Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: "Application cannot be executed. File xxxx is infected. Do you want to activate  (Read 15134 times)

0 Members and 1 Guest are viewing this topic.

new_team

    Topic Starter


    Starter

    Please help I'm getting popups that say:

    "Application cannot be executed. File xxxx is infected. Do you want to activate your antivirus software now?."

    Is there any way to get rid of these popups?


    SuperDave

    • Malware Removal Specialist
    • Moderator


    • Genius
    • Thanked: 1020
    • Certifications: List
    • Experience: Expert
    • OS: Windows 10
    Hello and welcome to Computer Hope Forum. My name is Dave. I will be helping you out with your particular problem on your computer. I am working under the guidance of one of the specialist of this forum so it may take a bit longer to process your logs.

    1. I will be working on your Malware issues. This may or may not solve other issues you have with your machine.
    2. The fixes are specific to your problem and should only be used for this issue on this machine.
    3. If you don't know or understand something, please don't hesitate to ask.
    4. Please DO NOT run any other tools or scans while I am helping you.
    5. It is important that you reply to this thread. Do not start a new topic.
    6. Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.
    7. Absence of symptoms does not mean that everything is clear.

    Please download and run the below tool named Rkill (courtesy of BleepingComputer.com) which may help allow other programs to run.
    Save Rkill to your desktop.

    There are 4 different versions. If one of them won't run then download and try to run the other one.
     
    Vista and Win7 users need to right click Rkill and choose Run as Administrator
     

    You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

    * Rkill.exe
    * Rkill.com
    * Rkill.scr
    * Rkill.pif

    Once you've gotten one of them to run then try to immediately run the following.

    =================================

    SUPERAntiSpyware

    If you already have SUPERAntiSpyware be sure to check for updates before scanning!


    Download SuperAntispyware Free Edition (SAS)
    * Double-click the icon on your desktop to run the installer.
    * When asked to Update the program definitions, click Yes
    * If you encounter any problems while downloading the updates, manually download and unzip them from here
    * Next click the Preferences button.

    •Under Start-Up Options uncheck Start SUPERAntiSpyware when Windows starts
    * Click the Scanning Control tab.
    * Under Scanner Options make sure only the following are checked:

    •Close browsers before scanning
    •Scan for tracking cookies
    •Terminate memory threats before quarantining
    Please leave the others unchecked

    •Click the Close button to leave the control center screen.

    * On the main screen click Scan your computer
    * On the left check the box for the drive you are scanning.
    * On the right choose Perform Complete Scan
    * Click Next to start the scan. Please be patient while it scans your computer.
    * After the scan is complete a summary box will appear. Click OK
    * Make sure everything in the white box has a check next to it, then click Next
    * It will quarantine what it found and if it asks if you want to reboot, click Yes

    •To retrieve the removal information please do the following:
    •After reboot, double-click the SUPERAntiSpyware icon on your desktop.
    •Click Preferences. Click the Statistics/Logs tab.

    •Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.

    •It will open in your default text editor (preferably Notepad).
    •Save the notepad file to your desktop by clicking (in notepad) File > Save As...

    * Save the log somewhere you can easily find it. (normally the desktop)
    * Click close and close again to exit the program.
    *Copy and Paste the log in your post.

    ===============================

    Please download Malwarebytes Anti-Malware from here.

    Double Click mbam-setup.exe to install the application.
    • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select "Perform Full Scan", then click Scan.
    • The scan may take some time to finish,so please be patient.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Make sure that everything is checked, and click Remove Selected.
    • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
    • Please save the log to a location you will remember.
    • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
    • Copy and paste the entire report in your next reply.
    Extra Note:

    If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.

