Cannot execute .exe or .reg files

June 12, 2011 at 17:12:41
Specs: Windows XP
Whenever I try to run an .exe or .reg file, I receive this error...

"To open this file, Windows needs to know what program created it. Windows can go online to look it up automatically, or you can manually select from a list of programs on your computer."

I cannot even open regedit... I receive the same error.

Any idea?


See More: Cannot execute .exe or .reg files

Report •


#1
June 12, 2011 at 23:02:58
Mongoose88,

If you cannot download the following file, the malware may be blocking the attempt. You need to download the file to a clean computer and then transfer it to the infected one using a USB flash drive, or external media (an external drive or a CD).


Please download exeHelper from one of these two places:
http://www.raktor.net/exeHelper/exe...
http://www.raktor.net/exeHelper/exe...

Save it to your Desktop

Vista or Windows 7 users right click the downloaded file and select “Run as Administrator"
XP users, double-click on the downloaded file to run the program

A black window should pop up
Press any key to close, once the fix is completed.

>>Please post the contents of the exehelperlog.txt in your reply.<<
[It is created in the directory where you ran exeHelper, and should also open at the end of the scan.]


Next, download RogueKiller
(http://tigzy.geekstogo.com/Tools/RogueKiller.exe)
Save it to your Desktop.

Now, close all open programs.

For XP, simply double-click RogueKiller.exe
For Vista/Windows 7, right click the file and select: Run as Administrator

When prompted, type 1 and hit Enter.

An RKreport.txt should appear on your Desktop.

Note: If the program is blocked, do not hesitate to try several times. If it really does not work (it could happen), rename it to winlogon.exe

>>Please post the contents of the >RKreport.txt< in your reply.<<

We will take further action based on the results of this report.

BTW, see if you can run .exe files now.

~~~~
Retired - Doin' Dis, Dat, and slapping malware.


Report •

#2
June 13, 2011 at 08:22:30
.com files do not execute either.... I receive the same "find which program created it" error...

before these errors began, i had a virus.. I had ran malwarebytes & I did "msconfig" via "run" and disabled a few things in the "startup" tab that I was almost sure shouldn't of been there.. could I have unchecked the wrong thing which has started this problem?

It seems I cannot execute any files without receiving this error..


Report •

#3
June 13, 2011 at 09:09:43
Can you run RougeKiller, or is it the same deal?

~~~~
Retired - Doin' Dis, Dat, and slapping malware.


Report •

Related Solutions

#4
June 13, 2011 at 09:13:37
Mongoose88, Try the instructions in my Reply #1 in the thread at the link below.

http://www.computing.net/answers/di...

Tufenuf


Report •

#5
June 13, 2011 at 09:27:42
Tufenuf... I cannot open regedit.exe via run.. nor can i open regedit.com

i keep getting the same error


Report •

#6
June 13, 2011 at 09:33:07
Mongoose88, Have you tried this to open regedit?

Press CTRL-ALT-DEL and open Task Manager. Once there, click File, then hold down the CTRL key and click New Task (Run). This will open a Command Prompt window. Enter REGEDIT.exe and press Enter. Once regedit is open click File>Import and locate that reg file fix, hilite it and click Open.

Tufenuf


Report •

#7
June 14, 2011 at 20:58:01
Hey Tuf,

That worked as far as bringing up Regedit...

BUT, when I apply the lnk, exe & reg fixes, they work at first, then when I restart the computer, they revert back to not working.. Any idea?

Sorry for taking so long to get back.


Report •

#8
June 14, 2011 at 21:43:38
Mongoose88, Your computer must have picked up some malware. Go to the link below, download the Free Verion of Malwarebytes, install it, update it then run a full scan and let it remove everything it finds.

http://www.malwarebytes.org/product...

How to use Malwarebytes' Anti-Malware to scan and remove malware from your computer

http://www.bleepingcomputer.com/vir...

