C:\resycled\ntldr.com is not vaild

Sony / Pcv-rs430g(uc)
January 19, 2009 at 11:32:03
Specs: Microsoft Windows XP Home Edition, 2.793 GHz / 1023 MB
I keep getting this error message when i try to open can local disk c. C:\resycled\ntldr.com is not vaild win32 application.and on my d drive
The only way to get in is right click then by clicking explore, but the main thing is i cannot not scan with my Norton to check any virus and i cant defrag it. I ran the malwarebytes and the hijack this. Here is what Malwarebytes showed:
Malwarebytes' Anti-Malware 1.33
Database version: 1668
Windows 5.1.2600 Service Pack 2

1/19/2009 10:58:47 AM
mbam-log-2009-01-19 (10-58-47).txt

Scan type: Quick Scan
Objects scanned: 61114
Time elapsed: 11 minute(s), 0 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{549b5ca7-4a86-11d7-a4df-000874180bb3} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\videoplay (Trojan.DNSChanger) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Documents and Settings\Diane\Local Settings\Temporary Internet Files\Content.IE5\PBEJDPT7\setup[2].exe (Rogue.Installer) -> Quarantined and deleted successfully.


I have done the HijackThis too if you want that log file too. Should I go ahead and do the combo fix. I just want to be able to get into my drives and not have these dang trojans. I would also like to know what I can use for virus protection. Please help me.

Thank you



See More: C:\resycled\ntldr.com is not vaild

Report •


#1
January 20, 2009 at 15:58:14
PLease post your Hijack This log.

Report •

#2
January 21, 2009 at 08:28:13
Here it is

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:47:00 PM, on 1/20/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16762)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Java\jre6\bin\jusched.exe
C:\WINDOWS\system32\ezSP_Px.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Sony\usbsircs\USBsircs.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\msiexec.exe
D:\PROGRA~1\avgwdsvc.exe
C:\Program Files\Internet Explorer\iexplore.exe
D:\PROGRA~1\avgrsx.exe
C:\Program Files\MSN\Toolbar\3.0.0988.2\msntask.exe
D:\PROGRA~1\avgemc.exe
D:\PROGRA~1\aAvgApi.exe
D:\Program Files\avgtray.exe
D:\Program Files\NoAdware\NoAdware5.exe
D:\virus software\tools.exe
C:\WINDOWS\System32\wbem\wmiprvse.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.comcast.net/toolbar2.0/s...
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?Lin...
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?Lin...
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?Lin...
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?Lin...
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.comcast.net/toolbar2.0/s...
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = \blank.htm
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = wmplayer.exe //ICWLaunch
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - D:\Program Files\avgssie.dll
O2 - BHO: Comcast Toolbar - {4E7BD74F-2B8D-469E-93BE-BE2DF4D9AE29} - C:\PROGRA~1\COMCAS~1\COMCAS~1.DLL
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: AVG Security Toolbar - {A057A204-BACC-4D26-9990-79A187E2698E} - D:\PROGRA~1\AVGTOO~1.DLL
O2 - BHO: MSN Toolbar Helper - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files\MSN\Toolbar\3.0.0988.2\msneshellx.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl Class - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: MSN Toolbar - {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - C:\Program Files\MSN\Toolbar\3.0.0988.2\msneshellx.dll
O3 - Toolbar: Comcast Toolbar - {4E7BD74F-2B8D-469E-93BE-BE2DF4D9AE29} - C:\PROGRA~1\COMCAS~1\COMCAS~1.DLL
O3 - Toolbar: AVG Security Toolbar - {A057A204-BACC-4D26-9990-79A187E2698E} - D:\PROGRA~1\AVGTOO~1.DLL
O4 - HKLM\..\Run: [VAIO Recovery] C:\Windows\Sonysys\VAIO Recovery\PartSeal.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [VAIOSurvey] c:\program files\sony\vaio survey\surveysa.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
O4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINDOWS\system32\ezSP_Px.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
O4 - HKLM\..\Run: [AVG8_TRAY] D:\PROGRA~1\avgtray.exe
O4 - HKLM\..\RunOnce: [VcCleanUp.exe] C:\DOCUME~1\Diane\LOCALS~1\Temp\VcCleanUp.exe /F C:\PROGRA~1\COMMON~1\SYMANT~1\LiveReg\ /RemoveAll
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MoneyAgent] "C:\Program Files\Microsoft Money\System\mnyexpr.exe"
O4 - Global Startup: Billminder.lnk = C:\Program Files\Quicken\billmind.exe
O4 - Global Startup: Quicken Scheduled Updates.lnk = C:\Program Files\Quicken\bagent.exe
O4 - Global Startup: Remocon Driver.lnk = ?
O8 - Extra context menu item: E&xport to Microsoft Excel - res://D:\PROGRA~1\Office12\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - D:\PROGRA~1\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.sony.com/vaiopeople
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microso...
O16 - DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - http://download.eset.com/special/eo...
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.6.0) - http://dl8-cdn-01.sun.com/s/ESD5/JS...
O16 - DPF: {B1E2B96C-12FE-45E2-BEF1-44A219113CDD} (SABScanProcesses Class) - http://www.superadblocker.com/activ...
O16 - DPF: {EF791A6B-FC12-4C68-99EF-FB9E207A39E6} (McFreeScan Class) - http://download.mcafee.com/molbin/i...
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - D:\Program Files\avgpp.dll
O20 - AppInit_DLLs: avgrsstx.dll
O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - D:\PROGRA~1\avgemc.exe
O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - D:\PROGRA~1\avgwdsvc.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\PROGRA~1\COMMON~1\SONYSH~1\AVLib\Sptisrv.exe
O23 - Service: VAIO Media Music Server (VAIOMediaPlatform-MusicServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Music\SSSvr.exe
O23 - Service: VAIO Media Music Server (HTTP) (VAIOMediaPlatform-MusicServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
O23 - Service: VAIO Media Music Server (UPnP) (VAIOMediaPlatform-MusicServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
O23 - Service: VAIO Media Photo Server (VAIOMediaPlatform-PhotoServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Photo\appsrv\PhotoAppSrv.exe
O23 - Service: VAIO Media Photo Server (HTTP) (VAIOMediaPlatform-PhotoServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
O23 - Service: VAIO Media Photo Server (UPnP) (VAIOMediaPlatform-PhotoServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
O23 - Service: VAIO Media Video Server (VAIOMediaPlatform-VideoServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Video\GPVSvr.exe
O23 - Service: VAIO Media Video Server (HTTP) (VAIOMediaPlatform-VideoServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
O23 - Service: VAIO Media Video Server (UPnP) (VAIOMediaPlatform-VideoServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe

--
End of file - 8999 bytes




Report •

#3
January 21, 2009 at 12:15:37
i hope that someone can help me with this asap. i now have a firewall and avg virus protection again . i have run several different scans and they say they delete the problem but they dont . i still cant open my c and d drives

Report •

Related Solutions

#4
January 21, 2009 at 14:06:45
Please download ComboFix to the desktop from one of the following links:

Link1

Link 2

Link 3

Rename the setup file, combofix.exe, before you download it. To do that once the "enter name of file to save to" box appears as the download begins in the filename box rename combofix.exe to toolb.exe> click save.

Combofix is a powerful tool so follow the instructions exactly or you could damage your computer.

Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with Combofix and remove some of its embedded files which may cause "unpredictable results".
Click on This Link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

In your case to run Combofix do the following:
1. Go offline turn off your AVG antivirus, and any other antispyware that you may have.
2. Run Combofix and save its log.
3. Restart the computer to get the antivirus running again but leave the antispyware programs off until we get the computer cleaned.
4. Post the Combofix log.


Remember to re-enable the protection again afterwards before connecting to the Internet.

Double-click combofix.exe
Follow the prompts.
(Don't click on the window while the program is running or move the mouse, it will cause your system to hang.)
Please post the log it produces.


Report •

#5
January 22, 2009 at 08:02:05
Jabuck,
i love you from the bottom of my heart!!! i had the same problem as dreamcatcher (resycled\ntldr.com is not a valid win32 application). combo fixed everything. i had a full library of music and more. i was convinced i was gonna lose it all i found this site. thank you sooooo much!!

Report •

#6
January 22, 2009 at 11:08:50
Here is the log for the Combo Fix:

ComboFix 09-01-21.02 - Diane 2009-01-22 10:26:06.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1023.611 [GMT -8:00]
Running from: d:\virus software\toolb.exe
AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated)
FW: COMODO Firewall *disabled*
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\autorun.inf
D:\Autorun.inf
D:\resycled
d:\resycled\ntldr.com

.
((((((((((((((((((((((((( Files Created from 2008-12-22 to 2009-01-22 )))))))))))))))))))))))))))))))
.

