
http://images.thetechguide.com/forum/public/style_emoticons/<#EMO_DIR#>/biggrin.gif\' class=\'bbc_emoticon\' alt=\'

\' /> Cheers for the help. much appreciated.
done everything right down until >>Start>>All programs>>Cleanup. couldnt find this so i done a disk clean up (is that wat u meant?).
restarted back in normal mode and norton anti-virus automatically came up. i didnt want to do a scan with it so i restarted back in safe mode. tried to do a scan with norton but it wouldnt open.
restarted back in normal mode. didnt try to use norton just closed them but then spybot search and destroy came up with some msg and it wouldnt close. also something kept turning off my internet firewall.
anyway i was on internet when norton came up saying email message scanned about 30times. somehow my computer was sending loads off stuff to different email addresses.

http://images.thetechguide.com/forum/public/style_emoticons/<#EMO_DIR#>/unsure.gif\' class=\'bbc_emoticon\' alt=\':unsure:\' />
(i just had to disconnect and reconnect cuz i had to turn my firewall on it somehow got turned off.) uninstalled spybot.
i was just wondering wat this file is, its in c: and its a folder called "78a710ce9dfe875110" theres a folder inside it called "sp2" which access is denied to, is this a virus?
heres my new log
Logfile of HijackThis v1.99.0
Scan saved at 20:54:29, on 25/01/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Documents and Settings\Patrick Deighan\Desktop\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
http://www.mytalktalk.net/O1 - Hosts: 64.91.255.87
www.dcsresearch.comO2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\PROGRA~1\SPYWAR~1\tools\iesdsg.dll (file missing)
O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O2 - BHO: (no name) - {ED103D9F-3070-4580-AB1E-E5C179C1AE41} - (no file)
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe
O4 - HKLM\..\Run: [AdaptecDirectCD] "C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe"
O4 - HKLM\..\Run: [DiTask.exe] "C:\Program Files\Eicon\Diva\DiTask.exe"
O4 - HKLM\..\Run: [Divamon.exe] "C:\Program Files\Eicon\Diva\Divamon.exe"
O4 - HKLM\..\Run: [Eicon TechnologyLAN_DAEMON] "C:\Program Files\Eicon\Diva\watch.exe"
O4 - HKLM\..\Run: [CGServer] "C:\Program Files\Eicon\Diva\cgserver.exe"
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [Microsoft Windows W32 Services] mssw32.exe
O4 - HKLM\..\Run: [Win32 DRK Driver] wdrk32.exe
O4 - HKLM\..\Run: [onjzqdwclongf] C:\WINDOWS\System32\kxcddqojunj.exe
O4 - HKLM\..\Run: [Microsoft Windows Update] swwhost.exe
O4 - HKLM\..\Run: [Windows Update] msnmsgrs.exe
O4 - HKLM\..\Run: [Admanager Controller] C:\Program Files\Admanager Controller\AdManCtl.exe
O4 - HKLM\..\Run: [Spool] C:\WINDOWS\TEMP\msvcreal.exe
O4 - HKLM\..\Run: [xcz] C:\WINDOWS\xcz.exe
O4 - HKLM\..\Run: [AVGCtrl] "C:\Program Files\AVPersonal\AVGNT.EXE" /min
O4 - HKLM\..\Run: [Microsoft Legacy Device] trass.exe
O4 - HKLM\..\Run: [e2M35W] C:\WINDOWS\yilcrmb.exe
O4 - HKLM\..\Run: [sdkupdate22] SDK0mCORE.exe
O4 - HKLM\..\Run: [Microsoft System Checkup] libsysmgr.exe
O4 - HKLM\..\Run: [NT Logging Service] syslog32.exe
O4 - HKLM\..\Run: [NAV Auto Protect] navprotect.exe
O4 - HKLM\..\Run: [spoolsvr32] c:\windows\system32\csmss32.exe
O4 - HKLM\..\Run: [AdStatus Service] C:\Program Files\AdStatus Service\AdStatServ.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [NAV CfgWiz] C:\Program Files\Common Files\Symantec Shared\CfgWiz.exe /GUID NAV /CMDLINE "REBOOT"
O4 - HKLM\..\Run: [THGuard] "C:\Program Files\TrojanHunter 4.1\THGuard.exe"
O4 - HKLM\..\Run: [MSNPluginSrIvcs] n3vasap23.exe
O4 - HKLM\..\RunServices: [Microsoft Windows W32 Services] mssw32.exe
O4 - HKLM\..\RunServices: [Microsoft System Checkup] libsysmgr.exe
O4 - HKLM\..\RunServices: [Win32 DRK Driver] wdrk32.exe
O4 - HKLM\..\RunServices: [onjzqdwclongf] C:\WINDOWS\System32\kxcddqojunj.exe
O4 - HKLM\..\RunServices: [Microsoft Legacy Device] trass.exe
O4 - HKLM\..\RunServices: [sdkupdate22] SDK0mCORE.exe
O4 - HKLM\..\RunServices: [Microsoft Windows Update] swwhost.exe
O4 - HKLM\..\RunServices: [Windows Update] msnmsgrs.exe
O4 - HKLM\..\RunServices: [NAV Auto Protect] navprotect.exe
O4 - HKLM\..\RunServices: [MSNPluginSrIvcs] n3vasap23.exe
O4 - HKLM\..\RunOnce: [Win32 DRK Driver] wdrk32.exe
O4 - HKLM\..\RunOnce: [Microsoft Windows Update] swwhost.exe
O4 - HKLM\..\RunOnce: [sdkupdate22] SDK0mCORE.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Win32 DRK Driver] wdrk32.exe