Tufenuf


Report •

#9
June 14, 2011 at 22:35:27

“Your computer must have picked up some malware.”
^^Agree, 100%.^^


But, oooopps…mbam-setup.exe installs the program!!
C:\program files\Malwarebytes' Anti-Malware\mbam.exe runs the program!!
.com files are also a no-go…

Check the following, and see if you can run Malwarebytes’:

If Registry Editor opens successfully, navigate to the following key:
HKEY_CLASSES_ROOT \ exefile \ shell \ open \ command

Double-click the (Default) value in the right pane

Is the current value data the following, if not, replace it:
"%1" %*
(ie., quote-percent-one-quote-space-percent-asterisk.)

Then, navigate to:
HKEY_CLASSES_ROOT\.exe

Double-click the (Default) value in the right pane
Make sure you set (default) to: exefile

Exit the Registry Editor.

Now, re-start your computer.
Tap the F8 key before Windows starts, to bring up the Windows Advanced Options menu

Use the arrow keys to select Safe Mode with Networking

Press: Enter

In Safe Mode with Networking, download iExplore.exe, which is a renamed copy of RKill:
http://www.bleepingcomputer.com/dow...

[If the file does not download, paste the following, >without the brackets<, in the address bar of your browser:
[http://www.bleepingcomputer.com/download/anti-virus/rkill]

Save the file to the Desktop, and double-click on it.
Ignore any messages, and allow the file to run until the command window closes.


Without a reboot, download Malwarebytes’ Anti-Malware (black button with green and white icon) Save to the Desktop:
http://download.cnet.com/Malwarebyt...

Double-click mbam-setup.exe and follow the prompts to install the program.

Run Malwarfebytes’ AntiMalware and update the program.
Once updated, select Perform Full Scan and click the scan button.

When the scan finishes, click OK in the message box, and you will see the results of the scan.

Click the Remove Selected button to get rid of the malware.

When Malwarebytes finishes, you may be prompted to reboot. If so, reboot.


>>Please post the >Malwarebytes log< in your reply so we can see where we are at, and plan any additional removal strategy.<<


If you cannot Malwarebytes', try creating a different User profile with Administrative rights (Control Panel > User Accounts > Create a new account)

Does the inability to open .exe files happen in the new User account also?

~~~~
Retired - Doin' Dis, Dat, and slapping malware.


Report •

#10
June 14, 2011 at 22:39:35
so the reg keys stopped reverting... Im apparently infected with both "Windows XP Recovery" & "Internet Protection" viruses... I went and found the tutorials on how to remove via malwarebytes, but after a full scan, I show 0 infected objects.. makes no sense. Is there another way?

Report •

#11
June 14, 2011 at 22:42:23
Post #1, try RougeKiller.

You may also have a RootKit...if TDSS got 'bundled' in the deal.

~~~~
Retired - Doin' Dis, Dat, and slapping malware.


Report •

#12
June 14, 2011 at 22:50:46
heres the report from rougekiller

RogueKiller V5.2.2 [06/05/2011] by Tigzy
contact at http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Feedback: http://www.sur-la-toile.com/discuss...

Operating System: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Normal mode
User: Owner [Admin rights]
Mode: Scan -- Date : 06/14/2011 22:49:58

