virus removal
Anyone had this come up??
hackit.toolkit, cant seem to get rid of it.
It has changed my home page to some advert for spyware, saying i am infected with it, download now to remove.
the url to this page is www.yoursystemupdate.com
also avg come up with one named java/byteverify, but wont delete it
Norton wont delete them either
any idea as to how to get rid?
Have tried turning system restore of and booting in safe mode and running a full system scan with norten but still no go
fooking things
hackit.toolkit, cant seem to get rid of it.
It has changed my home page to some advert for spyware, saying i am infected with it, download now to remove.
the url to this page is www.yoursystemupdate.com
also avg come up with one named java/byteverify, but wont delete it
Norton wont delete them either
any idea as to how to get rid?
Have tried turning system restore of and booting in safe mode and running a full system scan with norten but still no go
fooking things
This might be a long shot but i had a similar problem a while ago where i kept getting pop ups and my home page kept being changed, i found the cause of the problem in the control panel
Go to add/remove programs under control panel and check the list for any unknown programs that might be running you might find the culprit in there
Go to add/remove programs under control panel and check the list for any unknown programs that might be running you might find the culprit in there
Yeah its norton pop up.
Just had it come again.
It says:
object name c:windows\system32\msvol.tlb
virus name hacktool.rootkit
unable to repair this file.
When I click ok, it then says access to file denied
fat lot of good that is
Just had it come again.
It says:
object name c:windows\system32\msvol.tlb
virus name hacktool.rootkit
unable to repair this file.
When I click ok, it then says access to file denied
fat lot of good that is
Trending Topics
PassionFord Post Whore!!
Joined: May 2003
Posts: 5,893
Likes: 0
From: In the Plough,probabley havin a Guinness!!
Ok,ive just looked at that site www.yoursystemupdate.com
Says someone is watchin me...
WTF do i do now then?!?!?!
Wanna know as i use my cards over the net!!!!!!!!
Pete..
Says someone is watchin me...
WTF do i do now then?!?!?!
Wanna know as i use my cards over the net!!!!!!!!
Pete..
www.lavasoft.com
Select Ad Aware personal and download it everything else should be self explanatory
Select Ad Aware personal and download it everything else should be self explanatory
I have just cleared this off my sisters computer.
right little shit to get rid of.
Do a search for google for SpyAxe Removal.
Will see if I can find the site I used for sisters.
I got her to download firefox until I could get round to fix it.
right little shit to get rid of.
Do a search for google for SpyAxe Removal.
Will see if I can find the site I used for sisters.
I got her to download firefox until I could get round to fix it.
This was the site I used.
http://forums.majorgeeks.com/showthread.php?t=78572
or
http://www.2-spyware.com/remove-spyaxe.html
Good luck
http://forums.majorgeeks.com/showthread.php?t=78572
or
http://www.2-spyware.com/remove-spyaxe.html
Good luck
Benn do a search on this site http://www.cybertechhelp.com/forums/index.php - if you find nothing, register and do a thread in Cyber Safety. One of the experts will assign themselves to help you. I have found them brilliant in the past.
Originally Posted by warleydaddy
WHERE????????????????????????
Pete...


http://forums.majorgeeks.com/showthread.php?t=78572
or
http://www.2-spyware.com/remove-spyaxe.html
That one
Originally Posted by Redkop
SpyAxe is a bastard to remove apparently. A Google search shows just how much... 
Originally Posted by Adrian
Originally Posted by Redkop
SpyAxe is a bastard to remove apparently. A Google search shows just how much... 