O4 - HKCU\..\Run: [Microsoft Windows W32 Services] mssw32.exe
O4 - HKCU\..\Run: [Microsoft Windows Update] swwhost.exe
O4 - HKCU\..\Run: [sdkupdate22] SDK0mCORE.exe
O4 - HKCU\..\Run: [NAV Auto Protect] navprotect.exe
O4 - HKCU\..\Run: [MSNPluginSrIvcs] n3vasap23.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\RunOnce: [sdkupdate22] SDK0mCORE.exe
O4 - HKCU\..\RunOnce: [Win32 DRK Driver] wdrk32.exe
O4 - HKCU\..\RunOnce: [Microsoft Windows Update] swwhost.exe
O4 - Global Startup: DSLMON.lnk = C:\Program Files\SAGEM\TalkTalk Broadband\dslmon.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O17 - HKLM\System\CCS\Services\Tcpip\..\{77B98371-66A7-4A40-B65A-72A5A378BDC9}: NameServer = 127.0.0.1
O23 - Service: AntiVir Update - H+BEDV Datentechnik GmbH, Germany - C:\Program Files\AVPersonal\AVWUPSRV.EXE
O23 - Service: Symantec Event Manager - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Norton AntiVirus Auto Protect Service - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: NT login service - Unknown - C:\WINDOWS\System32\libsysmgr.exe (file missing)
O23 - Service: NVIDIA Driver Helper Service - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
scandump
Scan Control Dumped @ 20:01:44 25-01-05
RegVal Trace: Ill ICQ Notify: HKEY_LOCAL_MACHINE
File: Software\Microsoft\Windows\CurrentVersion\Run [windows update=msnmsgrs.exe]
RegVal Trace: DDoS.RAT.SDBot: HKEY_LOCAL_MACHINE
File: Software\Microsoft\Windows\CurrentVersion\Run [Microsoft System Checkup=libsysmgr.exe
RegVal Trace: DDoS.RAT.SDBot: HKEY_LOCAL_MACHINE
File: Software\Microsoft\Windows\CurrentVersion\RunServices [Microsoft System Checkup=libsysmgr.exe
RegVal Trace: DDoS.RAT.SDBot: HKEY_LOCAL_MACHINE
File: Software\Microsoft\Windows\CurrentVersion\Run [NT Logging Service=syslog32.exe
RegVal Trace: Worm.Leox please submit: HKEY_LOCAL_MACHINE
File: Software\Microsoft\Windows\CurrentVersion\RunServices [windows update=msnmsgrs.exe]
RegVal Trace: DDoS.RAT.SDBot: HKEY_CURRENT_USER
File: Software\Microsoft\Windows\CurrentVersion\Run [Microsoft Windows Update=swwhost.exe]
RegVal Trace: DDoS.RAT.SDBot: HKEY_LOCAL_MACHINE
File: Software\Microsoft\Windows\CurrentVersion\Run [Microsoft Windows Update=swwhost.exe]
RegVal Trace: DDoS.RAT.SDBot: HKEY_LOCAL_MACHINE
File: Software\Microsoft\Windows\CurrentVersion\RunServices [Microsoft Windows Update=swwhost.exe]
RegVal Trace: TrojanProxy.Win32.Ranky: HKEY_LOCAL_MACHINE
File: Software\Microsoft\Windows\CurrentVersion\Run [Spool=C:\WINDOWS\TEMP\msvcreal.exe]
Positive identification: DDoS.RAT.SDBot.up
File: c:\windows\system32\libsysmgr.exe
Positive identification: TrojanDownloader.Win32.Dyfuca.ds
File: c:\documents and settings\localservice\local settings\temporary internet files\content.ie5\gnu96rm3\optimize[1].exe.tcf
Suspicious Filename: Dual extensions
File: c:\documents and settings\patrick deighan\desktop\my music\music\music albums\tenacious d\imp.wps.doc
Positive identification (embedded in file): Adware.ToolBat.EliteBar.z (dll)
File: c:\documents and settings\patrick deighan\local settings\temp\suicidetb.exe.tcf
Positive identification: DDoS.RAT.Wootbot.fj
File: c:\program files\avpersonal\infected\msrepair.vir
Positive identification: DDoS.RAT.Wootbot.fj
File: c:\program files\avpersonal\infected\msrepair.vir00
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir00
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir01
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir02
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir03
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir04
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir05
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir06
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir07
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir08
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir09
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir10
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir11
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir12
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir13
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir14
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir15
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir16
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir17
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir18
