How To Detect and Remove Malware
How To Detect and Remove Malware
7. Uncheck any applications that you suspect to be malware. 8. Click OK and reboot your computer to test.
Port Statistics TCP mappings: 13 UDP mappings: 15 TCP ports in a LISTENING state: TCP ports in a ESTABLISHED state:
6 = 46.15% 7 = 53.85%
Port and Module Information by Process Note: restrictions applied to some processes may prevent PortQry from accessing more information For best results run PortQry in the context of the local administrator ====================================================== Process ID: 0 (System Idle) System Idle Process ====================================================== Process ID: 4 (System) System Process PID Port Local IP State Remote IP:Port 4 TCP 445 0.0.0.0 LISTENING 0.0.0.0:63493 4 TCP 139 168.30.241.19 LISTENING 0.0.0.0:2048 4 TCP 1227 168.30.241.19 ESTABLISHED 168.30.210.18:445 4 TCP 1243 168.30.241.19 ESTABLISHED 168.30.210.83:139 4 TCP 1278 168.30.241.19 ESTABLISHED 168.24.4.141:445 4 TCP 1284 168.30.241.19 ESTABLISHED 168.24.4.142:445 4 TCP 2289 168.30.241.19 ESTABLISHED 168.30.210.38:445 4 TCP 2908 168.30.241.19 ESTABLISHED 168.30.210.18:445 4 TCP 3485 168.30.241.19 ESTABLISHED 168.30.210.87:445 4 UDP 445 0.0.0.0 *:* 4 UDP 137 168.30.241.19 *:* 4 UDP 138 168.30.241.19 *:* ====================================================== Process ID: 548 (smss.exe) Process doesn't appear to be a service ====================================================== Process ID: 620 Process doesn't appear to be a service ====================================================== Process ID: 644 (winlogon.exe) Process doesn't appear to be a service PID Port Local IP State Remote IP:Port 644 UDP 1047 127.0.0.1 *:* ===================================================== Process ID: 688 (services.exe) Service Name: Eventlog Display Name: Event Log Service Type: shares a process with other services Service Name: PlugPlay Display Name: Plug and Play Service Type: shares a process with other services ====================================================== Process ID: 700 (lsass.exe) Service Name: Netlogon Display Name: Net Logon Service Type: shares a process with other services Service Name: PolicyAgent Display Name: IPSEC Services Service Type: shares a process with other services
Service Name: ProtectedStorage Display Name: Protected Storage Service Name: SamSs Display Name: Security Accounts Manager Service Type: shares a process with other services PID Port Local IP State Remote IP:Port 700 UDP 500 0.0.0.0 *:* 700 UDP 4500 0.0.0.0 *:* 700 UDP 1027 127.0.0.1 *:* ====================================================== Process ID: 860 (svchost.exe) Service Name: DcomLaunch Display Name: DCOM Server Process Launcher Service Type: shares a process with other services Service Name: TermService Display Name: Terminal Services Service Type: shares a process with other services PID Port Local IP State Remote IP:Port 860 TCP 3389 0.0.0.0 LISTENING 0.0.0.0:28919 ====================================================== Process ID: 928 Service Name: RpcSs Display Name: Remote Procedure Call (RPC) Service Type: shares a process with other services PID Port Local IP State Remote IP:Port 928 TCP 135 0.0.0.0 LISTENING 0.0.0.0:39054 ====================================================== Process ID: 1020 (svchost.exe) Service Name: AppMgmt Display Name: Application Management Service Type: shares a process with other services Service Name: AudioSrv Display Name: Windows Audio Service Type: shares a process with other services Service Name: BITS Display Name: Background Intelligent Transfer Service Service Type: shares a process with other services Service Name: CryptSvc Display Name: Cryptographic Services Service Type: shares a process with other services Service Name: Dhcp Display Name: DHCP Client Service Type: shares a process with other services Service Name: dmserver Display Name: Logical Disk Manager Service Type: shares a process with other services Service Name: ERSvc Display Name: Error Reporting Service Service Type: shares a process with other services Service Name: EventSystem Display Name: COM+ Event System
