Cannot run exe files - association broken after remove virus

Tried to fix mother in laws PC
It's XP Home

Had a false microsoft anti virus application.
Removed the process with process explorer.
But it came back after a few minutes.

So looked in regedit for "TCD.exe" and removed the 3 entries by blanking the data.
However the 3 entries appeared to create the association with exe files, but I carried on regardless.
The entry was in the form - full path to exe file %0 %1

Now can't open any exe file, eg. internet explorer, regedit, etc.

I don't know how to associate exe files with the folder options as the error message suggests.
And I can't remember where in the registry the 3 entries were.

Any ideas how to associate the exe files?
«13

Comments

  • RussJK
    RussJK Posts: 2,359 Forumite
    edited 15 June 2011 at 10:59PM
    Here's the .reg file alternatively if you struggle to unzip:
    http://www.users.on.net/~russ/xp_exe_fix.reg

    Can also do renaming tricks on EXEs as a temporary measure (rename to .COM, .SCR, etc), sometimes Run As, sometimes running from Task Manager.

    Another option is Re-Enabler:
    http://www.tangosoft.co.uk/re-enable v2.html
  • Thanks to both of you

    That's it fixed - was able to run the reg file.
  • RussJK
    RussJK Posts: 2,359 Forumite
    You'll want to run Malwarebytes, and depending on which fakeAV it is, you'll need to check for a rootkit (usually TDL/TDSS variants)
    http://www.malwarebytes.org/mbam-download.php
    http://support.kaspersky.com/downloads/utils/tdsskiller.exe
    http://public.avast.com/~gmerek/aswMBR.htm

    Always a good idea to run system restore to the day before, as you won't know exactly what has changed in the registry.

    Double check all autoruns and scheduled tasks before rebooting:
    http://technet.microsoft.com/en-us/sysinternals/bb963902

    Doesn't hurt to clear all temp files, java cache, etc; my favourite tool has become Temp File Cleaner:
    http://www.geekstogo.com/forum/files/file/187-tfc-temp-file-cleaner-by-oldtimer/
  • JesseJames_2
    JesseJames_2 Posts: 328 Forumite
    Part of the Furniture 100 Posts Name Dropper Combo Breaker
    edited 17 June 2011 at 4:49PM
    Thanks for the links Russ
    Ran them all and got the remaining viruses off the PC.

    Malwarebytes and Hijack This were clean after they removed problems.
    Uninstalled Malware bytes.
    Was down to 20 processes running in task manager before installing AVG just now.

    Just a few niggles.

    1) Having problems with internet.
    Chrome browser says DNS servers not responding
    Other PCs on the switch are OK, so something amiss here.
    So added Google DNS servers manually and now working.

    2)Opening up Internet browsers or Explorer windows it sometimes takes about 5/6 seconds to open.
    I can then navigate folders instantly.
    Opening up a second explorer is fast.
    If I wait a few minutes with an explorer window open, it takes another 5 seconds to open a folder within explorer.

    3)Installed Microsoft Security Essentials online
    Installed OK, but complained that cannot turn windows firewall on.
    But checked and Windows firewall was showing as on.
    The MSE GUI does not start on start up, but the process is showing as running.
    Manually starting MSE and the GUI comes on, but immediately shuts.
    At the same time the blue MSE tray icon comes on and then turns red and disappears.


    PC has 1.3GB memory with 800MB free
    CPU settles at 0-3%
    Hard drive is not crunching

    Uninstalled MSE, and then installed an offline version of AVG
    This appears to work AOK and updated fine.

    Before I ran Malwarebytes, 1) and 2) were already happening.





    Any ideas, anything I can try to check?
  • RussJK
    RussJK Posts: 2,359 Forumite
    Might be an idea to post the logs then from Malwarebytes, and also the latest Hijackthis log so we can see for ourselves. Hijackthis doesn't itself diagnose, or even fix anything without intervention. Post the logs before getting to anything else if you don't mind.

    Specifically, did TDSSkiller or aswMBR find anything amiss?

    Did system restore run successfully? Try all the options in Re-Enabler linked above. Double check if security centre is running (can look in services.msc). If not, troubleshoot that. Might be like the other thread, and eventually have to resort to doing a repair reinstall (http://www.michaelstevenstech.com/XPrepairinstall.htm).

    You might try HitmanPro to see if it spots anything amiss:
    http://www.surfright.nl/en/hitmanpro

    Also might be worth a try with Combofix, but you'll have to uninstall AVG and MSE disable the firewall for it to work. Also should run the AVG removal tool a few times
    http://www.avg.com/gb-en/download-tools
    http://www.bleepingcomputer.com/combofix/how-to-use-combofix
  • JesseJames_2
    JesseJames_2 Posts: 328 Forumite
    Part of the Furniture 100 Posts Name Dropper Combo Breaker
    First

    "Specifically, did TDSSkiller or aswMBR find anything amiss?"
    No rootkits - both programs.

    System restore did not work.

    I'll post the logs in a mo...
  • JesseJames_2
    JesseJames_2 Posts: 328 Forumite
    Part of the Furniture 100 Posts Name Dropper Combo Breaker
    Security centre was in the disabled state - now running

    Ran Re-enabler - AOK, although all these were working before.

    Malwarebytes found another today

    Logs below
    1) MWB - ran just now with 1 infection
    2) Hijack This - ran just now
    3) MWB - ran yesterday which had a few viruses on.

    I am trying your other links just now.

    Malwarebytes' Anti-Malware 1.51.0.1200
    https://www.malwarebytes.org

    Database version: 6879

    Windows 5.1.2600 Service Pack 3
    Internet Explorer 8.0.6001.18702

    17/06/2011 18:40:57
    mbam-log-2011-06-17 (18-40-46).txt

    Scan type: Quick scan
    Objects scanned: 157619
    Time elapsed: 3 minute(s), 8 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 1

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    c:\WINDOWS\ezebeqixiwu.dll (Trojan.Hiloti) -> No action taken.



    Logfile of Trend Micro HijackThis v2.0.4
    Scan saved at 18:53:05, on 17/06/2011
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\rundll32.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Common Files\Java\Java Update\jusched.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Documents and Settings\Admin\Desktop\Hijack This\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Documents and Settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\IE\rpbrowserrecordplugin.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O3 - Toolbar: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)
    O4 - HKLM\..\Run: [nwiz] C:\Program Files\NVIDIA Corporation\nView\nwiz.exe /installquiet
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_6CE5017F567343CA.dll/cmsidewiki.html
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1291854702265
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{12AD199B-99ED-4750-A343-5018CFF9EE0B}: NameServer = 8.8.8.8,8.8.4.4
    O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 93.188.165.47,93.188.166.247
    O17 - HKLM\System\CS1\Services\Tcpip\..\{12AD199B-99ED-4750-A343-5018CFF9EE0B}: NameServer = 93.188.165.47,93.188.166.247
    O17 - HKLM\System\CS2\Services\Tcpip\..\{12AD199B-99ED-4750-A343-5018CFF9EE0B}: NameServer = 8.8.8.8,8.8.4.4
    O17 - HKLM\System\CS3\Services\Tcpip\..\{12AD199B-99ED-4750-A343-5018CFF9EE0B}: NameServer = 8.8.8.8,8.8.4.4
    O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
    O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
    O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

    --
    End of file - 5206 bytes



    Malwarebytes' Anti-Malware 1.51.0.1200
    https://www.malwarebytes.org

    Database version: 6705

    Windows 5.1.2600 Service Pack 3
    Internet Explorer 8.0.6001.18702

    16/06/2011 21:41:55
    mbam-log-2011-06-16 (21-41-55).txt

    Scan type: Quick scan
    Objects scanned: 170609
    Time elapsed: 9 minute(s), 7 second(s)

    Memory Processes Infected: 3
    Memory Modules Infected: 1
    Registry Keys Infected: 16
    Registry Values Infected: 9
    Registry Data Items Infected: 6
    Folders Infected: 0
    Files Infected: 30

    Memory Processes Infected:
    c:\documents and settings\Admin\application data\dwm.exe (Trojan.Downloader) -> 1908 -> Unloaded process successfully.
    c:\WINDOWS\Vmalya.exe (Trojan.Downloader) -> 208 -> Unloaded process successfully.
    c:\documents and settings\Admin\application data\microsoft\conhost.exe (Trojan.Agent) -> 144 -> Unloaded process successfully.

    Memory Modules Infected:
    c:\WINDOWS\jtmthusu.dll (Trojan.Hiloti) -> Delete on reboot.

    Registry Keys Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256A51-B582-467e-B8D4-7786EDA79AE0} (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256A51-B582-467e-B8D4-7786EDA79AE0} (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{00A6FAF1-072E-44CF-8957-5838F569A31D} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF1-072E-44CF-8957-5838F569A31D} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{07B18EA1-A523-4961-B6BB-170DE4475CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA1-A523-4961-B6BB-170DE4475CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{07B18EA9-A523-4961-B6BB-170DE4475CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA9-A523-4961-B6BB-170DE4475CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF6-072E-44CF-8957-5838F569A31D} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EAB-A523-4961-B6BB-170DE4475CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{3DC201FB-E9C9-499C-A11F-23C360D7C3F8} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\NtWqIVLZEWZU (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\ (Hijack.Zones) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\SERVICES\MOUSEDRIVER (Trojan.Agent) -> Quarantined and deleted successfully.

