Solved

HOMO.EXE ? Virus

Posted on 2004-09-03
8
857 Views
Last Modified: 2008-01-09
Would anyone know how to remove the homo.exe from Task Manager processes. It use up all the CPU usage.  We have a server with it.
0
Comment
Question by:mmoreau45
8 Comments
 
LVL 65

Expert Comment

by:SheharyaarSaahil
ID: 11976076
Hello mmoreau45 =)

U must be having a startup entry in Start>Run>msconfig>Startup list, or a registry entry in Startup Run keys in regedit.... delete its keys or untick it in msconfig, then restart in safemode, and delete this file !!!
Restart in Normal Mode and now u shudn't be having it :)

!! GOOD LUCK !!
0
 
LVL 6

Expert Comment

by:icemanwol
ID: 11977199
If you are still haveing problems, post a hijackthis log and we will see what we can do :-)
http://www.spychecker.com/program/hijackthis.html
0
 
LVL 5

Expert Comment

by:Hypoviax
ID: 11987156
Yes, first do what SheharyaarSaahil said but then also update your antivirus software, run it on ALL machines, and then install spybot Search and Destroy from the address below also running on all machines:

http://www.safer-networking.org/en/index.html

Also make sure you have a corporate firewall so as to block programs coming down without your knowledge. Zonealarm is a good choice but others also may be worthwhile:

www.zonelabs.com

Regards,

Hypoviax
0
 
LVL 8

Expert Comment

by:bobo_tech
ID: 11994495
I had a problem with a similiar little bugger today.  I forgot the exact name of the file but it was something like mvsnut.exe.   Anyway, i did all my tricks.  Adaware and then msconfig.

It woudn't go away.

I would end the process and within a second, it would restart itself.

I ran hijack this and deleted the BHO for that file.  It reappeared as sooon as i rescanned.

Finally I rebooted into safe mode with command prompt only.  Once in the command prompt mode, I manually erased that file (it was in the windows folder).  I then rebooted, got an error that the file coudn't be found and then the problem didn't reoccur.

I rescanned with hijack this and could not find that same file, so I was happy.
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 8

Accepted Solution

by:
bobo_tech earned 50 total points
ID: 11994499
Another point, that file that I had to remove kept on sucking up 100 percent of the cpu as well.

0
 

Author Comment

by:mmoreau45
ID: 12200008
In Win XP Pro, login as the Admin I am unable to remove TCP/IP from the NIC setings.  Is there a work around other than Safe Mode.
0
 

Author Comment

by:mmoreau45
ID: 12249475
Please excuse me but I did get the answer to my question.  It seems that our Active Directory has control of the Policies set in the Domain.
0
 

Author Comment

by:mmoreau45
ID: 12249567
I have a W2K system and the exployer.exe (I beleive this is Windows Exployer) is malfuntioning and pop ups an error stating it can not read the memory.  Any ideas of how I can repair this with out surgery of the format of re-install OS.
0

Featured Post

Network it in WD Red

There's an industry-leading WD Red drive for every compatible NAS system to help fulfill your data storage needs. With drives up to 8TB, WD Red offers a wide array of solutions for customers looking to build the biggest, best-performing NAS storage solution.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now