Bad processes: 1
[SUSP PATH] ALCXMNTR.EXE -- c:\windows\alcxmntr.exe -> KILLED

Registry Entries: 8
[SUSP PATH] HKCU\[...]\Run : egoNuSIECuXAXgI (C:\Documents and Settings\All Users\Application Data\egoNuSIECuXAXgI.exe) -> FOUND
[BLACKLIST DLL] HKCU\[...]\Run : 9516f932-7951-4020-8697-ddbe36bb68ad (rundll32.exe "C:\Documents and Settings\All Users\Application Data\9516f932-7951-4020-8697-ddbe36bb68ad.dat", zubwdnzeg ) -> FOUND
[ROGUE ST] HKCU\[...]\Run : 16834340 (C:\Documents and Settings\All Users\Application Data\16834340.exe) -> FOUND
[SUSP PATH] HKUS\S-1-5-21-1343024091-484061587-725345543-1003[...]\Run : egoNuSIECuXAXgI (C:\Documents and Settings\All Users\Application Data\egoNuSIECuXAXgI.exe) -> FOUND
[BLACKLIST DLL] HKUS\S-1-5-21-1343024091-484061587-725345543-1003[...]\Run : 9516f932-7951-4020-8697-ddbe36bb68ad (rundll32.exe "C:\Documents and Settings\All Users\Application Data\9516f932-7951-4020-8697-ddbe36bb68ad.dat", zubwdnzeg ) -> FOUND
[ROGUE ST] HKUS\S-1-5-21-1343024091-484061587-725345543-1003[...]\Run : 16834340 (C:\Documents and Settings\All Users\Application Data\16834340.exe) -> FOUND
[HJ] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
[FILEASSO] HKLM\[...]Software\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command : ("C:\Documents and Settings\Owner\Local Settings\Application Data\mrb.exe" -a "C:\Program Files\Internet Explorer\iexplore.exe") -> FOUND

HOSTS File:


Finished : << \RKreport[1].txt >>
RKreport[1].txt


Report •

#13
June 14, 2011 at 22:56:16
i did run "rkill" that i got from bleepingcomputer before i did that scan.. do i need to restart then scan again with rouge?

Report •

#14
June 14, 2011 at 23:05:22
No, you do not need to re-run it. You are OK. Just glad something ran and provided results to work with.

There is some definite malware in there. Need to check out and confirm a few things before we go into 'Delete' mode, though. However, it is quite late here, and time to get some Zzzzzs.

Will be back with you later in the afternoon. Will not be here until 4:00 or 5:00PM, Central USA time zone.

Try not to use that computer until we get it cleaned up.

Thank you for your patience, Mongoose88.

~~~~
Retired - Doin' Dis, Dat, and slapping malware.


Report •

#15
June 14, 2011 at 23:07:44
awesome support guys, thanks aaflac44 & tufenuf.

hope to hear from one of you tomorrow.

Night!


Report •

#16
June 14, 2011 at 23:35:01
Well, couldn't sleep. Too much RougeKiller in mind...;-)

Now, please run RougeKiller once again, and use option 2 (To remove malicious entries)

Press: Enter, and post the RKreport.txt that should appear on your Desktop.


Once again, run RougeKiller, this time use option 6 (For shortcuts and diasapeared Desktop files/folders, startup menu/etc.)

Press: Enter, and post the RKreport.txt that should appear on your Desktop.

Let's see what these reports show, and then we will look to make sure there is no RootKit 'somewhere'.

This time it is Zzzzs time!

~~~~
Retired - Doin' Dis, Dat, and slapping malware.


Report •

#17
June 15, 2011 at 08:06:54
OPTION 2 REPORT

RogueKiller V5.2.2 [06/05/2011] by Tigzy
contact at http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Feedback: http://www.sur-la-toile.com/discuss...

Operating System: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Normal mode
User: Owner [Admin rights]
Mode: Remove -- Date : 06/15/2011 08:03:55

Bad processes: 0

Registry Entries: 3
[BLACKLIST DLL] HKCU\[...]\Run : 9516f932-7951-4020-8697-ddbe36bb68ad (rundll32.exe "C:\Documents and Settings\All Users\Application Data\9516f932-7951-4020-8697-ddbe36bb68ad.dat", zubwdnzeg ) -> DELETED
[HJ] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[FILE ASSO] HKLM\[...]Software\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command : ("C:\Documents and Settings\Owner\Local Settings\Application Data\mrb.exe" -a "C:\Program Files\Internet Explorer\iexplore.exe") -> REPLACED : ("C:\Program Files\internet explorer\iexplore.exe")

HOSTS File:


Finished : << \RKreport[2].txt >>
RKreport[1].txt ; RKreport[2].txt


OPTION 6 REPORT

RogueKiller V5.2.2 [06/05/2011] by Tigzy
contact at http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Feedback: http://www.sur-la-toile.com/discuss...