    Registry Values Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tmijogiseyi (Trojan.Hiloti) -> Value: Tmijogiseyi -> Delete on reboot.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YDZ1QVAGOJ (Trojan.Downloader) -> Value: YDZ1QVAGOJ -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost (Trojan.Agent) -> Value: conhost -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Load (Trojan.Agent) -> Value: Load -> Delete on reboot.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell.Gen) -> Value: Shell -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\win (Trojan.Agent) -> Value: win -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\init (Trojan.Agent) -> Value: init -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer (PUM.Bad.Proxy) -> Value: ProxyServer -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MouseDriver\ImagePath (Trojan.Agent) -> Value: ImagePath -> Quarantined and deleted successfully.

    Registry Data Items Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Load (Trojan.Agent) -> Bad: (C:\DOCUME~1\Admin\LOCALS~1\Temp\csrss.exe) Good: () -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Bad: (93.188.165.47,93.188.166.247) Good: () -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{12AD199B-99ED-4750-A343-5018CFF9EE0B}\NameServer (Trojan.DNSChanger) -> Bad: (93.188.165.47,93.188.166.247) Good: () -> Quarantined and deleted successfully.

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    c:\WINDOWS\jtmthusu.dll (Trojan.Hiloti) -> Delete on reboot.
    c:\documents and settings\Admin\application data\dwm.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    c:\Documents and Settings\Admin\Local Settings\Temp\Vlq.exe (Trojan.Downloader) -> Delete on reboot.
    c:\WINDOWS\Vmalya.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    c:\Documents and Settings\Admin\Local Settings\Temp\Vll.exe (Trojan.Downloader) -> Delete on reboot.
    c:\documents and settings\Admin\application data\conima.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\application data\kx0378r.exe (Heuristics.Shuriken) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\application data\lssas.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\application data\manager.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\Temp\0.2905359784054694.exe (Backdoor.Cycbot.Gen) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\Temp\0.9664368237650729.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\Temp\rsoxmwenca.tmp (Trojan.Hiloti) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\Temp\aeoxmsnrwc.tmp (Heuristics.Shuriken) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\Temp\Vli.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\Temp\Vlj.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\Temp\Vlk.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\Temp\Vlm.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\Temp\Vln.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\Temp\Vlo.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\Temp\Vlp.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\application data\tcd.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\temporary internet files\Content.IE5\NXNWUXKR\xvidsetup[1].exe (Adware.Hotbar) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\application data\microsoft\conhost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\Temp\0.7818756726220346.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\Temp\0.551640440847503.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\local settings\Temp\csrss.exe (Trojan.Agent) -> Delete on reboot.
    c:\WINDOWS\Tasks\{22116563-108c-42c0-a7ce-60161b75e508}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
    c:\WINDOWS\Tasks\{bbaeaeaf-1275-40e2-bd6c-bc8f88bd114a}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
    c:\WINDOWS\Tasks\{810401e2-dde0-454e-b0e2-aa89c9e5967c}.job (Trojan.FraudPack) -> Quarantined and deleted successfully.
    c:\documents and settings\Admin\application data\mousedriver.bat (Trojan.Agent) -> Quarantined and deleted successfully.
  • JesseJames_2
    JesseJames_2 Posts: 328 Forumite
    Part of the Furniture 100 Posts Name Dropper Combo Breaker
    RussJK wrote: »
    What happened when you tried system restore? At what point did it fail.

    Sorry, it did not fail, it just did not restore past when the exe association was broken - I ran that the other night.
  • RussJK
    RussJK Posts: 2,359 Forumite
    The trojan left behind a DNS hijack. I would definitely run Combofix, as it's had a full package there and it's likely there's a rootkit as well. Make sure 'security center' under services.msc is set to 'Automatic (delayed start).

    Go back into Hijackthis, and Check and Fix the following:
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/micr...?1291854702265
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/ge...sh/swflash.cab
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 93.188.165.47,93.188.166.247
    O17 - HKLM\System\CS1\Services\Tcpip\..\{12AD199B-99ED-4750-A343-5018CFF9EE0B}: NameServer = 93.188.165.47,93.188.166.247

    They are Ukraine IP addresses: 93.188.166.247, etc.

    You really should uninstall Java unless it's specifically required by a program.
This discussion has been closed.
Meet your Ambassadors

🚀 Getting Started

Hi new member!

Our Getting Started Guide will help you get the most out of the Forum

Categories

  • All Categories
  • 350K Banking & Borrowing
  • 252.7K Reduce Debt & Boost Income
  • 453.1K Spending & Discounts
  • 243K Work, Benefits & Business
  • 619.9K Mortgages, Homes & Bills
  • 176.5K Life & Family
  • 256K Travel & Transport
  • 1.5M Hobbies & Leisure
  • 16.1K Discuss & Feedback
  • Read-Only Boards

Is this how you want to be seen?

We see you are using a default avatar. It takes only a few seconds to pick a picture.