Computer Hope

Software => Computer viruses and spyware => Topic started by: joe101 on February 10, 2011, 02:17:41 PM

Title: Application cannot be executed. The file *exe is infected
Post by: joe101 on February 10, 2011, 02:17:41 PM
Hi all,

My PC has been infected by some serious trojan or virus. Whenever I try to open up any application, it flashes me a virus alert saying that " Application cannot be executed. The file pctsTray.exe is infected" . I'm unable to open any application from wordpad to photos.

I google'd and searched the forum for solutions. But none of them helped. Superdave in the past has helped some guys and has been helping some other guys regarding the same error ( below are the links). But since he has mentioned that the fixes are specific to the problem and should not be used for other issues, I want to take precautions in doing the same. I would highly appreciate if someone can help me on this issue. 

http://www.computerhope.com/forum/index.php/topic,115809.0.html
http://www.computerhope.com/forum/index.php/topic,95177.0.html
Title: Re: Application cannot be executed. The file *exe is infected
Post by: SuperDave on February 10, 2011, 04:17:21 PM
Hello and welcome to Computer Hope Forum. My name is Dave. I will be helping you out with your particular problem on your computer.

1. I will be working on your Malware issues. This may or may not solve other issues you have with your machine.
2. The fixes are specific to your problem and should only be used for this issue on this machine.
3. If you don't know or understand something, please don't hesitate to ask.
4. Please DO NOT run any other tools or scans while I am helping you.
5. It is important that you reply to this thread. Do not start a new topic.
6. Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.
7. Absence of symptoms does not mean that everything is clear.

If you can't access the internet with your infected computer you will have to download and transfer any programs to the computer you're using now and transfer them to the infected computer with a CD-RW or a USB storage device. I prefer a CD because a storage device can get infected. If you use a storage device hold the shift key down while inserting the USB storage device for about 10 secs. You will also have to transfer the logs you receive back to the good computer using the same method until we can get the computer back on-line.
******************************************************
Quote
But since he has mentioned that the fixes are specific to the problem and should not be used for other issues, I want to take precautions in doing the same.
Finally, someone who takes my advice. Good.

Please download and run the below tool named Rkill (courtesy of BleepingComputer.com) which may help allow other programs to run.
Save Rkill to your desktop.

There are 3 different versions. If one of them won't run then download and try to run the other one.
 
Vista and Win7 users need to right click Rkill and choose Run as Administrator
 

You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

* Rkill.exe (http://download.bleepingcomputer.com/grinler/rkill.exe)
* Rkill.com (http://download.bleepingcomputer.com/grinler/rkill.com)
* Rkill.scr (http://download.bleepingcomputer.com/grinler/rkill.scr)

Once you've gotten one of them to run then try to immediately run the following.
***************************************************
SUPERAntiSpyware

If you already have SUPERAntiSpyware be sure to check for updates before scanning!

Download SuperAntispyware Free Edition (SAS) (http://www.superantispyware.com/download.html)
* Double-click the icon on your desktop to run the installer.
* When asked to Update the program definitions, click Yes
* If you encounter any problems while downloading the updates, manually download and unzip them from here
* Next click the Preferences button.

•Under Start-Up Options uncheck Start SUPERAntiSpyware when Windows starts
* Click the Scanning Control tab.
* Under Scanner Options make sure only the following are checked:

•Close browsers before scanning
•Scan for tracking cookies
•Terminate memory threats before quarantining
Please leave the others unchecked

•Click the Close button to leave the control center screen.

* On the main screen click Scan your computer
* On the left check the box for the drive you are scanning.
* On the right choose Perform Complete Scan
* Click Next to start the scan. Please be patient while it scans your computer.
* After the scan is complete a summary box will appear. Click OK
* Make sure everything in the white box has a check next to it, then click Next
* It will quarantine what it found and if it asks if you want to reboot, click Yes

•To retrieve the removal information please do the following:
•After reboot, double-click the SUPERAntiSpyware icon on your desktop.
•Click Preferences. Click the Statistics/Logs tab.

•Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.

•It will open in your default text editor (preferably Notepad).
•Save the notepad file to your desktop by clicking (in notepad) File > Save As...

* Save the log somewhere you can easily find it. (normally the desktop)
* Click close and close again to exit the program.
*Copy and Paste the log in your post.
***************************************
(http://img233.imageshack.us/img233/7729/mbamicontw5.gif) Please download Malwarebytes Anti-Malware from here. (http://download.bleepingcomputer.com/malwarebytes/mbam-setup.exe)
Double Click mbam-setup.exe to install the application.
Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.
***********************************************
Download Security Check by screen317 from one of the following links and save it to your desktop.

Link 1 (http://screen317.spywareinfoforum.org/SecurityCheck.exe)
Link 2 (http://screen317.changelog.fr/SecurityCheck.exe)

* Unzip SecurityCheck.zip and a folder named Security Check should appear.
* Open the Security Check folder and double-click Security Check.bat
* Follow the on-screen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt
* Post the contents of that document in your next reply.