    ==============================

    Please download: HiJackThis to your Desktop.
    • Double Click the HijackThis icon, located on your Desktop.
    • By Default, it will install to: C:\Program Files\Trend Micro\HijackThis
    • Accept the license agreement.
    • Click the Open the Misc Tools section button.
    • Place a checkmark beside Calculate MD5 of files if possible. Then, click Back.
    • Click Do a System Scan and Save a Logfile. Or, if you see a white screen, click Scan.
    • Please post the log in your next reply.
    Windows 8 and Windows 10 dual boot with two SSD's

    pdeshpa77



      Newbie

      Thanked: 1

      Hi
      I have the same problem...
      Please advise...
      tried rkilll..and runniing spyware and malware scans

      but the problem comes up after i reboot

      new_team

        Topic Starter


        Starter

        Hi Dave, thanks for helping. I am unable to get my computer on-line so I have to use another so I can post my replies. I ran SUPERAntiSpyware and here is the log. I in the process of running the other programs, when they are done I'll post the logs.

        SUPERAntiSpyware Scan Log
        http://www.superantispyware.com

        Generated 07/20/2010 at 02:29 AM

        Application Version : 4.40.1002

        Core Rules Database Version : 5134
        Trace Rules Database Version: 2946

        Scan type       : Complete Scan
        Total Scan Time : 02:59:59

        Memory items scanned      : 868
        Memory threats detected   : 0
        Registry items scanned    : 9658
        Registry threats detected : 0
        File items scanned        : 152593
        File threats detected     : 37

        Trojan.Dropper/SVCHost-Fake
           C:\USERS\MDR\APPDATA\LOCAL\TEMP\SVCHOST.EXE

        Adware.Tracking Cookie
           ads2.msads.net [ C:\Users\mejk\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\WV8UZEDX ]
           b.ads2.msads.net [ C:\Users\mejk\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\WV8UZEDX ]
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@247realmedia[1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@adecn[1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@advertising[1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@apmebf[2].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@atdmt[1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@collective-media[2].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][3].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@doubleclick[1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@fastclick[2].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@insightexpressai[2].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@interclick[2].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@invitemedia[1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@liveperson[1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@liveperson[2].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@lockedonmedia[2].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@mediaplex[1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@pointroll[2].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@questionmarket[1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@realmedia[2].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@ru4[1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@specificclick[2].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@trafficmp[1].txt
           C:\Users\mejk\AppData\Roaming\Microsoft\Windows\Cookies\Low\mejk@tribalfusion[1].txt

        new_team

          Topic Starter


          Starter

          This is the Malwarebytes Anti-Malware  log:

          Malwarebytes' Anti-Malware 1.46
          www.malwarebytes.org

          Database version: 4333

          Windows 6.0.6002 Service Pack 2
          Internet Explorer 8.0.6001.18928

          7/21/2010 12:34:34 AM
          mbam-log-2010-07-21 (00-34-34).txt

          Scan type: Full scan (C:\|)
          Objects scanned: 295912
          Time elapsed: 2 hour(s), 29 minute(s), 42 second(s)

          Memory Processes Infected: 0
          Memory Modules Infected: 0
          Registry Keys Infected: 0
          Registry Values Infected: 0
          Registry Data Items Infected: 0
          Folders Infected: 0
          Files Infected: 0

          Memory Processes Infected:
          (No malicious items detected)

          Memory Modules Infected:
          (No malicious items detected)

          Registry Keys Infected:
          (No malicious items detected)

          Registry Values Infected:
          (No malicious items detected)

          Registry Data Items Infected:
          (No malicious items detected)

          Folders Infected:
          (No malicious items detected)

          Files Infected:
          (No malicious items detected)

          new_team

            Topic Starter


            Starter

            I ran Hijackthis

            Logfile of Trend Micro HijackThis v2.0.2
            Scan saved at 10:38:04 PM, on 7/21/2010
            Platform: Windows Vista SP2 (WinNT 6.00.1906)
            MSIE: Internet Explorer v8.00 (8.00.6001.18928)
            Boot mode: Normal