Operating System: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Normal mode
User: Owner [Admin rights]
Mode: Shortcuts HJfix -- Date : 06/15/2011 08:05:51

Bad processes: 0

File attributes restored:
Desktop: Success 10 / Fail 0
Quick launch: Success 1 / Fail 0
Programs: Success 2459 / Fail 0
Start menu: Success 9 / Fail 0
User folder: Success 329 / Fail 0
My documents: Success 10 / Fail 0
My favorites: Success 1 / Fail 0
My pictures: Success 0 / Fail 0
My music: Success 0 / Fail 0
My videos: Success 0 / Fail 0
Local drives: Success 8471 / Fail 0
Backup: [NOT FOUND]

Drives:
[C:] \Device\HarddiskVolume1 -- 0x3 --> Restored
[D:] \Device\CdRom0 -- 0x5 --> Skipped
[E:] \Device\Harddisk2\DP(1)0-0+8 -- 0x2 --> Restored
[F:] \Device\Harddisk3\DP(1)0-0+9 -- 0x2 --> Restored
[G:] \Device\Harddisk4\DP(1)0-0+a -- 0x2 --> Restored
[H:] \Device\Harddisk5\DP(1)0-0+b -- 0x2 --> Restored
[I:] \Device\Harddisk1\DP(1)0-0+3 -- 0x2 --> Restored

Finished : << \RKreport[3].txt >>
RKreport[1].txt ; RKreport[2].txt ; RKreport[3].txt

:) lol sleep well.


Report •

#18
June 15, 2011 at 08:14:58
I guess I better mention, I am doing all of this via teamviewer for a friend of mine, and those two viruses "Internet Protection" & "Windows XP Recovery" were actually BOUGHT by the person I'm helping.. She was suckered in to putting her CC info into both programs. Ahhh, was so frustrated when I heard that. Anyway, thought I should share that little nugget :)

Report •

#19
June 16, 2011 at 14:35:39
Hello? Anyone around to help me today

Report •

#20
June 16, 2011 at 18:45:42
Sorry about not responding. I totally missed your reply. My bad!

First of all, are things any better? If not, what problems are you still having.

Let's also run the following and see what they show:


Please download TDSSKiller
http://support.kaspersky.com/downlo...
Save it to the Desktop.

Double-click* on TDSSKiller.exe to run the program.
Vista/Windows 7 users, right-click the file, and select: Run As Administrator

Click the 'Start Scan' button.

Do not use the computer during the scan

If the scan completes with nothing found, click Close to exit.

When the scan finishes it displays a Scan results screen stating whether or not an infection was found on your computer.

To remove the infection, click on the Continue button.
If it does not say Cure on the results screen, leave it at the default action of Skip, and press the Continue button.

Do not change to Delete or Quarantine as it may delete infected files that are required for Windows to operate properly.

Reboot to finish the cleaning process.

If no reboot is requested, click on: Report.

A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) is created and saved to the root directory (usually Local Disk C:).

>>Please provide the contents of TDSSKiller in your reply.<<


Next, download aswMBR:
http://public.avast.com/~gmerek/asw...
Save to your Desktop.

Double click the aswMBR.exe icon to run it
Click the Scan button to start the scan

Upon completion of the scan, click the Save Log button

>>Save the aswMBR log to your Desktop, and post it in your reply.<<

~~~~
Retired - Doin' Dis, Dat, and slapping malware.


Report •

#21
June 16, 2011 at 18:55:06
OK, I will get back onto the computer this evening and run those scans

Is there anything we should be doing as far as those RogueKiller scan results?

Thanks for getting back aaflac44 :)


Report •

#22
July 5, 2011 at 11:45:21
so sorry it took so long to return.. the gal I was helping was out of town... here is the log for the MBR scan

aswMBR version 0.9.7.705 Copyright(c) 2011 AVAST Software
Run date: 2011-07-05 11:39:02
-----------------------------
11:39:02.812 OS Version: Windows 5.1.2600 Service Pack 3
11:39:02.812 Number of processors: 1 586 0xC00
11:39:02.812 ComputerName: JACKIE-PC UserName: Owner
11:39:03.984 Initialize success
11:39:25.125 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
11:39:25.125 Disk 0 Vendor: Maxtor_6Y080L0 YAR41BW0 Size: 76319MB BusType: 3
11:39:27.140 Disk 0 MBR read successfully
11:39:27.140 Disk 0 MBR scan
11:39:27.156 Disk 0 Windows XP default MBR code
11:39:29.187 Disk 0 scanning sectors +156280320
11:39:29.218 Disk 0 scanning C:\WINDOWS\system32\drivers
11:39:46.812 Service scanning
11:39:47.890 Disk 0 trace - called modules:
11:39:47.890 ntkrnlpa.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0xb1208890]<<
11:39:47.890 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8338d030]
11:39:47.906 3 CLASSPNP.SYS[f75a5fd7] -> nt!IofCallDriver -> [0x82dd8cc8]
11:39:47.906 \Driver\Disk[0x8335d578] -> IRP_MJ_CREATE -> 0xb1208890
11:39:47.906 Scan finished successfully
11:40:39.187 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Owner\Desktop\MBR.dat"
11:40:39.187 The log file has been saved successfully to "C:\Documents and Settings\Owner\Desktop\aswMBR.txt"

tdsskiller scan...

2011/07/05 11:42:32.0265 1440 TDSS rootkit removing tool 2.5.9.0 Jul 1 2011 18:45:21
2011/07/05 11:42:33.0093 1440 ================================================================================
2011/07/05 11:42:33.0093 1440 SystemInfo:
2011/07/05 11:42:33.0093 1440
2011/07/05 11:42:33.0093 1440 OS Version: 5.1.2600 ServicePack: 3.0
2011/07/05 11:42:33.0093 1440 Product type: Workstation
2011/07/05 11:42:33.0093 1440 ComputerName: JACKIE-PC
2011/07/05 11:42:33.0093 1440 UserName: Owner
2011/07/05 11:42:33.0093 1440 Windows directory: C:\WINDOWS
2011/07/05 11:42:33.0093 1440 System windows directory: C:\WINDOWS
2011/07/05 11:42:33.0093 1440 Processor architecture: Intel x86
2011/07/05 11:42:33.0093 1440 Number of processors: 1
2011/07/05 11:42:33.0093 1440 Page size: 0x1000
2011/07/05 11:42:33.0093 1440 Boot type: Normal boot
2011/07/05 11:42:33.0093 1440 ================================================================================
2011/07/05 11:42:34.0390 1440 Initialize success
2011/07/05 11:42:36.0234 2932 ================================================================================
2011/07/05 11:42:36.0234 2932 Scan started
2011/07/05 11:42:36.0234 2932 Mode: Manual;
2011/07/05 11:42:36.0234 2932 ================================================================================
2011/07/05 11:42:37.0609 2932 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
2011/07/05 11:42:37.0781 2932 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys
2011/07/05 11:42:37.0953 2932 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
2011/07/05 11:42:38.0046 2932 AFD (7618d5218f2a614672ec61a80d854a37) C:\WINDOWS\System32\drivers\afd.sys
2011/07/05 11:42:38.0187 2932 AgereSoftModem (7560f465f1ce69c53bf17559ee195548) C:\WINDOWS\system32\DRIVERS\AGRSM.sys
2011/07/05 11:42:38.0500 2932 ALCXWDM (781c5ec517c53f5214b61253b20c13c4) C:\WINDOWS\system32\drivers\ALCXWDM.SYS
2011/07/05 11:42:38.0718 2932 AmdPPM (033448d435e65c4bd72e70521fd05c76) C:\WINDOWS\system32\DRIVERS\AmdPPM.sys
2011/07/05 11:42:38.0875 2932 Arp1394 (b5b8a80875c1dededa8b02765642c32f) C:\WINDOWS\system32\DRIVERS\arp1394.sys
2011/07/05 11:42:39.0453 2932 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
2011/07/05 11:42:39.0640 2932 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
2011/07/05 11:42:39.0796 2932 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
2011/07/05 11:42:39.0890 2932 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
2011/07/05 11:42:40.0000 2932 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
2011/07/05 11:42:40.0125 2932 BrScnUsb (92a964547b96d697e5e9ed43b4297f5a) C:\WINDOWS\system32\DRIVERS\BrScnUsb.sys
2011/07/05 11:42:40.0296 2932 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
2011/07/05 11:42:40.0515 2932 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
2011/07/05 11:42:40.0593 2932 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
2011/07/05 11:42:40.0687 2932 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
2011/07/05 11:42:40.0750 2932 cercsr6 (84853b3fd012251690570e9e7e43343f) C:\WINDOWS\system32\drivers\cercsr6.sys
2011/07/05 11:42:41.0187 2932 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
2011/07/05 11:42:41.0312 2932 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
2011/07/05 11:42:41.0531 2932 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
2011/07/05 11:42:41.0625 2932 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