Note: If a security program requests permission from dig.exe to access the Internet, allow it to do so.
Title: Re: Application cannot be executed. The file *exe is infected
Post by: joe101 on February 11, 2011, 03:44:06 AM
I downloaded all the versions of Rkill on my USB drive and tried executing the Rkill files with the " Run as administrator" option but it started throwing up the error " Application cannot be executed. The file *exe is infected ". I formatted my pen drive again, and again downloaded the softwares and tried again, but it threw the same error. Please help and advise in this situation.
Title: Re: Application cannot be executed. The file *exe is infected
Post by: SuperDave on February 11, 2011, 05:00:49 PM
Ok. Please try this: Reboot your computer in Safe Mode. Now try to run MBAM. Reboot in Normal Mode and run MBAM again and post the log. If that works, please run the other scans and also post those logs.
Title: Re: Application cannot be executed. The file *exe is infected
Post by: joe101 on February 12, 2011, 06:45:40 PM
Thanks. So I rebooted the pc in Safe mode and ran MBAM. After running, MBAM, I rebooted the pc in Normal mode and tried running MBAM again,  but it started throwing up the error " Application cannot be executed. The file *exe is infected ". I tried running all version of Rkill too but they failed again.

I want to make sure that while rebooting the pc on safe mode, we just have to run MBAM, because I did the same. I didn't run Rkill or any SuperAntiSpyware before it in safe mode. Please advise as to what should I do in this case.

Below is the log that is generated after running MBAM in safe mode 


MBAM Log ( Safe Mode)
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 5363

Windows 6.0.6001 Service Pack 1 (Safe Mode)
Internet Explorer 8.0.6001.19019

2/12/2011 4:51:44 PM
mbam-log-2011-02-12 (16-51-44).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 498250
Time elapsed: 1 hour(s), 29 minute(s), 33 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 29
Registry Values Infected: 4
Registry Data Items Infected: 0
Folders Infected: 10
Files Infected: 54

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{147A976F-EEE1-4377-8EA7-4716E4CDD239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{D518921A-4A03-425E-9873-B9A71756821E} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{CF54BE1C-9359-4395-8533-1657CF209CFE} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256A51-B582-467e-B8D4-7786EDA79AE0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256A51-B582-467e-B8D4-7786EDA79AE0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127AD2-394B-70F5-C650-B97867BAA1F7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF1-072E-44CF-8957-5838F569A31D} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA1-A523-4961-B6BB-170DE4475CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA9-A523-4961-B6BB-170DE4475CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EAB-A523-4961-B6BB-170DE4475CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{3DC201FB-E9C9-499C-A11F-23C360D7C3F8} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{9FF05104-B030-46FC-94B8-81276E4E27DF} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59C7FC09-1C83-4648-B3E6-003D2BBC7481} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68AF847F-6E91-45dd-9B68-D6A12C30E5D7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170B96C-28D4-4626-8358-27E6CAEEF907} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D1A71FA0-FF48-48dd-9B6D-7A13A3E42127} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{DDB1968E-EAD6-40fd-8DAE-FF14757F60C7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F138D901-86F0-4383-99B6-9CDD406036DA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PlayAllDVD (Trojan.DNSChanger) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\multimediaControls.chl (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\PlayAllDVD (Trojan.DNSChanger) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\avsoft (Trojan.Fraudpack) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\avsuite (Rogue.AntivirusSuite) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\FocusInteractive (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\*.securewebinfo.com (Trojan.Zlob) -> Value: *.securewebinfo.com -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\*.safetyincludes.com (Trojan.Zlob) -> Value: *.safetyincludes.com -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\*.securemanaging.com (Trojan.Zlob) -> Value: *.securemanaging.com -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\whhoxbnn (Rogue.AntivirusSuite.Gen) -> Value: whhoxbnn -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
c:\program files\funwebproducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\funwebproducts\screensaver (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\funwebproducts\screensaver\Images (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\History (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Settings (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\playalldvd (Trojan.DNSChanger) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Roaming\microsoft\Windows\start menu\Programs\playalldvd (Trojan.DNSChanger) -> Quarantined and deleted successfully.
c:\RECYCLER\s-1-5-21-1482476501-1644491937-682003330-1013 (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
c:\$Recycle.Bin\s-1-5-21-194466675-3726487838-1396600599-1000\$RN7SX62.exe (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\playalldvd\uninstall.exe (Trojan.DNSChanger) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\102D.tmp (Trojan.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\1230.tmp (Heuristics.Shuriken) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\1C45.tmp (Trojan.PWS) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\1s9e17.exe (Rootkit.TDSS) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\23BB.tmp (Heuristics.Shuriken) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\2F1A.tmp (Trojan.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\31D9.tmp (Trojan.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\3266.tmp (Heuristics.Shuriken) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\3E8B.tmp (Trojan.PWS) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\485C.tmp (Heuristics.Shuriken) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\49BD.tmp (Trojan.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\5446.tmp (Trojan.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\56AB.tmp (Spyware.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\587B.tmp (Trojan.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\5910.tmp (Heuristics.Shuriken) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\6240.tmp (Heuristics.Shuriken) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\646.tmp (Spyware.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\6A3D.tmp (Trojan.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\6AEA.tmp (Heuristics.Shuriken) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\8802.tmp (Heuristics.Shuriken) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\94D2.tmp (Trojan.PWS) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\98B9.tmp (Trojan.PWS) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\A480.tmp (Trojan.PWS) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\A62D.tmp (Spyware.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\AB70.tmp (Heuristics.Shuriken) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\B9F6.tmp (Heuristics.Shuriken) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\BA0A.tmp (Trojan.PWS) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\BAD0.tmp (Heuristics.Shuriken) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\C656.tmp (Heuristics.Shuriken) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\CF5F.tmp (Spyware.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\D45E.tmp (Trojan.PWS) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\D8C3.tmp (Spyware.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\DFA6.tmp (Trojan.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\E375.tmp (Trojan.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\err.log41823868 (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\err.log41823899 (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\F0D9.tmp (Trojan.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\FCBD.tmp (Spyware.Zbot) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\ms0cfg32.exe (Trojan.Hiloti) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\spfymx.exe (Heuristics.Shuriken) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Roaming\adgs.bat (Malware.Trace) -> Quarantined and deleted successfully.
c:\Users\lovish\downloads\favorites\antivirus scan.url (Rogue.Link) -> Quarantined and deleted successfully.
c:\Users\lovish\documents\My Music\My Music.url (Trojan.Zlob) -> Quarantined and deleted successfully.
c:\Users\lovish\documents\my videos\My Video.url (Trojan.Zlob) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\0.40328263999429814.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\0.528198453305841.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Local\Temp\windows_security_center.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\Users\lovish\documents\Desktop\thinkpoint.lnk (Rogue.ThinkPoint) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Roaming\microsoft\Windows\start menu\Programs\thinkpoint.lnk (Rogue.ThinkPoint) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Settings\s_pid.dat (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\Users\lovish\AppData\Roaming\microsoft\Windows\start menu\Programs\playalldvd\uninstall.lnk (Trojan.DNSChanger) -> Quarantined and deleted successfully.
c:\RECYCLER\s-1-5-21-1482476501-1644491937-682003330-1013\Desktop.ini (Trojan.Agent) -> Quarantined and deleted successfully.