            Running processes:
            C:\Program Files\Norton PC Checkup\Norton PC Checkup\Engine\2.0.2.506\ccSvcHst.exe
            C:\Windows\system32\Dwm.exe
            C:\Windows\Explorer.EXE
            C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
            C:\Program Files\Windows Defender\MSASCui.exe
            C:\Windows\RtHDVCpl.exe
            C:\Program Files\ltmoh\ltmoh.exe
            C:\Program Files\Toshiba\SmoothView\SmoothView.exe
            C:\Program Files\Synaptics\SynTP\SynToshiba.exe
            C:\Program Files\Toshiba\FlashCards\TCrdMain.exe
            C:\Program Files\Toshiba\ConfigFree\NDSTray.exe
            C:\Program Files\McAfee\MPS\mpsevh.exe
            C:\Windows\System32\mobsync.exe
            C:\PROGRA~1\McAfee.com\Agent\mcagent.exe
            C:\Program Files\Toshiba\Utilities\KeNotify.exe
            C:\Toshiba\IVP\ISM\pinger.exe
            C:\Program Files\McAfee\MSK\mskagent.exe
            C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
            C:\Program Files\Webroot\Webroot Desktop Firewall\WDF.exe
            C:\Program Files\iTunes\iTunesHelper.exe
            C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
            C:\Windows\System32\igfxtray.exe
            C:\Windows\System32\hkcmd.exe
            C:\Windows\System32\igfxpers.exe
            C:\Program Files\Common Files\Java\Java Update\jusched.exe
            C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
            C:\Program Files\MSN Toolbar\Platform\4.0.0379.0\mswinext.exe
            C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe
            C:\Program Files\Toshiba\TOSCDSPD\TOSCDSPD.exe
            C:\Windows\ehome\ehtray.exe
            C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
            C:\Windows\system32\igfxsrvc.exe
            C:\Program Files\Skype\Phone\Skype.exe
            C:\Program Files\Windows Media Player\wmpnscfg.exe
            C:\Windows\system32\taskeng.exe
            C:\Windows\ehome\ehmsas.exe
            C:\Windows\system32\wbem\unsecapp.exe
            C:\Program Files\Toshiba\ConfigFree\CFSwMgr.exe
            C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
            C:\Program Files\Windows Mail\WinMail.exe
            c:\PROGRA~1\mcafee\msc\mcuimgr.exe
            C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
            C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
            C:\Windows\system32\WerCon.exe