Tried for 3 days, NOTHING WORKS!
Bad news Benn..gutted for ya. Hope you sort it & everything is ok.
I hate it when people post stuff like this.
Made me check my system tho, then got message using the www.yoursystemupdate.com site:
Attention! Your system is under control of remote computer with IP address 227.4.167.118. The remote computer has access to the following folders on your PC:
- \WINDOWS\System32
- \Program Files\Internet Explorer
- \My Documents
- Drive C:\ files
Click here to download official anti-spyware software
Is this for real or their IP so you d/l their stuff ? Done ad-aware, spybot & norton, but got nothing like this picked up.
I hate it when people post stuff like this.
Made me check my system tho, then got message using the www.yoursystemupdate.com site:
Attention! Your system is under control of remote computer with IP address 227.4.167.118. The remote computer has access to the following folders on your PC:
- \WINDOWS\System32
- \Program Files\Internet Explorer
- \My Documents
- Drive C:\ files
Click here to download official anti-spyware software
Is this for real or their IP so you d/l their stuff ? Done ad-aware, spybot & norton, but got nothing like this picked up.
Benn download Hijack This and see if you can remove it manually from their log files...
or try this from HiJack This site
or try this from HiJack This site
Originally Posted by Snowy_Astra
Originally Posted by Adrian
Originally Posted by Redkop
SpyAxe is a bastard to remove apparently. A Google search shows just how much... 

Tried for 3 days, NOTHING WORKS!
10K+ Poster!!
iTrader: (1)
Joined: Jun 2003
Posts: 13,450
Likes: 2
From: Dartford, Kent - Home of the two way one way system.
Originally Posted by Benn 304R
Anyone had this come up??
hackit.toolkit, cant seem to get rid of it.
It has changed my home page to some advert for spyware, saying i am infected with it, download now to remove.
the url to this page is www.yoursystemupdate.com
also avg come up with one named java/byteverify, but wont delete it
Norton wont delete them either
any idea as to how to get rid?
Have tried turning system restore of and booting in safe mode and running a full system scan with norten but still no go
fooking things

hackit.toolkit, cant seem to get rid of it.
It has changed my home page to some advert for spyware, saying i am infected with it, download now to remove.
the url to this page is www.yoursystemupdate.com
also avg come up with one named java/byteverify, but wont delete it
Norton wont delete them either
any idea as to how to get rid?
Have tried turning system restore of and booting in safe mode and running a full system scan with norten but still no go
fooking things