Title: Re: Application cannot be executed. The file *exe is infected
Post by: SuperDave on February 12, 2011, 07:36:53 PM
I am required to inform you of this.

One or more of the identified infections is a backdoor trojan.

This allows hackers to remotely control your computer, steal critical system information and Download and Execute files

Read this article: Danger: Remote Access Trojans. (http://www.microsoft.com/technet/security/alerts/info/virusrat.mspx)

If your computer was used for online banking, has credit card information or other sensitive data on it, all passwords should be changed immediately to include those used for banking, email, eBay and forums. You should consider them to be compromised. They should be changed by using a different computer and not the infected one! If not, an attacker may get the new passwords and transaction information. Banking and credit card institutions should be notified of the possible security breach.

I would counsel you to disconnect this PC from the Internet immediately.

Though the Trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of Trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud? (http://www.dslreports.com/faq/10451)

When Should I Format, How Should I Reinstall? (http://www.dslreports.com/faq/10063)

We can attempt to clean this machine but i can't guarantee that it will be 100% secure afterwards.

Should you have any questions, please feel free to ask.

Please let us know what you have decided to do in your next post
Title: Re: Application cannot be executed. The file *exe is infected
Post by: joe101 on February 13, 2011, 12:42:16 AM
Thanks a lot for replying to my post. I read both the posts. I have decided to reformat and reinstall the softwares again.  Please let me know if there are any necessary steps that need to be taken before reformatting .
Title: Re: Application cannot be executed. The file *exe is infected
Post by: SuperDave on February 13, 2011, 12:57:16 PM
Backing up files before formatting

If you backup any files they should be scanned from a clean properly protected PC before restoring. Also be careful what scanner is used as some are very poor at detecting and even worse at protecting from this infection. Be very selective and only backup files you can not replace like text documents and personal photos.

Do not back up to another machine! It will likely become infected. Burn to DVD/CD, a flash drive or to an external drive which has nothing else on it and which you can format should it become infected from the backups.

I suggest running at least 3 of the below scanners on the backup files. Run the first scan then reboot before running the second then reboot after the second before running the third.
 
-) DrWebCureIt (http://ftp://ftp.drweb.com/pub/drweb/cureit/cureit.exe)
-) ESET (http://www.eset.com/onlinescan/)
-) McAfee Avert Stinger (http://vil.nai.com/vil/stinger/default.aspx)
-) Microsoft Windows Malicious Software Removal Tool (http://support.microsoft.com/kb/890830)
Good Luck!