            R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
            R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
            R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.toshibadirect.com/dpdstart
            R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
            R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
            R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
            R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
            R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
            R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://search.yahoo.com/search?fr=mcafee&p=%s
            R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=127.0.0.1:5577
            R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
            R3 - URLSearchHook: (no name) - {0579B4B6-0293-4d73-B02D-5EBB0BA0F0A2} - C:\Program Files\AskSBar\SrchAstt\1.bin\A2SRCHAS.DLL
            R3 - URLSearchHook: McAfee SiteAdvisor Toolbar - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll
            O1 - Hosts: ::1 localhost
            O2 - BHO: Ask Search Assistant BHO - {0579B4B1-0293-4d73-B02D-5EBB0BA0F0A2} - C:\Program Files\AskSBar\SrchAstt\1.bin\A2SRCHAS.DLL (filesize 66912 bytes, MD5 2F19F535F88BEE3AF522BD28478C019E)
            O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll (filesize 75128 bytes, MD5 5CF6190CD875DA6B35256FEE573E7908)
            O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll (filesize 308856 bytes, MD5 33440A3EF90AF7ED74EE55CA634A9CFA)
            O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - (no file)
            O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll (filesize 138608 bytes, MD5 09F3D779638216DBB6B8D4C1075D6A8F)
            O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - c:\PROGRA~1\mcafee\VIRUSS~1\scriptcl.dll (filesize 67136 bytes, MD5 196CCD7A9076A9D937EF39ED52332688)
            O2 - BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (filesize 403840 bytes, MD5 D46ED7D33E847CD9E78E9F02910536B5)
            O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (filesize 278192 bytes, MD5 389947CAD1A9C504DF6285AA1E7BE6F1)
            O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.5.5126.1836\swg.dll (filesize 814648 bytes, MD5 42CB4EE0B0FC259C8AD20B460FA7D72A)
            O2 - BHO: McAfee SiteAdvisor BHO - {B164E929-A1B6-4A06-B104-2CD0E90A88FF} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll (filesize 251416 bytes, MD5 9726FFE52DEAD5E391706A53879966DB)
            O2 - BHO: MSN Toolbar BHO - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files\MSN Toolbar\Platform\4.0.0379.0\npwinext.dll (filesize 506720 bytes, MD5 42304A5C69A78FEF990D94D40B26D02F)
            O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll (filesize 41760 bytes, MD5 883EF2DD3C9F68691CE02DAAC7267D41)
            O3 - Toolbar: McAfee SiteAdvisor Toolbar - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll (filesize 251416 bytes, MD5 9726FFE52DEAD5E391706A53879966DB)
            O3 - Toolbar: MSN Toolbar - {8dcb7100-df86-4384-8842-8fa844297b3f} - C:\Program Files\MSN Toolbar\Platform\4.0.0379.0\npwinext.dll (filesize 506720 bytes, MD5 42304A5C69A78FEF990D94D40B26D02F)
            O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (filesize 278192 bytes, MD5 389947CAD1A9C504DF6285AA1E7BE6F1)
            O4 - HKLM\..\Run: [SynTPEnh] "C:\Program Files\Synaptics\SynTP\SynTPEnh.exe" (filesize 1316136 bytes, MD5 DE3BF6F6A72E8A26945E1B8EAFA5DC64)
            O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide (filesize 1008184 bytes, MD5 0D392EDE3B97E0B3131B2F63EF1DB94E)
            O4 - HKLM\..\Run: [RtHDVCpl] "C:\Windows\RtHDVCpl.exe" (filesize 3784704 bytes, MD5 A503A47A5E7EA8024379A8CC6059B74A)
            O4 - HKLM\..\Run: [LtMoh] "C:\Program Files\ltmoh\Ltmoh.exe" (filesize 188416 bytes, MD5 7DC4E93F9BE692E29B1E1D27B6A389DC)
            O4 - HKLM\..\Run: [TPwrMain] "C:\Program Files\TOSHIBA\Power Saver\TPwrMain.EXE" (filesize 411768 bytes, MD5 424C1ADB34F9F1B2BC947D8BF0D5FBE3)
            O4 - HKLM\..\Run: [HSON] "C:\Program Files\TOSHIBA\TBS\HSON.exe" (filesize 55416 bytes, MD5 15058804D8A48C67C007DD1D797CC72A)
            O4 - HKLM\..\Run: [SmoothView] "C:\Program Files\Toshiba\SmoothView\SmoothView.exe" (filesize 448632 bytes, MD5 D1093014C17EFB8E5D84F78297F9699B)
            O4 - HKLM\..\Run: [00TCrdMain] "C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe" (filesize 530552 bytes, MD5 842691D383157CDF5D3D81E06BC1FC71)
            O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe (filesize 1372160 bytes, MD5 93225E495B790822039F561839529B0B)
            O4 - HKLM\..\Run: [HWSetup] "C:\Program Files\TOSHIBA\Utilities\HWSetup.exe" hwSetUP (filesize 413696 bytes, MD5 910B7CFD6E23D6E0A7370525B5AE5B7A)
            O4 - HKLM\..\Run: [SVPWUTIL] "C:\Program Files\TOSHIBA\Utilities\SVPWUTIL.exe" SVPwUTIL (filesize 421888 bytes, MD5 104B2D030A592D4B2FC87D49B3ED62D6)
            O4 - HKLM\..\Run: [KeNotify] "C:\Program Files\TOSHIBA\Utilities\KeNotify.exe" (filesize 34352 bytes, MD5 AFD400AEBCAB252C99E60991FF00D9D2)
            O4 - HKLM\..\Run: [PINGER] "C:\TOSHIBA\IVP\ISM\pinger.exe" /run (filesize 151552 bytes, MD5 FF0727AB2E7B019026D9034F643752B0)
            O4 - HKLM\..\Run: [MskAgentexe] "C:\Program Files\McAfee\MSK\MskAgent.exe" (filesize 152144 bytes, MD5 07C64AC231B1902948149D76EA33D63E)
            O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup (filesize 30192 bytes, MD5 9F5F2F0FB0A7F5AA9F16B9A7B6DAD89F)
            O4 - HKLM\..\Run: [mcagent_exe] "C:\Program Files\McAfee.com\Agent\mcagent.exe" /runkey (filesize 582992 bytes, MD5 9405B452064BFA6A0F78E2F177A988A4)
            O4 - HKLM\..\Run: [AppleSyncNotifier] "C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe" (filesize 111936 bytes, MD5 3C59CB80D1849128C14FF2B3245419BE)
            O4 - HKLM\..\Run: [Webroot Desktop Firewall] "C:\Program Files\Webroot\Webroot Desktop Firewall\WDF.exe" (filesize 2401672 bytes, MD5 08AB98D70A9DF579E0BD8F2C42B10C9A)
            O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime (filesize 413696 bytes, MD5 9C9B6807425CEF840C117654D8B033D1)
            O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe" (filesize 290088 bytes, MD5 E6A4E341E4304B34AA280D3E73818C90)
            O4 - HKLM\..\Run: [Ad-Watch] "C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe" (filesize 524632 bytes, MD5 6F8F0EF862C6F67A09674620B7F5F418)
            O4 - HKLM\..\Run: [IgfxTray] "C:\Windows\system32\igfxtray.exe" (filesize 141848 bytes, MD5 7F7B42B1BA42242116F5B277A063FE2E)
            O4 - HKLM\..\Run: [HotKeysCmds] "C:\Windows\system32\hkcmd.exe" (filesize 166424 bytes, MD5 5F529FBB095CBC9F14BB1E97A7A6B547)
            O4 - HKLM\..\Run: [Persistence] "C:\Windows\system32\igfxpers.exe" (filesize 133656 bytes, MD5 D8A33AF26E4143F7A892009890BB6F64)
            O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe" (filesize 246504 bytes, MD5 E0D6538B62C79FCBF0B27F95FAF3208B)
            O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" (filesize 35696 bytes, MD5 33E5A8FC8EB0EE42478F8538D0215D8F)
            O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" (filesize 935288 bytes, MD5 3103FE27C967675B019E880AA6DA3D6D)
            O4 - HKLM\..\Run: [MSN Toolbar] "C:\Program Files\MSN Toolbar\Platform\4.0.0379.0\mswinext.exe" (filesize 240992 bytes, MD5 C4D71A917D9219C5AC69D9FF0BBAB7C8)
            O4 - HKLM\..\Run: [Microsoft Default Manager] "C:\Program Files\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe" -resume (filesize 288080 bytes, MD5 F8B91C91225E5CAA2B2F0370201021C0)
            O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe" /startintray (filesize 6515784 bytes, MD5 253E5B2B2A6CEE5EE13A06C3EDFFE78B)
            O4 - HKCU\..\Run: [TOSCDSPD] "C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe" (filesize 417792 bytes, MD5 997EEC696414961A32EF7E884B80C965)
            O4 - HKCU\..\Run: [ehTray.exe] "C:\Windows\ehome\ehTray.exe" (filesize 125952 bytes, MD5 BF08674925F151BD4537B89A493E3E0C)
            O4 - HKCU\..\Run: [updateMgr] "C:\Program Files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe" AcRdB7_0_9
            O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" (filesize 39408 bytes, MD5 5D61BE7DB55B026A5D61A3EED09D0EAD)
            O4 - HKCU\..\Run: [Skype] "C:\Program Files\Skype\Phone\Skype.exe" /nosplash /minimized (filesize 25623336 bytes, MD5 BF9EAB227D409CE1E75C23BB10CF5DBC)
            O4 - HKCU\..\Run: [WMPNSCFG] "C:\Program Files\Windows Media Player\WMPNSCFG.exe" (filesize 202240 bytes, MD5 35937EAD711207544E219C2A19A78A7D)
            O4 - HKCU\..\Run: [SUPERAntiSpyware] "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe" (filesize 2403568 bytes, MD5 DA7680EF3018FEF1A27268AD40E85DFA)
            O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
            O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
            O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
            O8 - Extra context menu item: &ieSpell Options - res://C:\Program Files\ieSpell\iespell.dll/SPELLOPTION.HTM
            O8 - Extra context menu item: Check &Spelling - res://C:\Program Files\ieSpell\iespell.dll/SPELLCHECK.HTM
            O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
            O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_89D8574934B26AC4.dll/cmsidewiki.html
            O8 - Extra context menu item: Lookup on Merriam Webster - file://C:\Program Files\ieSpell\Merriam Webster.HTM
            O8 - Extra context menu item: Lookup on Wikipedia - file://C:\Program Files\ieSpell\wikipedia.HTM
            O9 - Extra button: ieSpell - {0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8} - C:\Program Files\ieSpell\iespell.dll (filesize 262144 bytes, MD5 7F72160036D269D0763C1CAE6D6AA2FF)
            O9 - Extra 'Tools' menuitem: ieSpell - {0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8} - C:\Program Files\ieSpell\iespell.dll (filesize 262144 bytes, MD5 7F72160036D269D0763C1CAE6D6AA2FF)
            O9 - Extra button: (no name) - {1606D6F9-9D3B-4aea-A025-ED5B2FD488E7} - C:\Program Files\ieSpell\iespell.dll (filesize 262144 bytes, MD5 7F72160036D269D0763C1CAE6D6AA2FF)
            O9 - Extra 'Tools' menuitem: ieSpell Options - {1606D6F9-9D3B-4aea-A025-ED5B2FD488E7} - C:\Program Files\ieSpell\iespell.dll (filesize 262144 bytes, MD5 7F72160036D269D0763C1CAE6D6AA2FF)
            O13 - Gopher Prefix:
            O16 - DPF: Garmin Communicator Plug-In - https://my.garmin.com/static/m/cab/2.8.3/GarminAxControl.CAB
            O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
            O16 - DPF: {3860DD98-0549-4D50-AA72-5D17D200EE10} (Windows Live OneCare safety scanner control) - http://cdn.scan.onecare.live.com/resource/download/scanner/en-us/wlscctrl2.cab
            O16 - DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} (DLM Control) - http://dlm.tools.akamai.com/dlmanager/versions/activex/dlm-activex-2.2.5.0.cab
            O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
            O18 - Protocol: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll (filesize 251416 bytes, MD5 9726FFE52DEAD5E391706A53879966DB)
            O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - (no file)
            O18 - Protocol: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll (filesize 251416 bytes, MD5 9726FFE52DEAD5E391706A53879966DB)
            O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL (filesize 1959208 bytes, MD5 1E79B48BC50B99FDC0066860BCEFBC23)
            O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~1\GOEC62~1.DLL
            O23 - Service: Agere Modem Call Progress Audio (AgereModemAudio) - Agere Systems - C:\Windows\system32\agrsmsvc.exeC:\Windows\system32\agrsmsvc.exe
            O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exeC:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
            O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exeC:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
            O23 - Service: McAfee E-mail Proxy (Emproxy) - McAfee, Inc. - C:\PROGRA~1\COMMON~1\McAfee\EmProxy\emproxy.exeC:\PROGRA~1\COMMON~1\McAfee\EmProxy\emproxy.exe
            O23 - Service: Google Desktop Manager 5.9.1005.12335 (GoogleDesktopManager-051210-111108) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exeC:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
            O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exeC:\Program Files\Google\Update\GoogleUpdate.exe
            O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exeC:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
