you are in for quite an intense study of whats known and Bart's Preinstalled Environment.
The first step is to position the I386 folder onto your hard drive but if youve updated to Service pack 2 in XP, and I assume you have XP? Youll have to do a procedure known as "slipstreaming. this will incorportae the SP2 into your I386 folder. As you can see so far, this proceedure is lengthy? This is onlt the first step.
  • 0

#9
vice0

vice0

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
Sorry, neither of those links had anything usefull. I don't really have time for a lengthy solution because I have a college project due tomorrow and I have to get it finished tonight. I'll figure something out tomorrow, I guess.

Sorry for taking up your time and again, thank you very much for your help.
  • 0

#10
djgotee

djgotee

    Member

  • Member
  • PipPipPip
  • 269 posts
Thanks for being polite. I thought you might not have the time for all this, most folks dont. This is a time consumming project, however, once you have this Cd built, it is a powerhouse for analysis and repair for computers that have a variety of problems like yours. If you want assistance in the future with this Cd, give me a shout, steve
  • 0

#11
Kristy

Kristy

    Visiting Consultant

  • Member
  • PipPipPipPip
  • 1,099 posts
Hi vice0,

Please Click here!, and follow the recommendations in the guide.

If you're still having trouble, We'll need you to use a free diagnostic tool, Hijack This. Follow the instructions in step five of this guide, and post your log as a new topic in the Hijack This forum. It will get a better response there from the people most qualified to analyze logs.

Most of what Hijack This lists will be harmless or even essential, DO NOT delete or modify anything yet! Someone will be along to tell you what steps to take after you post the contents of the scan results.

~Kristy

Edited by Rustymilo, 22 May 2005 - 08:44 PM.

  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP