Tech Support banner

Not open for further replies.
1 - 4 of 4 Posts

3 Posts
Discussion Starter · #1 ·
"Application cannot be executed. The file "..." is infected. Do you want to activate

your antivirus software? This is the message I get when I try to run anything. I tried to run the initial scans that you wanted me to to produce the logs but it won't let me. I'm not sure where to go to now. I have no safe mode option when my computer boots up. It's got an invalid boot file or something. Please help..

3 Posts
Re: "Application cannot be executed. The file "..." is infected. Do you want to activ

Wouldn't let me edit post but I got the logs that were wanted.

DDS (Ver_10-03-17.01) - NTFSx86 NETWORK
Run by Administrator at 6:36:24.12 on Sun 05/16/2010
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_12
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2527.2239 [GMT -5:00]

============== Running Processes ===============

C:\windows\system32\svchost -k DcomLaunch
C:\windows\system32\svchost.exe -k netsvcs
C:\Documents and Settings\Administrator\Desktop\111.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://
uSearch Page = hxxp://*
uSearch Bar = hxxp://*
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = <local>
uInternet Settings,ProxyServer = http=
uSearchURL,(Default) = hxxp://*
mWinlogon: Userinit=c:\windows\system32\userinit.exe
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: {9b6eb8b7-364d-4a28-b8de-8e0eafb9b096} - metadomo.dll
TB: &RoboForm: {724d43a0-0d85-11d4-9908-00400523e39a} - c:\program files\siber systems\ai roboform\roboform.dll
TB: {3041D03E-FD4B-44E0-B742-2D9B88305F98} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [msnmsgr] "c:\program files\windows live\messenger\msnmsgr.exe" /background
uRun: [MyWebSearch Email Plugin] c:\progra~1\mywebs~1\bar\1.bin\mwsoemon.exe
uRun: [nyusfnuh] c:\documents and settings\administrator\local settings\application data\kqpqaprrf\kmbrekatssd.exe
mRun: [My Web Search Bar Search Scope Monitor] "c:\progra~1\mywebs~1\bar\1.bin\m3SrchMn.exe" /m=2 /w /h
mRun: [MyWebSearch Email Plugin] c:\progra~1\mywebs~1\bar\1.bin\mwsoemon.exe
mRun: [nyusfnuh] c:\documents and settings\administrator\local settings\application data\kqpqaprrf\kmbrekatssd.exe
dRunOnce: [FlashPlayerUpdate] c:\windows\system32\macromed\flash\FlashUtil10c.exe
mPolicies-system: EnableLUA = 0 (0x0)
IE: Customize Menu - file://c:\program files\siber systems\ai roboform\RoboFormComCustomizeIEMenu.html
IE: E&xport to Microsoft Excel - c:\progra~1\micros~4\office11\EXCEL.EXE/3000
IE: Fill Forms - file://c:\program files\siber systems\ai roboform\RoboFormComFillForms.html
IE: RoboForm Toolbar - file://c:\program files\siber systems\ai roboform\RoboFormComShowToolbar.html
IE: Save Forms - file://c:\program files\siber systems\ai roboform\RoboFormComSavePass.html
IE: {320AF880-6646-11D3-ABEE-C5DBF3571F46} - c:\program files\siber systems\ai roboform\RoboFormComFillForms.html
IE: {320AF880-6646-11D3-ABEE-C5DBF3571F49} - c:\program files\siber systems\ai roboform\RoboFormComSavePass.html
IE: {724d43aa-0d85-11d4-9908-00400523e39a} - c:\program files\siber systems\ai roboform\RoboFormComShowToolbar.html
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~4\office11\REFIEBAR.DLL
Trusted Zone:
Trusted Zone:
Trusted Zone:
Trusted Zone:
Trusted Zone:
Trusted Zone:
Trusted Zone:
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://
DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} - hxxp://
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\program files\ievony\Skype4COM.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
LSA: Notification Packages = scecli gakikedo.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\admini~1\applic~1\mozilla\firefox\profiles\84nj9mfz.default\
FF - prefs.js: - hxxp://
FF - prefs.js: - Google
FF - prefs.js: browser.startup.homepage - hxxp://
FF - prefs.js: keyword.URL - hxxp://
FF - component: c:\program files\mozilla firefox\components\FFComm.dll
FF - component: c:\program files\siber systems\ai roboform\firefox\components\rfproxy_31.dll
FF - plugin: c:\documents and settings\administrator\application data\mozilla\firefox\profiles\84nj9mfz.default\extensions\{e2883e8f-472f-4fb0-9522-ac9bf37916a7}\plugins\np_gp.dll
FF - plugin: c:\documents and settings\all users\application data\nexonus\ngm\npNxGameUS.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npmusicn.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npPandoWebInst.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: XULRunner: {4E6ED635-8D53-4905-B3C0-4C3E0F794094} - c:\documents and settings\administrator\local settings\application data\{4E6ED635-8D53-4905-B3C0-4C3E0F794094}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0012-ABCDEFFEDCBA}