            O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exeC:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
            O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exeC:\Program Files\iPod\bin\iPodService.exe
            O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exeC:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
            O23 - Service: McAfee HackerWatch Service - McAfee, Inc. - C:\Program Files\Common Files\McAfee\HackerWatch\HWAPI.exeC:\Program Files\Common Files\McAfee\HackerWatch\HWAPI.exe
            O23 - Service: McAfee SiteAdvisor Service - McAfee, Inc. - C:\Program Files\McAfee\SiteAdvisor\McSACore.exeC:\Program Files\McAfee\SiteAdvisor\McSACore.exe
            O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exeC:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
            O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\program files\common files\mcafee\mna\mcnasvc.exec:\program files\common files\mcafee\mna\mcnasvc.exe
            O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exeC:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
            O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exec:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
            O23 - Service: McAfee Redirector Service (McRedirector) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\redirsvc\redirsvc.exec:\PROGRA~1\COMMON~1\mcafee\redirsvc\redirsvc.exe
            O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exeC:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
            O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exeC:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
            O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exeC:\Program Files\McAfee\MPF\MPFSrv.exe
            O23 - Service: McAfee Privacy Service (MPS9) - McAfee, Inc. - C:\PROGRA~1\McAfee\MPS\mps.exeC:\PROGRA~1\McAfee\MPS\mps.exe
            O23 - Service: McAfee SpamKiller Service (MSK80Service) - McAfee Inc. - C:\Program Files\McAfee\MSK\MskSrver.exeC:\Program Files\McAfee\MSK\MskSrver.exe
            O23 - Service: Nero BackItUp Scheduler 4.0 - Unknown owner - C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe (file missing)
            O23 - Service: Norton PC Checkup Application Launcher - Symantec Corporation - C:\Program Files\Norton PC Checkup\Norton PC Checkup\Engine\2.0.2.506\SymcPCCULaunchSvc.exeC:\Program Files\Norton PC Checkup\Norton PC Checkup\Engine\2.0.2.506\SymcPCCULaunchSvc.exe
            O23 - Service: Common Client Job Manager Service (PCCUJobMgr) - Symantec Corporation - C:\Program Files\Norton PC Checkup\Norton PC Checkup\Engine\2.0.2.506\ccSvcHst.exeC:\Program Files\Norton PC Checkup\Norton PC Checkup\Engine\2.0.2.506\ccSvcHst.exe
            O23 - Service: Swupdtmr - Unknown owner - c:\Toshiba\IVP\swupdate\swupdtmr.exec:\Toshiba\IVP\swupdate\swupdtmr.exe
            O23 - Service: TOSHIBA Optical Disc Drive Service (TODDSrv) - TOSHIBA Corporation - C:\Windows\system32\TODDSrv.exeC:\Windows\system32\TODDSrv.exe
            O23 - Service: TOSHIBA Power Saver (TosCoSrv) - TOSHIBA Corporation - C:\Program Files\Toshiba\Power Saver\TosCoSrv.exeC:\Program Files\Toshiba\Power Saver\TosCoSrv.exe
            O23 - Service: TOSHIBA Bluetooth Service - TOSHIBA CORPORATION - C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exeC:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
            O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exeC:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
            O23 - Service: Webroot Desktop Firewall network service (WDFNet) - Webroot Software Inc (www.webroot.com) - C:\Program Files\Webroot\Webroot Desktop Firewall\wdfsvc.exeC:\Program Files\Webroot\Webroot Desktop Firewall\wdfsvc.exe
            O23 - Service: Webroot Spy Sweeper Engine (WebrootSpySweeperService) - Webroot Software, Inc. (www.webroot.com) - C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exeC:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
            O23 - Service: Webroot Client Service (WRConsumerService) - Webroot Software, Inc.  - C:\Program Files\Webroot\Spy Sweeper\WRConsumerService.exeC:\Program Files\Webroot\Spy Sweeper\WRConsumerService.exe