2011/07/05 11:42:41.0687 2932 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
2011/07/05 11:42:41.0843 2932 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
2011/07/05 11:42:42.0000 2932 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
2011/07/05 11:42:42.0093 2932 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\drivers\Fdc.sys
2011/07/05 11:42:42.0203 2932 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
2011/07/05 11:42:42.0312 2932 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys
2011/07/05 11:42:42.0390 2932 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
2011/07/05 11:42:42.0484 2932 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
2011/07/05 11:42:42.0562 2932 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
2011/07/05 11:42:42.0640 2932 gagp30kx (3a74c423cf6bcca6982715878f450a3b) C:\WINDOWS\system32\DRIVERS\gagp30kx.sys
2011/07/05 11:42:42.0718 2932 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
2011/07/05 11:42:42.0812 2932 GTNDIS5 (fc80052194d5708254a346568f0e77c0) C:\WINDOWS\system32\GTNDIS5.SYS
2011/07/05 11:42:42.0906 2932 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
2011/07/05 11:42:43.0062 2932 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
2011/07/05 11:42:43.0406 2932 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2011/07/05 11:42:43.0500 2932 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
2011/07/05 11:42:43.0796 2932 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
2011/07/05 11:42:43.0890 2932 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
2011/07/05 11:42:43.0968 2932 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
2011/07/05 11:42:44.0046 2932 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
2011/07/05 11:42:44.0140 2932 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
2011/07/05 11:42:44.0218 2932 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
2011/07/05 11:42:44.0312 2932 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
2011/07/05 11:42:44.0390 2932 kbdhid (9ef487a186dea361aa06913a75b3fa99) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
2011/07/05 11:42:44.0468 2932 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
2011/07/05 11:42:44.0546 2932 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
2011/07/05 11:42:44.0718 2932 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
2011/07/05 11:42:44.0812 2932 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
2011/07/05 11:42:44.0890 2932 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
2011/07/05 11:42:44.0968 2932 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
2011/07/05 11:42:45.0046 2932 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
2011/07/05 11:42:45.0265 2932 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
2011/07/05 11:42:45.0406 2932 MRxSmb (0ea4d8ed179b75f8afa7998ba22285ca) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
2011/07/05 11:42:45.0578 2932 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
2011/07/05 11:42:45.0718 2932 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
2011/07/05 11:42:45.0812 2932 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
2011/07/05 11:42:45.0890 2932 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
2011/07/05 11:42:46.0031 2932 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
2011/07/05 11:42:46.0125 2932 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys
2011/07/05 11:42:46.0218 2932 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
2011/07/05 11:42:46.0343 2932 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
2011/07/05 11:42:46.0421 2932 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
2011/07/05 11:42:46.0500 2932 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
2011/07/05 11:42:46.0578 2932 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
2011/07/05 11:42:46.0656 2932 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
2011/07/05 11:42:46.0734 2932 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
2011/07/05 11:42:47.0078 2932 NIC1394 (ab8dd1b58996d4698f1888016e05dccf) C:\WINDOWS\system32\DRIVERS\nic1394.sys
2011/07/05 11:42:47.0078 2932 NIC1394 - detected Rootkit.Win32.ZAccess.c (0)
2011/07/05 11:42:47.0187 2932 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
2011/07/05 11:42:47.0312 2932 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
2011/07/05 11:42:47.0453 2932 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
2011/07/05 11:42:47.0531 2932 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
2011/07/05 11:42:47.0625 2932 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
2011/07/05 11:42:47.0703 2932 ohci1394 (ca33832df41afb202ee7aeb05145922f) C:\WINDOWS\system32\DRIVERS\ohci1394.sys
2011/07/05 11:42:47.0781 2932 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys
2011/07/05 11:42:47.0875 2932 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
2011/07/05 11:42:47.0937 2932 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
2011/07/05 11:42:48.0031 2932 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
2011/07/05 11:42:48.0140 2932 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
2011/07/05 11:42:48.0250 2932 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\drivers\Pcmcia.sys