2009-01-22 08:22 . 2009-01-22 08:22 <DIR> d-------- c:\documents and settings\LocalService\Application Data\HP
2009-01-22 08:19 . 2009-01-22 08:19 <DIR> d-------- c:\program files\Common Files\HP
2009-01-22 08:19 . 2009-01-22 08:19 <DIR> d-------- c:\documents and settings\All Users\Application Data\HP
2009-01-22 08:16 . 2009-01-22 08:16 <DIR> d-------- c:\program files\Hewlett-Packard
2009-01-22 08:15 . 2009-01-22 08:15 <DIR> d-------- c:\program files\Common Files\Hewlett-Packard
2009-01-22 08:14 . 2004-09-29 12:12 278,584 --a------ c:\windows\system32\HPZidr12.dll
2009-01-22 08:14 . 2004-09-29 12:15 204,800 --a------ c:\windows\system32\HPZipr12.dll
2009-01-22 08:14 . 2004-09-29 12:09 94,208 --a------ c:\windows\system32\HPZipt12.dll
2009-01-22 08:14 . 2004-09-29 12:14 69,632 --a------ c:\windows\system32\HPZipm12.exe
2009-01-22 08:14 . 2004-09-29 12:08 61,440 --a------ c:\windows\system32\HPZinw12.exe
2009-01-22 08:14 . 2004-09-29 12:09 57,344 --a------ c:\windows\system32\HPZisn12.dll
2009-01-22 08:12 . 2009-01-22 08:14 <DIR> d-------- c:\program files\HP
2009-01-22 08:10 . 2009-01-22 08:21 89,266 --a------ c:\windows\hpoins06.dat
2009-01-22 08:10 . 2005-03-07 20:52 51,120 -ra------ c:\windows\system32\drivers\HPZid412.sys
2009-01-22 08:10 . 2005-03-07 20:52 16,496 -ra------ c:\windows\system32\drivers\HPZipr12.sys
2009-01-22 08:10 . 2005-06-02 19:31 5,389 --------- c:\windows\hpomdl06.dat
2009-01-22 08:09 . 2005-04-07 17:50 827,392 -ra------ c:\windows\system32\hpotiop2.dll
2009-01-22 08:09 . 2005-04-07 17:50 278,528 -ra------ c:\windows\system32\hpowiamd.dll
2009-01-22 08:09 . 2005-03-07 20:49 274,432 -ra------ c:\windows\system32\HPZc3212.dll
2009-01-22 08:09 . 2005-04-07 17:50 258,122 -ra------ c:\windows\system32\hpovst09.dll
2009-01-22 08:09 . 2005-03-15 11:36 77,824 -ra------ c:\windows\system32\hpzids01.dll
2009-01-22 08:09 . 2005-05-05 08:51 37,376 --a------ c:\windows\system32\hpz3l3xu.dll
2009-01-22 08:09 . 2008-04-13 10:47 25,856 --a------ c:\windows\system32\drivers\usbprint.sys
2009-01-22 08:09 . 2008-04-13 10:47 25,856 --a--c--- c:\windows\system32\dllcache\usbprint.sys
2009-01-22 08:09 . 2005-03-07 20:52 21,744 -ra------ c:\windows\system32\drivers\HPZius12.sys
2009-01-22 08:08 . 2008-04-13 10:45 15,104 --a------ c:\windows\system32\drivers\usbscan.sys
2009-01-22 08:08 . 2008-04-13 10:45 15,104 --a--c--- c:\windows\system32\dllcache\usbscan.sys
2009-01-21 13:06 . 2009-01-22 10:29 54,156 --ah----- c:\windows\QTFont.qfn
2009-01-21 13:06 . 2009-01-22 10:27 1,409 --a------ c:\windows\QTFont.for
2009-01-21 12:31 . 2009-01-21 12:31 2,560 --a------ c:\windows\system32\drivers\mchInjDrv.sys
2009-01-21 12:30 . 2009-01-21 12:39 <DIR> d-a------ c:\documents and settings\All Users\Application Data\TEMP
2009-01-21 12:28 . 2009-01-21 12:28 <DIR> d-------- c:\program files\Common Files\Download Manager
2009-01-21 11:59 . 2009-01-21 11:59 <DIR> d-------- c:\windows\system32\LogFiles
2009-01-21 09:59 . 2009-01-21 09:59 <DIR> d-------- c:\windows\Luxor Mah Jong
2009-01-21 09:42 . 2009-01-21 11:53 <DIR> d-------- c:\documents and settings\All Users\Application Data\comodo
2009-01-21 09:42 . 2009-01-21 09:42 147,192 --a------ c:\windows\system32\guard32.dll
2009-01-21 09:42 . 2009-01-21 09:42 101,776 --a------ c:\windows\system32\drivers\cmdguard.sys
2009-01-21 09:42 . 2009-01-21 09:42 31,504 --a------ c:\windows\system32\drivers\cmdhlp.sys
2009-01-20 12:39 . 2009-01-22 08:07 <DIR> d-------- c:\windows\system32\drivers\Avg
2009-01-20 12:39 . 2009-01-20 12:39 <DIR> d-------- c:\program files\AVG
2009-01-20 12:39 . 2009-01-20 13:05 <DIR> d-------- c:\documents and settings\Diane\Application Data\AVGTOOLBAR
2009-01-20 12:39 . 2009-01-20 12:39 <DIR> d-------- c:\documents and settings\All Users\Application Data\avg8
2009-01-20 12:39 . 2009-01-20 12:39 97,928 --a------ c:\windows\system32\drivers\avgldx86.sys
2009-01-20 12:39 . 2009-01-20 12:39 76,040 --a------ c:\windows\system32\drivers\avgtdix.sys
2009-01-20 12:39 . 2009-01-20 12:39 10,520 --a------ c:\windows\system32\avgrsstx.dll
2009-01-19 12:26 . 2009-01-19 12:26 0 --a------ C:\winamp.ini
2009-01-19 11:05 . 2008-04-13 16:12 221,184 --a------ c:\windows\system32\wmpns.dll
2009-01-19 10:46 . 2009-01-19 10:46 <DIR> d-------- c:\documents and settings\Diane\Application Data\Malwarebytes
2009-01-19 10:46 . 2009-01-19 10:46 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-01-19 10:46 . 2009-01-14 16:11 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-01-19 10:01 . 2009-01-19 10:01 <DIR> d-------- c:\windows\system32\scripting
2009-01-19 10:01 . 2009-01-19 10:01 <DIR> d-------- c:\windows\l2schemas
2009-01-19 10:00 . 2009-01-19 10:00 <DIR> d-------- c:\windows\system32\en
2009-01-19 09:52 . 2009-01-21 05:32 72 --a------ c:\windows\wininit.ini
2009-01-19 09:25 . 2009-01-19 12:14 <DIR> d-------- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-01-19 08:59 . 2009-01-19 08:59 <DIR> d-------- c:\program files\Common Files\Scanner
2009-01-19 08:59 . 2009-01-19 08:59 <DIR> d-------- c:\program files\ComcastToolbar
2009-01-19 08:59 . 2009-01-22 10:06 <DIR> d-------- c:\documents and settings\Diane\Application Data\ComcastToolbar
2009-01-19 08:47 . 2009-01-19 12:16 <DIR> d-------- c:\documents and settings\Diane\Application Data\SUPERAntiSpyware.com
2009-01-19 08:47 . 2009-01-19 08:47 <DIR> d-------- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-01-19 08:23 . 2008-10-16 14:06 268,648 --a------ c:\windows\system32\mucltui.dll
2009-01-19 08:23 . 2008-10-16 14:06 27,496 --a------ c:\windows\system32\mucltui.dll.mui
2009-01-19 07:57 . 2009-01-19 07:57 <DIR> d-------- c:\windows\McAfee.com
2009-01-19 07:50 . 2009-01-19 07:52 <DIR> d-------- c:\documents and settings\Diane\.housecall6.6
2009-01-19 07:49 . 2009-01-19 07:49 <DIR> d-------- c:\windows\Sun
2009-01-19 07:49 . 2009-01-19 07:49 410,984 --a------ c:\windows\system32\deploytk.dll
2009-01-19 07:49 . 2009-01-19 07:49 73,728 --a------ c:\windows\system32\javacpl.cpl
2009-01-19 07:48 . 2009-01-19 07:48 <DIR> d-------- c:\program files\Java
2009-01-19 07:36 . 2009-01-19 07:36 151 --a------ c:\documents and settings\Diane\error.bat
2009-01-19 07:13 . 2009-01-19 07:13 <DIR> d-------- c:\program files\MSXML 4.0
2009-01-19 06:52 . 2008-10-16 12:38 6,066,176 -----c--- c:\windows\system32\dllcache\ieframe.dll
2009-01-19 06:52 . 2007-04-17 01:32 2,455,488 -----c--- c:\windows\system32\dllcache\ieapfltr.dat
2009-01-19 06:52 . 2007-03-07 21:10 991,232 -----c--- c:\windows\system32\dllcache\ieframe.dll.mui
2009-01-19 06:52 . 2008-10-16 12:38 459,264 -----c--- c:\windows\system32\dllcache\msfeeds.dll
2009-01-19 06:52 . 2008-10-16 12:38 383,488 -----c--- c:\windows\system32\dllcache\ieapfltr.dll
2009-01-19 06:52 . 2008-10-16 12:38 267,776 -----c--- c:\windows\system32\dllcache\iertutil.dll
2009-01-19 06:52 . 2008-10-16 12:38 63,488 -----c--- c:\windows\system32\dllcache\icardie.dll
2009-01-19 06:52 . 2008-10-16 12:38 52,224 -----c--- c:\windows\system32\dllcache\msfeedsbs.dll
2009-01-19 06:52 . 2008-10-16 05:11 13,824 -----c--- c:\windows\system32\dllcache\ieudinit.exe
2009-01-19 06:46 . 2007-08-13 18:54 33,792 --a--c--- c:\windows\system32\dllcache\custsat.dll
2009-01-19 06:44 . 2009-01-19 06:44 <DIR> d-------- c:\documents and settings\All Users\Application Data\HipSoft
2009-01-19 06:22 . 2009-01-19 06:22 <DIR> d-------- c:\program files\ReflexiveArcade
2009-01-18 12:19 . 2009-01-19 07:36 <DIR> d-------- c:\program files\Common Files\Audio
2009-01-18 08:19 . 2009-01-18 08:19 <DIR> d-------- c:\program files\Corel
2009-01-18 08:19 . 2009-01-18 08:19 <DIR> d-------- c:\program files\Common Files\Corel
2009-01-18 08:19 . 2009-01-18 08:19 <DIR> d-------- c:\documents and settings\All Users\Application Data\InstallShield
2009-01-18 08:16 . 2009-01-18 08:16 848 --ahs---- c:\windows\system32\KGyGaAvL.sys
2009-01-18 08:11 . 2009-01-18 08:11 <DIR> d-------- c:\documents and settings\Diane\Application Data\Corel
2009-01-17 16:23 . 2009-01-17 16:25 <DIR> d-------- c:\windows\SHELLNEW
2009-01-17 16:22 . 2009-01-17 16:22 <DIR> d-------- c:\program files\Microsoft SQL Server
2009-01-17 16:22 . 2009-01-19 07:17 <DIR> d-------- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-01-17 15:46 . 2008-09-09 17:14 1,307,648 --------- c:\windows\system32\msxml6.dll
2009-01-17 15:45 . 2008-04-13 16:12 786,432 -----c--- c:\windows\system32\dllcache\migrate.exe
2009-01-17 15:40 . 2009-01-17 16:39 <DIR> d-------- c:\documents and settings\Diane\Application Data\GetRightToGo
2009-01-17 15:29 . 2008-08-14 02:11 2,189,184 -----c--- c:\windows\system32\dllcache\ntoskrnl.exe
2009-01-17 15:29 . 2008-08-14 02:09 2,145,280 -----c--- c:\windows\system32\dllcache\ntkrnlmp.exe
2009-01-17 15:29 . 2008-08-14 01:33 2,066,048 -----c--- c:\windows\system32\dllcache\ntkrnlpa.exe
2009-01-17 15:29 . 2008-08-14 01:33 2,023,936 -----c--- c:\windows\system32\dllcache\ntkrpamp.exe
2009-01-17 15:29 . 2008-09-15 04:12 1,846,400 -----c--- c:\windows\system32\dllcache\win32k.sys
2009-01-17 15:29 . 2008-04-11 11:04 691,712 -----c--- c:\windows\system32\dllcache\inetcomm.dll
2009-01-17 15:29 . 2008-10-24 03:21 455,296 -----c--- c:\windows\system32\dllcache\mrxsmb.sys
2009-01-17 15:29 . 2008-12-11 02:57 333,952 -----c--- c:\windows\system32\dllcache\srv.sys
2009-01-17 15:29 . 2008-05-01 06:33 331,776 -----c--- c:\windows\system32\dllcache\msadce.dll
2009-01-17 15:29 . 2008-06-13 03:05 272,128 -----c--- c:\windows\system32\dllcache\bthport.sys
2009-01-17 15:29 . 2008-05-08 06:02 203,136 -----c--- c:\windows\system32\dllcache\rmcast.sys
2009-01-17 15:28 . 2008-10-15 08:34 337,408 -----c--- c:\windows\system32\dllcache\netapi32.dll
2009-01-16 16:34 . 2009-01-16 16:34 <DIR> d-------- c:\windows\provisioning
2009-01-16 16:34 . 2009-01-19 10:00 <DIR> d-------- c:\windows\peernet
2009-01-16 16:32 . 2009-01-19 10:01 <DIR> d-------- c:\windows\ServicePackFiles
2009-01-16 16:27 . 2009-01-19 09:39 <DIR> d-------- c:\windows\EHome
2009-01-16 16:09 . 2002-04-15 21:11 67,866 --------- c:\windows\system32\drivers\netwlan5.img
2009-01-16 16:09 . 2008-04-14 05:42 11,264 --------- c:\windows\system32\spnpinst.exe
2009-01-16 16:09 . 2004-08-02 14:20 7,208 --------- c:\windows\system32\secupd.sig
2009-01-16 16:09 . 2004-08-02 14:20 4,569 --------- c:\windows\system32\secupd.dat
2009-01-16 16:02 . 2009-01-16 16:02 <DIR> d--hs---- c:\documents and settings\Diane\UserData
2009-01-16 13:16 . 2009-01-19 10:00 <DIR> d-------- c:\windows\system32\bits
2009-01-16 13:15 . 2009-01-20 05:20 <DIR> d--h----- c:\windows\$hf_mig$
2009-01-16 13:15 . 2008-04-13 09:39 438,784 --a------ c:\windows\system32\xpob2res.dll
2009-01-16 13:15 . 2008-04-13 16:12 354,304 --a------ c:\windows\system32\winhttp.dll
2009-01-16 13:15 . 2007-08-10 20:46 26,488 --a------ c:\windows\system32\spupdsvc.exe
2009-01-16 13:15 . 2008-04-13 16:12 18,944 --a------ c:\windows\system32\qmgrprxy.dll
2009-01-16 13:15 . 2008-04-13 16:11 8,192 --------- c:\windows\system32\bitsprx2.dll
2009-01-16 13:15 . 2008-04-13 16:11 7,168 --------- c:\windows\system32\bitsprx3.dll
2009-01-16 13:11 . 2008-10-16 14:12 561,688 --a------ c:\windows\system32\wuapi.dll
2009-01-16 13:11 . 2008-10-16 14:12 323,608 --a------ c:\windows\system32\wucltui.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-01-20 20:28 --------- d-----w c:\program files\QuickTime
2009-01-20 20:27 --------- d--h--w c:\program files\InstallShield Installation Information
2009-01-20 20:27 --------- d-----w c:\program files\Sony
2009-01-20 20:26 --------- d-----w c:\documents and settings\All Users\Application Data\Sony Corporation
2009-01-20 20:19 --------- d-----w c:\program files\Yahoo!
2009-01-19 20:26 --------- d-----w c:\program files\MoodLogic
2009-01-19 20:26 --------- d-----w c:\program files\Common Files\Real
2009-01-18 16:09 --------- d-----w c:\program files\Quicken
2008-12-11 10:57 333,952 ----a-w c:\windows\system32\drivers\srv.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2008-04-13 1695232]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"VAIO Recovery"="c:\windows\Sonysys\VAIO Recovery\PartSeal.exe" [2003-04-19 28672]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-01-19 136600]
"VAIOSurvey"="c:\program files\sony\vaio survey\surveysa.exe" [2003-03-17 1056768]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2003-08-15 77824]
"IgfxTray"="c:\windows\System32\igfxtray.exe" [2003-04-06 155648]
"ezShieldProtector for Px"="c:\windows\system32\ezSP_Px.exe" [2002-08-20 40960]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2003-07-06 335872]
"AVG8_TRAY"="d:\progra~1\avgtray.exe" [2009-01-20 1261336]
"COMODO Internet Security"="d:\program files\Comodo\COMODO Internet Security\cfp.exe" [2009-01-21 1797880]
"HP Software Update"="d:\program files\HP Software Update\HPWuSchd2.exe" [2005-05-11 49152]
"ATIModeChange"="Ati2mdxx.exe" [2001-09-04 c:\windows\system32\Ati2mdxx.exe]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"VIDC.dvsd"= c:\progra~1\COMMON~1\SONYSH~1\VideoLib\sonydv.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HotKeysCmds]
--a------ 2003-04-06 23:07 114688 c:\windows\system32\hkcmd.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvCplDaemon]
--a------ 2003-07-16 10:22 4743168 c:\windows\system32\nvcpl.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ZTgServerSwitch]
--a------ 2003-06-23 16:32 1409024 c:\program files\support.com\client\bin\tgcmd.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AGRSMMSG]
--a------ 2003-05-23 09:43 88363 c:\windows\AGRSMMSG.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\nwiz]
--a------ 2003-07-16 10:22 323584 c:\windows\system32\nwiz.exe

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\support.com\\client\\bin\\tgcmd.exe"=
"d:\\Program Files\\Office12\\OUTLOOK.EXE"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"d:\\Program Files\\avgemc.exe"=
"d:\\Program Files\\avgupd.exe"=
"d:\\Program Files\\Digital Imaging\\bin\\hpqtra08.exe"=
"d:\\Program Files\\Digital Imaging\\bin\\hpqste08.exe"=
"d:\\Program Files\\Digital Imaging\\bin\\hpofxm08.exe"=
"d:\\Program Files\\Digital Imaging\\bin\\hposfx08.exe"=
"d:\\Program Files\\Digital Imaging\\bin\\hposid01.exe"=
"d:\\Program Files\\Digital Imaging\\bin\\hpqscnvw.exe"=
"d:\\Program Files\\Digital Imaging\\bin\\hpqkygrp.exe"=
"d:\\Program Files\\Digital Imaging\\bin\\hpqCopy.exe"=
"d:\\Program Files\\Digital Imaging\\bin\\hpfccopy.exe"=
"d:\\Program Files\\Digital Imaging\\bin\\hpzwiz01.exe"=
"d:\\Program Files\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"d:\\Program Files\\Digital Imaging\\Unload\\HpqDIA.exe"=
"d:\\Program Files\\Digital Imaging\\bin\\hpoews01.exe"=