Service Type: shares a process with other services Service Name: helpsvc Display Name: Help and Support Service Type: shares a process with other services Service Name: lanmanworkstation Display Name: Workstation Service Type: shares a process with other services Service Name: Messenger Display Name: Messenger Service Type: shares a process with other services Service Name: Netman Display Name: Network Connections Service Name: Nla Display Name: Network Location Awareness (NLA) Service Type: shares a process with other services Service Name: RasMan Display Name: Remote Access Connection Manager Service Type: shares a process with other services Service Name: Schedule Display Name: Task Scheduler Service Name: seclogon Display Name: Secondary Logon Service Name: SENS Display Name: System Event Notification Service Type: shares a process with other services Service Name: SharedAccess Display Name: Windows Firewall/Internet Connection Sharing (ICS) Service Type: shares a process with other services Service Name: ShellHWDetection Display Name: Shell Hardware Detection Service Type: shares a process with other services Service Name: TapiSrv Display Name: Telephony Service Type: shares a process with other services Service Name: Themes Display Name: Themes Service Type: shares a process with other services Service Name: TrkWks Display Name: Distributed Link Tracking Client Service Type: shares a process with other services Service Name: W32Time Display Name: Windows Time Service Type: shares a process with other services Service Name: winmgmt Display Name: Windows Management Instrumentation Service Type: shares a process with other services
Service Name: wuauserv Display Name: Automatic Updates Service Type: shares a process with other services Service Name: WZCSVC Display Name: Wireless Zero Configuration Service Type: shares a process with other services PID Port Local IP State Remote IP:Port 1020 UDP 123 127.0.0.1 *:* 1020 UDP 123 168.30.241.9 *:* ====================================================== Process ID: 1072 Service Name: Dnscache Display Name: DNS Client Service Type: shares a process with other services PID Port Local IP State Remote IP:Port 1072 UDP 1025 0.0.0.0 *:* 1072 UDP 1026 0.0.0.0 *:* ====================================================== Process ID: 1112 Service Name: LmHosts Display Name: TCP/IP NetBIOS Helper Service Type: shares a process with other services Service Name: WebClient Display Name: WebClient Service Type: shares a process with other services ======================================================
PID Port Local IP State Remote IP:Port 1600 UDP 1346 0.0.0.0 *:* ======================================================
PID Port Local IP State Remote IP:Port 1656 TCP 3580 0.0.0.0 LISTENING 0.0.0.0:20645 ======================================================
Service Name: UMWdf Display Name: Windows User Mode Driver Framework Service Type: runs in its own process ====================================================== Process ID: 156
Service Name: ALG Display Name: Application Layer Gateway Service Service Type: runs in its own process PID Port Local IP State Remote IP:Port 156 TCP 1042 127.0.0.1 LISTENING 0.0.0.0:39166 ====================================================== Process ID: 2076 (Explorer.EXE) Process doesn't appear to be a service ====================================================== Process ID: 3520 (spoolsv.exe) Service Name: Spooler Display Name: Print Spooler PID Port Local IP State Remote IP:Port 3520 UDP 2038 127.0.0.1 *:* ====================================================== Process ID: 3484 (svchost.exe) Service Name: stisvc Display Name: Windows Image Acquisition (WIA) Service Type: shares a process with other services ======================================================
2. Install Ad-Aware SE Professional or comparable Ad-Aware SE program. 3. Double-click RunAdAware.vbs to execute it.
4. All instances of Explorer.exe (the GUI and Windows Explorer windows) and Internet Explorer will be terminated. Ad-Aware SE will run, automatically updated its definition file, and remove spyware. 5. Explorer.exe (the GUI) will load again.
6. Double-click KillSpyware.bat to execute it. 7. All instances of Explorer.exe (the GUI and Windows Explorer windows) and Internet Explorer will be terminated. All watchful spyware processes will be terminated. Explorer.exe (the GUI) will load again. 8. Run Ad-Aware SE or remove spyware manually. Taskkill.exe is a utility that is built into Windows XP that can be used to kill processes. The /F switch means Force a process to end. The /T switch automatically kills any child processes. And the /IM switch is used to identify the process name such as explorer.exe.