We'd like to remind Forumites to please avoid political debate on the Forum... Read More »
Trojan Byte Verify

pug_in_a_bed
Posts: 1,975 Forumite
in Techie Stuff
Hello
I have started a new thread about this annoying java thin gso as not to get confused with the more recent one.
Mcafee kept finding this self-replicating trojan and I had gone through the steps to get rid, at least I think anyway.
Anyhoo, I have just put two and two together. I kept scanning with mcafee the past few days, and also the online scans available from trend micro and panda.
I have just realised that every time I do a scan with trend micro, half way through I get a pop up from mcafee telling me that it has found the trojan 'exploit-obscuredhtml' in c\docs and settings\my name\temp, and it has been cleaned and deleted. It is this which has prompted me previously to scan fully with mcafee, which was then showing up every time the 'Byte Verify' one.
Is this a false finding? or is it something to do with trend micro and what it is accessing when scanning?
Quite confused now, as I'm wondering if trend micro is having some effect on the virus....
Thanks for any suggestions, I will go through all the steps again I used previously.
EDIT: just gone back through the steps suggested by pchelpman in the first thread about the java deployment cache and the folder i emptied now has something in it again - a folder called v1.0. In this is a fodler called 'jar' with a zip file in (i think). Should I delete this?
I have started a new thread about this annoying java thin gso as not to get confused with the more recent one.
Mcafee kept finding this self-replicating trojan and I had gone through the steps to get rid, at least I think anyway.
Anyhoo, I have just put two and two together. I kept scanning with mcafee the past few days, and also the online scans available from trend micro and panda.
I have just realised that every time I do a scan with trend micro, half way through I get a pop up from mcafee telling me that it has found the trojan 'exploit-obscuredhtml' in c\docs and settings\my name\temp, and it has been cleaned and deleted. It is this which has prompted me previously to scan fully with mcafee, which was then showing up every time the 'Byte Verify' one.
Is this a false finding? or is it something to do with trend micro and what it is accessing when scanning?
Quite confused now, as I'm wondering if trend micro is having some effect on the virus....
Thanks for any suggestions, I will go through all the steps again I used previously.
EDIT: just gone back through the steps suggested by pchelpman in the first thread about the java deployment cache and the folder i emptied now has something in it again - a folder called v1.0. In this is a fodler called 'jar' with a zip file in (i think). Should I delete this?
0
Comments
-
Well, I can certainly fill in the broad brush of things. You have an infected file. When the online scanner opens the file to check it, McAfee also checks it - that's (part of) what McAfee does, it checks files when they are opened. So now you have two antivirus applications looking at the same file at once.
FWIW McAfee updated their detection files for exploit-obscuredhtml recently, and while we're at it here's McAfee's description of exploit-byteverify. Neither are an infection as such, just a means of infecting. Remind me, why can't you just delete the dodgy files?
SJB0 -
0
-
well i've deleted the files in the deployment bit, done al the scans in safe mode with system restore turned off and nothing was found so I'm hoping this is to be the end of it! I'm sure I must ahve the patch from microsoft as I'm careful about updates, is there anything else I can do?0
-
TBH, I wouldn't be surprised if you're right, and the Trend scan is the root cause of the byteverify detection. Trend does claim to test for vulnerabilities.
You've cleared all the java caches, you've installed Sun java, you've scanned and can't find anything amiss, so that's a fair way down the line. If you want, you can do a scan from safe mode: boot to 'safe mode with command prompt' then enter
cd \prog*\comm*\net*\e*
(depending on your McAfee, that might be cd \prog*\comm*\net*\v*\4*)
scan /adl /all /clean
Again, if you want, you can rip out Microsoft's java altogether, see this page at www.java.com for instructions.
SJB0 -
Just a note AVG wont and cant get shot of this but Avast will.
Dont ask why its just like that and thats the way it is.. Insert bass beat where applicable0
This discussion has been closed.
Confirm your email address to Create Threads and Reply

Categories
- All Categories
- 349.8K Banking & Borrowing
- 252.6K Reduce Debt & Boost Income
- 453K Spending & Discounts
- 242.7K Work, Benefits & Business
- 619.5K Mortgages, Homes & Bills
- 176.3K Life & Family
- 255.6K Travel & Transport
- 1.5M Hobbies & Leisure
- 16.1K Discuss & Feedback
- 15.1K Coronavirus Support Boards