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2009-01-20 97928]
R1 cmdGuard;COMODO Internet Security Sandbox Driver;c:\windows\system32\drivers\cmdguard.sys [2009-01-21 101776]
R1 cmdHlp;COMODO Internet Security Helper Driver;c:\windows\system32\drivers\cmdhlp.sys [2009-01-21 31504]
R4 avg8emc;AVG Free8 E-mail Scanner;d:\progra~1\avgemc.exe [2009-01-20 875288]
R4 avg8wd;AVG Free8 WatchDog;d:\progra~1\avgwdsvc.exe [2009-01-20 231704]
R4 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2009-01-20 76040]
.
Contents of the 'Scheduled Tasks' folder

2009-01-16 c:\windows\Tasks\Registration reminder 2.job
- c:\windows\System32\OOBE\oobebaln.exe [2008-04-13 16:12]

2009-01-16 c:\windows\Tasks\Registration reminder 3.job
- c:\windows\System32\OOBE\oobebaln.exe [2008-04-13 16:12]
.
- - - - ORPHANS REMOVED - - - -

WebBrowser-{604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - (no file)
HKCU-Run-MoneyAgent - c:\program files\Microsoft Money\System\mnyexpr.exe


.
------- Supplementary Scan -------
.
uLocal Page = \blank.htm
uInternet Connection Wizard,ShellNext = wmplayer.exe //ICWLaunch
IE: E&xport to Microsoft Excel - d:\progra~1\Office12\EXCEL.EXE/3000
DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos-beta/OnlineScanner.cab
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-01-22 10:29:39
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
r Running Proce
.
d:\program files\Comodo\COMODO Internet Security\cmdagent.exe
c:\program files\Java\jre6\bin\jqs.exe
d:\program files\Digital Imaging\bin\hpqtra08.exe
c:\program files\Sony\usbsircs\USBsircs.exe
d:\progra~1\avgrsx.exe
d:\program files\Digital Imaging\bin\hpqste08.exe
c:\windows\system32\wscntfy.exe
d:\program files\Digital Imaging\Product Assistant\bin\hprblog.exe
.
**************************************************************************
.
Completion time: 2009-01-22 10:31:35 - machine was rebooted
ComboFix-quarantined-files.txt 2009-01-22 18:31:32

Pre-Run: 5,058,973,696 bytes free
Post-Run: 5,020,864,512 bytes free

263 --- E O F --- 2009-01-20 13:20:37

I did notice that after it was done with its log that my printer didnt work so I had to reinstall that. Also there was an error message box that said: Runtime error '462' The remote server machine does not exist or is unavailable. Not sure what that is, but at this point I can now get into my drives by double clicking them. I know that you want to check the log file still to make sure. Please let me know what you find. In the meantime: Thank you, thank you, thank you so very much. I appreciate the time you took out for me and helping me resolve this problem and I will pay better attention to where I go online. I am putting this site on my favorites and I will reccommend it to everyone that needs help. :)


Report •

#7
January 22, 2009 at 14:28:13
Some of these new baddies are removing network drivers, printer drivers, etc. especially on lappies. So it may have removed one other than the printer, however, the error may have only happened do to the printer drivers. If you are not getting the error now it was most likely the printer.

Empty the restore folder. Go to start>control panel>system>system restore tab>check the box beside "turn off system restore>apply (takes a minute)>ok. Go back and uncheck the box to turn system restore back on>apply>ok.


Download ATF Cleaner from this link:
http://www.majorgeeks.com/ATF_Cleaner_d4949.html
Run ATF-Cleaner
Double-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.

Run an online scan with Kaspersky from the following link:
Kaspersky Online Scanner

Note: If you have used this particular scanner before, you MAY HAVE TO UNINSTALL the program through Add/Remove Programs before downloading the new ActiveX component

1. Click Accept, when prompted to download and install the program files and database of malware definitions.
2. Click Run at the Security prompt.
The program will then begin downloading and installing and will also update the database.
Please be patient as this can take several minutes.
3.Once the update is complete, click on My Computer under the green Scan bar to the left to start the scan.
4. Once the scan is complete, it will display if your system has been infected. It does not provide an option to clean/disinfect. We only require a report from it.
5. Do NOT be alarmed by what you see in the report. Many of the finds have likely been quarantined.
6. Click View scan report at the bottom.
7. Click the Save Report As... button.
8. Click the Save as Text button to save the file to your desktop so that you may post it in your next reply.
**Note**

To optimize scanning time and produce a more sensible report for review:
Close any open programs.
Turn off the real-time scanner of all antivirus or antispyware programs while performing the online scan.
Note for Internet Explorer 7 users: If at any time you have trouble viewing the accept button of the license, click on the Zoom tool located at the bottom right of the IE window and set the zoom to 75%. Once the license is accepted, reset to 100%.