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir19
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir20
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir21
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir22
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir23
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir24
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir25
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir26
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir27
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir28
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir29
Positive identification: DDoS.RAT.rBot.acu
File: c:\program files\avpersonal\infected\navprotect.vir30
Positive identification: Trojan.Win32.LowZones.ab
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp159\a0091709.exe
Positive identification: Adware.BargainBuddy.n2
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp159\a0091725.exe
Positive identification: DDoS.RAT.Agobot.yj
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp160\a0092949.exe
Positive identification: TrojanDownloader.Win32.IstBar.go1
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp162\a0094172.exe
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp162\a0094183.exe.tcf
Positive identification: TrojanProxy.Win32.Agent.bz2
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp162\a0094186.exe
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp162\a0095185.exe.tcf
Positive variant identification: Beast 2.02 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp162\a0095186.exe.tcf
Positive identification: TrojanProxy.Win32.Agent.bz2
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp162\a0095194.exe
Positive variant identification: Beast 2.02 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp162\a0095205.exe.tcf
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp164\a0095331.exe.tcf
Positive variant identification: Beast 2.02 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp164\a0095332.exe.tcf
Positive identification: TrojanProxy.Win32.Agent.bz2
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp164\a0095335.exe
Positive identification: DDoS.RAT.Agobot.yj
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp164\a0095340.exe
Positive variant identification: Beast 2.02 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp165\a0095350.exe.tcf
Positive identification (DLL): Adware.ToolBat.EliteBar.z (dll)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp165\a0096346.dll.tcf
Positive identification (DLL): Adware.ToolBat.EliteBar.z (dll)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp166\a0096428.dll.tcf
Positive variant identification: Beast 2.02 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp167\a0096447.exe.tcf
Positive identification: DDoS.RAT.Agobot.yj
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp167\a0096454.exe
Positive identification: TrojanProxy.Win32.Agent.bz2
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp167\a0096457.exe
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp167\a0096459.exe.tcf
Positive identification (DLL): Adware.ToolBat.EliteBar.z (dll)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp168\a0096666.dll.tcf
Positive identification (DLL): Adware.ToolBat.EliteBar.z (dll)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp168\a0096682.dll.tcf
Positive variant identification: Beast 2.02 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp168\a0096683.exe.tcf
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp168\a0096684.exe.tcf
Positive identification: TrojanProxy.Win32.Agent.bz2
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp168\a0096687.exe
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp168\a0097682.exe.tcf
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp168\a0098683.exe.tcf
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp169\a0098685.exe.tcf
Positive identification: TrojanProxy.Win32.Agent.bz2
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp169\a0098688.exe
Positive identification (DLL): Adware.ToolBat.EliteBar.z (dll)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp169\a0098691.dll.tcf
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp169\a0098700.exe.tcf
Positive identification: Adware.WinAD.m
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp169\a0098704.exe