2011/07/05 11:42:48.0656 2932 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
2011/07/05 11:42:48.0765 2932 Processor (a32bebaf723557681bfc6bd93e98bd26) C:\WINDOWS\system32\DRIVERS\processr.sys
2011/07/05 11:42:48.0984 2932 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
2011/07/05 11:42:49.0078 2932 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
2011/07/05 11:42:49.0546 2932 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
2011/07/05 11:42:49.0687 2932 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
2011/07/05 11:42:49.0781 2932 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
2011/07/05 11:42:49.0875 2932 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
2011/07/05 11:42:50.0015 2932 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2011/07/05 11:42:50.0109 2932 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
2011/07/05 11:42:50.0203 2932 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
2011/07/05 11:42:50.0359 2932 RT2500 (17699390486c91807fa75534d2f28a4e) C:\WINDOWS\system32\DRIVERS\RT2500.sys
2011/07/05 11:42:50.0453 2932 RT73 (da4980fad2b7d86d6ed8e35e3874f65e) C:\WINDOWS\system32\DRIVERS\rt73.sys
2011/07/05 11:42:50.0609 2932 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
2011/07/05 11:42:50.0843 2932 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
2011/07/05 11:42:50.0937 2932 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\DRIVERS\serial.sys
2011/07/05 11:42:51.0109 2932 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
2011/07/05 11:42:51.0265 2932 SiS315 (d500827b25af28364ce58795276b5529) C:\WINDOWS\system32\DRIVERS\sisgrp.sys
2011/07/05 11:42:51.0343 2932 SiSkp (910af3e0b5c5c154c6e93478c5048d1c) C:\WINDOWS\system32\DRIVERS\srvkp.sys
2011/07/05 11:42:51.0421 2932 SISNIC (3fbb6ef8b5a71a2fa11f5f461bb73219) C:\WINDOWS\system32\DRIVERS\sisnic.sys
2011/07/05 11:42:51.0578 2932 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
2011/07/05 11:42:51.0671 2932 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
2011/07/05 11:42:51.0812 2932 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys
2011/07/05 11:42:51.0921 2932 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
2011/07/05 11:42:52.0000 2932 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
2011/07/05 11:42:52.0328 2932 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
2011/07/05 11:42:52.0437 2932 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
2011/07/05 11:42:52.0671 2932 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
2011/07/05 11:42:52.0750 2932 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
2011/07/05 11:42:52.0843 2932 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
2011/07/05 11:42:53.0015 2932 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
2011/07/05 11:42:53.0187 2932 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
2011/07/05 11:42:53.0343 2932 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
2011/07/05 11:42:53.0421 2932 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
2011/07/05 11:42:53.0500 2932 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
2011/07/05 11:42:53.0593 2932 usbohci (0daecce65366ea32b162f85f07c6753b) C:\WINDOWS\system32\DRIVERS\usbohci.sys
2011/07/05 11:42:53.0671 2932 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
2011/07/05 11:42:53.0765 2932 usbstor (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
2011/07/05 11:42:53.0890 2932 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
2011/07/05 11:42:54.0062 2932 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
2011/07/05 11:42:54.0171 2932 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
2011/07/05 11:42:54.0312 2932 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
2011/07/05 11:42:54.0687 2932 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
2011/07/05 11:42:54.0750 2932 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
2011/07/05 11:42:54.0859 2932 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk0\DR0
2011/07/05 11:42:55.0093 2932 MBR (0x1B8) (5b4298394f2be165dd3cf7898f7eba23) \Device\Harddisk5\DR6
2011/07/05 11:42:55.0515 2932 Boot (0x1200) (65b5dfeca4f8d2f59e6835b4f88ec941) \Device\Harddisk0\DR0\Partition0
2011/07/05 11:42:55.0531 2932 ================================================================================
2011/07/05 11:42:55.0531 2932 Scan finished
2011/07/05 11:42:55.0531 2932 ================================================================================
2011/07/05 11:42:55.0546 2748 Detected object count: 1
2011/07/05 11:42:55.0546 2748 Actual detected object count: 1
2011/07/05 11:43:00.0687 2748 NIC1394 (ab8dd1b58996d4698f1888016e05dccf) C:\WINDOWS\system32\DRIVERS\nic1394.sys
2011/07/05 11:43:13.0109 2748 Backup copy found, using it..
2011/07/05 11:43:13.0218 2748 C:\WINDOWS\system32\DRIVERS\nic1394.sys - will be cured after reboot
2011/07/05 11:43:13.0218 2748 Rootkit.Win32.ZAccess.c(NIC1394) - User select action: Cure

now that I have the computer back for the time being, hoping i can get things resolved today if you guys are around... thank you :)


Report •

#23
July 6, 2011 at 09:33:02
Mongoose88,

What problems are you still having?

What kind of computer is this...HP, Dell, etc.? Also provide Model, like Inspiron 1234...

Does it have a Recovery partition?

Did an XP CD come with it?