            --
            End of file - 20846 bytes


            The issue is fixed, I'm no longer getting the error messages and I can now get on-line.
            Thank you very much for all your help.

            SuperDave

            • Malware Removal Specialist
            • Moderator


            • Genius
            • Thanked: 1020
            • Certifications: List
            • Experience: Expert
            • OS: Windows 10
            There's still more work to do.

            I strongly recommend that you remove Ask from your computer because it;

            •Promotes its toolbars on sites targeted to kids.

            •Promotes its toolbars through ads that appear to be part of other companies' sites.

            •Promotes its toolbars through other companies' spyware.

            •Installs without any disclosure whatsoever and without any consent whatsoever.

            •Solicits installations via "deceptive door openers" that do not accurately describe the offer; failing to affirmatively show a license agreement; linking to a EULA via an off-screen link.

            •Makes confusing changes to users' browsers -- increasing Ask's revenues while taking users to pages they didn't intend to visit.

            See Here for more info.

            If you choose to follow my recommendation then please go to Start > Control Panel > Add/Remove Programs and remove the following programs if present.

            AskBarDis or anything related to Ask

            Then please find and delete this folder in bold (if present):
            C:\Program Files\AskBarDis. or anything related to Ask.

            ======================================

            Open HijackThis and select Do a system scan only

            Place a check mark next to the following entries: (if there)

            R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
            R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
            R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=127.0.0.1:5577
            R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
            R3 - URLSearchHook: (no name) - {0579B4B6-0293-4d73-B02D-5EBB0BA0F0A2} - C:\Program Files\AskSBar\SrchAstt\1.bin\A2SRCHAS.DLL
            O2 - BHO: Ask Search Assistant BHO - {0579B4B1-0293-4d73-B02D-5EBB0BA0F0A2} - C:\Program Files\AskSBar\SrchAstt\1.bin\A2SRCHAS.DLL (filesize 66912 bytes, MD5 2F19F535F88BEE3AF522BD28478C019E)
            O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - (no file)
            O23 - Service: Nero BackItUp Scheduler 4.0 - Unknown owner - C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe (file missing)


            Important: Close all open windows except for HijackThis and then click Fix checked.

            Once completed, exit HijackThis.

            =====================================

            Download Security Check by screen317 from one of the following links and save it to your desktop.

            Link 1
            Link 2

            * Unzip SecurityCheck.zip and a folder named Security Check should appear.
            * Open the Security Check folder and double-click Security Check.bat
            * Follow the on-screen instructions inside of the black box.
            * A Notepad document should open automatically called checkup.txt
            * Post the contents of that document in your next reply.

            Note: If a security program requests permission from dig.exe to access the Internet, allow it to do so.

            ===================================

            Download ComboFix by sUBs from one of the below links. 

            Important! You MUST save ComboFix to your desktop

            link # 1
            Link # 2

            Temporarily disable your Anti-virus and any Antispyware real time protection before performing a scan. Click this link to see a list of security programs that should be disabled and how to disable them.

            Double click on ComboFix.exe & follow the prompts.

            Vista users Right-Click on ComboFix.exe and select Run as administrator (you will receive a UAC prompt, please allow it)

            Do not mouse-click ComboFix's window while it is running. That may cause it to stall.

            When the scan completes it will open a text window.
             
            Post the contents of that log in your next reply.

            Remember to re-enable your Anti-virus and Antispyware protection when ComboFix is complete.

            Windows 8 and Windows 10 dual boot with two SSD's

            Pinotheo

            • Guest
            BUMP

            Hey Dave,
            I have just gotten the same problem as these two. Unfortunately, the virus or malware will not allow me to get onto my PC that is infected and get onto the internet to run these programs that you have listed. Is there a way to get access to the internet to download these programs without the pop ups preventing me?

            SuperDave

            • Malware Removal Specialist
            • Moderator


            • Genius
            • Thanked: 1020
            • Certifications: List
            • Experience: Expert
            • OS: Windows 10
            Pinotheo, please do not highjack another person's thread. Please start a thread of your own and you will get help.

            Windows 8 and Windows 10 dual boot with two SSD's