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp169\a0099741.exe.tcf
Positive identification: TrojanProxy.Win32.Agent.bz2
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp169\a0099744.exe
Positive identification: DDoS.RAT.Agobot.yj
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp169\a0099765.exe
Positive identification (DLL): Adware.ToolBat.EliteBar.z (dll)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp169\a0099772.dll.tcf
Positive identification: DDoS.RAT.SDBot.rz
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp169\a0099773.exe
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp170\a0100808.exe.tcf
Positive identification: TrojanProxy.Win32.Agent.bz2
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp170\a0100811.exe
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp170\a0100819.exe.tcf
Positive identification: TrojanProxy.Win32.Agent.bz2
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp170\a0101861.exe
Positive identification (DLL): Adware.ToolBat.EliteBar.z (dll)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp171\a0102857.dll.tcf
Positive identification (DLL): Adware.Relevance.b (dll)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp171\a0102858.dll
Positive identification (DLL): Adware.Relevance.b (dll)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp171\a0102859.dll
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp174\a0103694.exe
Positive variant identification: Beast 2.02 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp174\a0103695.exe
Positive identification: DDoS.RAT.rBot.yo
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp174\a0103699.exe
Positive identification: Adware.BargainBuddy.n2
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp174\a0103729.exe
Positive identification (DLL): Adware.Relevance.b (dll)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp174\a0103730.dll
Positive identification: TrojanProxy.Win32.Agent.bz2
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp174\a0103751.exe
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp174\a0103767.exe
Positive identification: TrojanProxy.Win32.Agent.bz2
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp174\a0103772.exe
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp176\a0103812.exe
Positive identification: TrojanProxy.Win32.Agent.bz2
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp176\a0103826.exe
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp176\a0103839.exe
Positive identification: TrojanProxy.Win32.Agent.bz2
File: c:\system volume information\_restore{b37680b2-ba0a-4e5d-bf30-83e44c588624}\rp176\a0103842.exe
Positive identification: DDoS.RAT.rBot.dy
File: c:\windows\system32\crsss.exe
Positive identification (DLL): Adware.ToolBat.EliteBar.z (dll)
File: c:\windows\system32\doolsav.dat
Positive identification: DDoS.RAT.SDBot.up
File: c:\windows\system32\libsysmgr.exe
Positive identification: DDoS.RAT.rBot.yo
File: c:\windows\system32\mssw32.exe.tcf
Positive variant identification: Beast 2.02 (Variant)
File: c:\windows\system32\msvccc.exe.tcf
Positive identification: DDoS.RAT.rBot.acu
File: c:\windows\system32\navprotect.exe
Positive identification: DDoS.RAT.SDBot.rz
File: c:\windows\system32\ntsysman.exe
Positive identification: TrojanProxy.Win32.Agent.bz2
File: c:\windows\system32\svphostu.exe
Positive identification: DDoS.RAT.rBot.adk
File: c:\windows\system32\trass.exe
Positive identification: DDoS.RAT.Agobot.yj
File: c:\windows\system32\config\systemprofile\local settings\temporary internet files\content.ie5\6jylazox\bot[1].exe
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\windows\system32\drivers\etc\svwhost32.exe
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\windows\system32\drivers\etc\svwhost32.exe.tcf
Positive variant identification: Microjoiner 1.7 (Variant)
File: c:\windows\system32\drivers\etc\svwhost32.exe8278.tcf
Positive identification: TrojanDownloader.Win32.Dyfuca.ds
File: c:\windows\temp\optimize.exe.tcf
Positive identification: TrojanDownloader.Win32.IstBar.fr2
File: c:\windows\temp\sidefind.exe.tcf
Positive identification (DLL): TrojanDownloader.Win32.IstBar.gh (dll)
File: c:\windows\temp\icd1.tmp\istactivex.dll
TROJ ISTBAR.ZA housecall.trendmicro.com found that virus couldnt clean or delete it. compressed it and i think i deleted.
i registeredon paypal (ebay) with my credit card was this safe?
thanks again for all the help. cheers