Report •

#8
January 22, 2009 at 21:38:11
Here are those logs:

PC Tools Spyware Doctor PC Tools Spyware Doctor
DateStatus
1/22/2009 5:15:53 PM:937Service Started
Spyware Doctor Service Application started
1/22/2009 5:15:53 PM:937Anti-Malware Engine
Anti-Malware engine configuration loaded successfully.
1/22/2009 5:15:53 PM:984Anti-Malware Engine
Anti-Malware detection engine was disabled
1/22/2009 5:16:01 PM:750Scan Started
Scan Type - Intelli-Scan

1/22/2009 5:16:04 PM:640Infection was detected on this computer
Threat Name - Spyware.Known_Bad_Sites
Type - Favourite
Risk Level - High
Infection -
http://service.bfast.com/bfast/clic...
: C:\Documents and Settings\Default User\Favorites\VAIO Special
Offers\Microsoft Offers.url

1/22/2009 5:16:06 PM:718Infection was detected on this computer
Threat Name - Spyware.Known_Bad_Sites
Type - Favourite
Risk Level - High
Infection -
http://service.bfast.com/bfast/clic...
: C:\Documents and Settings\Diane\Favorites\VAIO Special
Offers\Microsoft Offers.url

1/22/2009 5:16:07 PM:812Infection was detected on this computer
Threat Name - Adware.Advertising
Type - Cookie
Risk Level - Low
Infection - ad.yieldmanager.com/ ad.yieldmanager.com

1/22/2009 5:16:07 PM:812Infection was detected on this computer
Threat Name - Adware.Advertising
Type - Cookie
Risk Level - Low
Infection - ad.yieldmanager.com/ ad.yieldmanager.com

1/22/2009 5:16:07 PM:843Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - adecn.com/ adecn.com

1/22/2009 5:16:08 PM:265Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - at.atwola.com/ at.atwola.com

1/22/2009 5:16:08 PM:265Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - at.atwola.com/ at.atwola.com

1/22/2009 5:16:08 PM:296Infection was detected on this computer
Threat Name - Adware.Advertising
Type - Cookie
Risk Level - Low
Infection - atdmt.com/ atdmt.com

1/22/2009 5:16:08 PM:296Infection was detected on this computer
Threat Name - Adware.Advertising
Type - Cookie
Risk Level - Low
Infection - atdmt.com/ atdmt.com

1/22/2009 5:16:08 PM:515Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - bs.serving-sys.com/ bs.serving-sys.com

1/22/2009 5:16:08 PM:515Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - bs.serving-sys.com/ bs.serving-sys.com

1/22/2009 5:16:08 PM:546Infection was detected on this computer
Threat Name - Adware.Advertising
Type - Cookie
Risk Level - Low
Infection - burstnet.com/ burstnet.com

1/22/2009 5:16:08 PM:656Infection was detected on this computer
Threat Name - Adware.Advertising
Type - Cookie
Risk Level - Low
Infection - casalemedia.com/ casalemedia.com

1/22/2009 5:16:08 PM:656Infection was detected on this computer
Threat Name - Adware.Advertising
Type - Cookie
Risk Level - Low
Infection - casalemedia.com/ casalemedia.com

1/22/2009 5:16:09 PM:31Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - doubleclick.net/ doubleclick.net

1/22/2009 5:16:09 PM:31Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - doubleclick.net/ doubleclick.net

1/22/2009 5:16:09 PM:281Infection was detected on this computer
Threat Name - Adware.Advertising
Type - Cookie
Risk Level - Low
Infection - fastclick.net/ fastclick.net

1/22/2009 5:16:09 PM:281Infection was detected on this computer
Threat Name - Adware.Advertising
Type - Cookie
Risk Level - Low
Infection - fastclick.net/ fastclick.net

1/22/2009 5:16:09 PM:750Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - kaspersky.122.2o7.net/ kaspersky.122.2o7.net

1/22/2009 5:16:09 PM:968Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - m.webtrends.com/ m.webtrends.com

1/22/2009 5:16:10 PM:78Infection was detected on this computer
Threat Name - Adware.Advertising
Type - Cookie
Risk Level - Low
Infection - mediaplex.com/ mediaplex.com

1/22/2009 5:16:10 PM:187Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - msnportal.112.2o7.net/ msnportal.112.2o7.net

1/22/2009 5:16:10 PM:187Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - msnportal.112.2o7.net/ msnportal.112.2o7.net

1/22/2009 5:16:10 PM:578Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - questionmarket.com/ questionmarket.com

1/22/2009 5:16:10 PM:578Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - questionmarket.com/ questionmarket.com

1/22/2009 5:16:10 PM:984Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - serving-sys.com/ serving-sys.com

1/22/2009 5:16:10 PM:984Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - serving-sys.com/ serving-sys.com

1/22/2009 5:16:11 PM:31Infection was detected on this computer
Threat Name - Adware.Advertising
Type - Cookie
Risk Level - Low
Infection - smartadserver.com/ smartadserver.com

1/22/2009 5:16:11 PM:62Infection was detected on this computer
Threat Name - Adware.Advertising
Type - Cookie
Risk Level - Low
Infection - statcounter.com/ statcounter.com

1/22/2009 5:16:11 PM:62Infection was detected on this computer
Threat Name - Adware.Advertising
Type - Cookie
Risk Level - Low
Infection - statcounter.com/ statcounter.com

1/22/2009 5:16:11 PM:328Infection was detected on this computer
Threat Name - Adware.Advertising
Type - Cookie
Risk Level - Low
Infection - trafficmp.com/ trafficmp.com

1/22/2009 5:16:11 PM:375Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - tribalfusion.com/ tribalfusion.com

1/22/2009 5:16:11 PM:375Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - tribalfusion.com/ tribalfusion.com

1/22/2009 5:16:11 PM:593Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - www.burstbeacon.com/ www.burstbeacon.com