Benn,
Have you sorted this yet ?
Run both Norton's and AVG in Safe mode and see if it will clean / delete the file. If not, delete this file c:windows\system32\msvol.tlb
It's not a neccessary windows file, so it can safely be binned.
As for the java one
Trojan.ByteVerify is a Trojan Horse that exploits the vulnerability described in Microsoft Security Bulletin MS03-011 and could provide a hacker the ability to run arbitrary code on an infected system.
Also Known As: Exploit-ByteVerify [McAfee], Exploit.Java.Bytverify [KAV], JAVA_BYTVERIFY.A [Trend]
Type: Trojan Horse
Infection Length: various
Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP
Systems Not Affected: Linux, Macintosh, OS/2, UNIX
CVE References: CAN-2003-0111
technical details
When Trojan.ByteVerify is executed, it performs the following actions:
1. Escapes the sandbox restrictions, using Blackbox.class, by doing the following:
1. Declares a new PermissionDataSet with setFullyTrusted set to TRUE.
2. Creates a trusted PermissionSet.
3. Sets permission to PermissionSet by creating its own URLClassLoader class, derived from the VerifierBug.class.
2. Loads Beyond.class using the URLClassLoader from Blackbox.class.
3. Gains unrestricted rights on the local machine by invoking the .assertPermission method of the PolicyEngine class in Beyond.class.
4. Opens the Web page, http://www.clavus.net/lst.backs, and parses the text that this site displays.
For example, SP|www.ewebsearch.net/sp.htm means that the Internet Explorer Start Page will be set up to www.ewebsearch.net/sp.htm
5. Several pornographic links are added into the favorites.
6. May attempt to retrieve dialer programs and install them on the infected computer. The dialer programs may attempt to connect the infected computer to pornographic Web sites.
Notes:
* Trojan.ByteVerify will typically arrive as a component of other malicious content. An attacker could use the compiled Java class file to execute other code. The file will likely exist as VerifierBug.Class. For example, an attacker could create a .html file that uses the Trojan, and then create a script file that will perform other actions, such as setting the Internet Explorer Start Page.
* Notification of infection does not always indicate that a machine has been infected; it only indicates that a program included the viral class file. This does not mean that it used the malicious functionality.
recommendations
Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":
* Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.
* If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
* Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services (for example, all Windows-based computers should have the current Service Pack installed.). Additionally, please apply any security updates that are mentioned in this writeup, in trusted Security Bulletins, or on vendor Web sites.
* Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
* Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.
* Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.
* Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.
removal instructions
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Disable System Restore (Windows Me/XP).
2. Update the virus definitions.
3. Restart the computer in Safe mode or VGA mode.
4. Run a full system scan and delete all the files detected as Trojan.ByteVerify.
For specific details on each of these steps, read the following instructions.
1. Disabling System Restore (Windows Me/XP)
If you are running Windows Me or Windows XP, we recommend that you temporarily turn off System Restore. Windows Me/XP uses this feature, which is enabled by default, to restore the files on your computer in case they become damaged. If a virus, worm, or Trojan infects a computer, System Restore may back up the virus, worm, or Trojan on the computer.
Windows prevents outside programs, including antivirus programs, from modifying System Restore. Therefore, antivirus programs or tools cannot remove threats in the System Restore folder. As a result, System Restore has the potential of restoring an infected file on your computer, even after you have cleaned the infected files from all the other locations.
Also, a virus scan may detect a threat in the System Restore folder even though you have removed the threat.
For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:
* "How to disable or enable Windows Me System Restore"
* "How to turn off or turn on Windows XP System Restore"
For additional information, and an alternative to disabling Windows Me System Restore, see the Microsoft Knowledge Base article, "Antivirus Tools Cannot Clean Infected Files in the _Restore Folder," Article ID: Q263455.
2. Updating the virus definitions
Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
* Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
* Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).
The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.
3. Restarting the computer in Safe mode or VGA mode
Shut down the computer and turn off the power. Wait for at least 30 seconds, and then restart the computer in Safe mode or VGA mode.
* For Windows 95, 98, Me, 2000, or XP users, restart the computer in Safe mode. For instructions, read the document, "How to start the computer in Safe Mode."
* For Windows NT 4 users, restart the computer in VGA mode.
4. Scanning for and deleting the infected files
1. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
* For Norton AntiVirus consumer products: Read the document, "How to configure Norton AntiVirus to scan all files."
* For Symantec AntiVirus Enterprise products: Read the document, "How to verify that a Symantec Corporate antivirus product is set to scan all files."
2. Run a full system scan.
3. If any files are detected as infected with Trojan.ByteVerify, click Delete.
If no joy, technical helpline : 07931366064
Have you sorted this yet ?
Run both Norton's and AVG in Safe mode and see if it will clean / delete the file. If not, delete this file c:windows\system32\msvol.tlb
It's not a neccessary windows file, so it can safely be binned.
As for the java one
Trojan.ByteVerify is a Trojan Horse that exploits the vulnerability described in Microsoft Security Bulletin MS03-011 and could provide a hacker the ability to run arbitrary code on an infected system.
Also Known As: Exploit-ByteVerify [McAfee], Exploit.Java.Bytverify [KAV], JAVA_BYTVERIFY.A [Trend]
Type: Trojan Horse