~~~~
Retired - Doin' Dis, Dat, and slapping malware.


Report •

#24
July 6, 2011 at 12:14:52
As far as I see, the only problem would be Pop Up Ads... Other than than, everything seems to be in decent shape...

I do use teamviewer for this computer im working on, and its weird that I have it set to Boot teamviewer at the windows login screen but it doesnt actually boot until the password is typed in.. thats why its been taking me so long to get back to you since she isnt home to type in the pw..

No XP cd, Not sure of a recovery partition, not sure of the computer model

thx aaflac


Report •

#25
July 6, 2011 at 21:09:15
One more step...

Please download the Kaspersky Virus Removal Tool:
http://support.kaspersky.com/viruse...

Save it to your Desktop
Right click the downloaded setup file, and select: Run as Administrator

At the main screen of the tool, in the AutoScan tab, make sure the first three options are checked
Next, scroll down to check the box next to the C:/ drive

Click on Start Scan

When the scan is finished, click on: Report (at the bottom)

In the Detailed Report screen, make sure the three buttons at the top are set to:
Autoscan, Do not group, and, Important events
Click on Save, and save to the Desktop

>>Please provide the Kaspersky Virus Removal Tool in your reply.<<


When done with the tool, uninstall it by doing the following:
In the bottom right corner of the main window, click the Exit button
Click the Yes button on the prompt to uninstall
Restart the computer to delete the Kaspersky Virus Removal Tool.

~~~~
Retired - Doin' Dis, Dat, and slapping malware.


Report •

Ask Question