1/22/2009 5:16:11 PM:640Infection was detected on this computer
Threat Name - Adware.Advertising
Type - Cookie
Risk Level - Low
Infection - www.burstnet.com/ www.burstnet.com

1/22/2009 5:16:12 PM:187Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - xiti.com/ xiti.com

1/22/2009 5:16:12 PM:187Infection was detected on this computer
Threat Name - Application.TrackingCookies
Type - Cookie
Risk Level - Low
Infection - xiti.com/ xiti.com

1/22/2009 5:16:26 PM:828Infection was detected on this computer
Threat Name - Application.NirCmd
Type - Registry Value
Risk Level - Info & PUAs
Infection - HKEY_LOCAL_MACHINE\SOFTWARE\swearware, combofix_wow

1/22/2009 5:16:26 PM:828Infection was detected on this computer
Threat Name - Application.NirCmd
Type - Registry Value
Risk Level - Info & PUAs
Infection - HKEY_LOCAL_MACHINE\SOFTWARE\swearware, Runs

1/22/2009 5:16:26 PM:843Infection was detected on this computer
Threat Name - Application.NirCmd
Type - Registry Value
Risk Level - Info & PUAs
Infection - HKEY_LOCAL_MACHINE\SOFTWARE\swearware, snapshot

1/22/2009 5:16:26 PM:843Infection was detected on this computer
Threat Name - Application.NirCmd
Type - Registry Key
Risk Level - Info & PUAs
Infection - HKEY_LOCAL_MACHINE\SOFTWARE\swearware

1/22/2009 5:16:26 PM:859Infection was detected on this computer
Threat Name - Application.NirCmd
Type - Registry Value
Risk Level - Info & PUAs
Infection -
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME,
NextInstance

1/22/2009 5:16:26 PM:859Infection was detected on this computer
Threat Name - Application.NirCmd
Type - Registry Key
Risk Level - Info & PUAs
Infection -
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CATCHME

1/22/2009 5:16:28 PM:562Infection was detected on this computer
Threat Name - Trojan.Generic
Type - Registry Key
Risk Level - Medium
Infection -
HKEY_USERS\S-1-5-21-1133490597-3860494968-1402089524-1005\Software\Wget

1/22/2009 5:16:30 PM:781IntelliGuards status
All IntelliGuards were Enabled
1/22/2009 5:16:50 PM:625Immunizer Results
ActiveX section has been immunized, Processed 4123 items.
1/22/2009 5:18:28 PM:125Scan Finished
Scan Type - Intelli-Scan
Items Processed - 203515
Threats Detected - 5
Infections Detected - 44
Infections Ignored - 0

----------------------
KASPERSKY ONLINE SCANNER 7 REPORT
Thursday, January 22, 2009
Operating System: Microsoft Windows XP Home Edition Service Pack 3 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Friday, January 23, 2009 00:25:01
Records in database: 1670125
----------------------

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:
A:\
C:\
D:\
E:\
F:\
G:\
H:\
I:\

Scan statistics:
Files scanned: 142141
Threat name: 3
Infected objects: 3
Suspicious objects: 0
Duration of the scan: 02:34:25


File name / Threat name / Threats count
D:\Program Files\MyWebSearch\bar\1.bin\F3DTACTL.DLL Infected: not-a-virus:WebToolbar.Win32.MyWebSearch.dn 1
D:\Program Files\MyWebSearch\bar\1.bin\F3HTTPCT.DLL Infected: not-a-virus:WebToolbar.Win32.MyWebSearch.ed 1
D:\Program Files\MyWebSearch\bar\1.bin\F3POPSWT.DLL Infected: not-a-virus:AdTool.Win32.MyWebSearch.dd 1

The selected area was scanned.

I dont know what these are but I would like to get rid of them. Especially MyWebSearch.
Ill check back later to see what else I need to do. Thank you for being so helpful and I hope you have a wonderful day.


Report •

#9
January 23, 2009 at 03:38:31
Go to start> control panel> add/remove programs and uninstall anything with mywebsearch in it.

Navigate to and delete the folder if found:

C:\Program Files\MyWebSearch

The cookie can be removed with ATF Cleaner.


Report •

#10
January 23, 2009 at 12:52:53
I did run the ATF this time. When I first went and got it, the download turned out to be PC Tools Spyware Doctor. That is how come you got that log from it. I didn't think about it at the time but you didn't ask for the ATF log just the Kaspersky log. I realised that today, Friday. Anyways, I will have ATF, SpyBot, AVG Antivirus, and Comodo Firewall. Are these okay and will they keep my computer safe? If not, what would you suggest? The last question, have we done everything that we need to? Everything seems to be working okay for now. If I need help again, how can I get ahold of you? You are the only one that has been able to help me on this mess that I created. If we are done, then I owe you a big Thank you and great appreciation for your time. :) :)

Report •

#11
January 23, 2009 at 13:55:33
Keep all of them, your computer appears to be clean, I'll be here if you need me, for a while at least.


Go to start> run> type in combofix /u (note the space after combofix) then press enter> run. This will uninstall combofix so give the uninstaller a minute to run.

Go to start> control panel> add/remove programs and uninstall these programs:

Hijack This

Malwarebytes

Kaspersky

You should keep AFT Cleaner and run it weekly.


You should consider adding "Spywareblaster" to your arsenol of antispyware tools, you can download it from this link Spywareblaster

Just download it,install it, and update it. Its free and runs in the background, so you don't actually run it, and re-writes malicious script before it can install on your computer. Look for updates weekly as there is no auto-update on the free version.

Glad we could help.


Report •


Ask Question