Infection Length: various
Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP
Systems Not Affected: Linux, Macintosh, OS/2, UNIX
CVE References: CAN-2003-0111
technical details
When Trojan.ByteVerify is executed, it performs the following actions:
1. Escapes the sandbox restrictions, using Blackbox.class, by doing the following:
1. Declares a new PermissionDataSet with setFullyTrusted set to TRUE.
2. Creates a trusted PermissionSet.
3. Sets permission to PermissionSet by creating its own URLClassLoader class, derived from the VerifierBug.class.
2. Loads Beyond.class using the URLClassLoader from Blackbox.class.
3. Gains unrestricted rights on the local machine by invoking the .assertPermission method of the PolicyEngine class in Beyond.class.
4. Opens the Web page, http://www.clavus.net/lst.backs, and parses the text that this site displays.
For example, SP|www.ewebsearch.net/sp.htm means that the Internet Explorer Start Page will be set up to www.ewebsearch.net/sp.htm
5. Several pornographic links are added into the favorites.
6. May attempt to retrieve dialer programs and install them on the infected computer. The dialer programs may attempt to connect the infected computer to pornographic Web sites.
Notes:
* Trojan.ByteVerify will typically arrive as a component of other malicious content. An attacker could use the compiled Java class file to execute other code. The file will likely exist as VerifierBug.Class. For example, an attacker could create a .html file that uses the Trojan, and then create a script file that will perform other actions, such as setting the Internet Explorer Start Page.
* Notification of infection does not always indicate that a machine has been infected; it only indicates that a program included the viral class file. This does not mean that it used the malicious functionality.
recommendations
Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":
* Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.
* If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
* Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services (for example, all Windows-based computers should have the current Service Pack installed.). Additionally, please apply any security updates that are mentioned in this writeup, in trusted Security Bulletins, or on vendor Web sites.
* Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
* Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.
* Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.
* Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.
removal instructions
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Disable System Restore (Windows Me/XP).
2. Update the virus definitions.
3. Restart the computer in Safe mode or VGA mode.
4. Run a full system scan and delete all the files detected as Trojan.ByteVerify.
For specific details on each of these steps, read the following instructions.
1. Disabling System Restore (Windows Me/XP)
If you are running Windows Me or Windows XP, we recommend that you temporarily turn off System Restore. Windows Me/XP uses this feature, which is enabled by default, to restore the files on your computer in case they become damaged. If a virus, worm, or Trojan infects a computer, System Restore may back up the virus, worm, or Trojan on the computer.
Windows prevents outside programs, including antivirus programs, from modifying System Restore. Therefore, antivirus programs or tools cannot remove threats in the System Restore folder. As a result, System Restore has the potential of restoring an infected file on your computer, even after you have cleaned the infected files from all the other locations.
Also, a virus scan may detect a threat in the System Restore folder even though you have removed the threat.
For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:
* "How to disable or enable Windows Me System Restore"
* "How to turn off or turn on Windows XP System Restore"
For additional information, and an alternative to disabling Windows Me System Restore, see the Microsoft Knowledge Base article, "Antivirus Tools Cannot Clean Infected Files in the _Restore Folder," Article ID: Q263455.
2. Updating the virus definitions
Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
* Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
* Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).
The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.
3. Restarting the computer in Safe mode or VGA mode
Shut down the computer and turn off the power. Wait for at least 30 seconds, and then restart the computer in Safe mode or VGA mode.
* For Windows 95, 98, Me, 2000, or XP users, restart the computer in Safe mode. For instructions, read the document, "How to start the computer in Safe Mode."
* For Windows NT 4 users, restart the computer in VGA mode.
4. Scanning for and deleting the infected files
1. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
* For Norton AntiVirus consumer products: Read the document, "How to configure Norton AntiVirus to scan all files."
* For Symantec AntiVirus Enterprise products: Read the document, "How to verify that a Symantec Corporate antivirus product is set to scan all files."
2. Run a full system scan.
3. If any files are detected as infected with Trojan.ByteVerify, click Delete.
If no joy, technical helpline : 07931366064
10K+ Poster!!
iTrader: (1)
Joined: Jun 2003
Posts: 13,450
Likes: 2
From: Dartford, Kent - Home of the two way one way system.
Benn, if i were you i get to Asda, get a 24 pack of Stella and tempt Dan into your bedroom
As all that above looks far to complicated for us meer mortals!!
As all that above looks far to complicated for us meer mortals!!
Originally Posted by BillyCabrio
Benn, if i were you i get to Asda, get a 24 pack of Stella and tempt Dan into your bedroom
As all that above looks far to complicated for us meer mortals!!
As all that above looks far to complicated for us meer mortals!!

Originally Posted by BillyCabrio
Benn, if i were you i get to Asda, get a 24 pack of Stella and tempt Dan into your bedroom
As all that above looks far to complicated for us meer mortals!!
As all that above looks far to complicated for us meer mortals!!

Originally Posted by BillyCabrio
Benn, if i were you i get to Asda, get a 24 pack of Stella and tempt Dan into your bedroom
By the way Dan its been renovated now with new "specialist equipment"
Going to give all this a try tomorrow, as I cant be arsed at the mo lol.