FF - user.js: yahoo.homepage.dontask - truec:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2009-4-23 64160]
S1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2010-1-5 9968]
S1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2010-1-5 74480]
S2 ASKService;ASKService;c:\program files\askbardis\bar\bin\askservice.exe --> c:\program files\askbardis\bar\bin\AskService.exe [?]
S2 ASKUpgrade;ASKUpgrade;c:\program files\askbardis\bar\bin\askupgrade.exe --> c:\program files\askbardis\bar\bin\ASKUpgrade.exe [?]
S2 HssWd;Hotspot Shield Monitoring Service;c:\program files\hotspot shield\bin\hsswd.exe [2010-1-8 285744]
S2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2009-3-9 1029456]
S2 MotoConnect Service;MotoConnect Service;c:\program files\motorola\motoconnectservice\MotoConnectService.exe [2010-1-20 91392]
S2 MyWebSearchService;My Web Search Service;c:\progra~1\mywebs~1\bar\1.bin\mwssvc.exe --> c:\progra~1\mywebs~1\bar\1.bin\mwssvc.exe [?]
S2 wmcmgc;Windows Management Configuration;c:\windows\system32\svchost.exe -k netsvcs [2008-4-14 14336]
S3 androidusb;ADB Interface Driver;c:\windows\system32\drivers\motoandroid.sys [2010-1-20 25856]
S3 BTCFilterService;USB Networking Driver Filter Service;c:\windows\system32\drivers\motfilt.sys [2010-1-20 6016]
S3 motccgp;Motorola USB Composite Device Driver;c:\windows\system32\drivers\motccgp.sys [2010-1-20 19712]
S3 motccgpfl;MotCcgpFlService;c:\windows\system32\drivers\motccgpfl.sys [2010-1-20 8320]
S3 MotDev;Motorola Inc. USB Device;c:\windows\system32\drivers\motodrv.sys [2010-1-20 42752]
S3 Motousbnet;Motorola USB Networking Driver Service;c:\windows\system32\drivers\Motousbnet.sys [2010-1-20 24960]
S3 motport;Motorola USB Diagnostic Port;c:\windows\system32\drivers\motport.sys [2010-1-20 23936]
S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\gamemon.des -service --> c:\windows\system32\GameMon.des -service [?]
S3 npkycryp;npkycryp;\??\c:\nexon\maplestory 55\npkycryp.sys --> c:\nexon\maplestory 55\npkycryp.sys [?]
S3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2010-1-5 7408]
S3 SbieDrv;SbieDrv;c:\program files\sandboxie\SbieDrv.sys [2010-2-3 115432]
S3 XIRLINK;Veo Mobile/Advanced Web Camera;c:\windows\system32\drivers\ucdnt.sys [2009-3-23 728035]

=============== Created Last 30 ================

2010-05-13 21:52:40 0 d-----w- c:\temp\MotoConnectTemp
2010-05-01 13:43:38 95744 ----a-w- c:\documents and settings\administrator\o.dat
2010-04-16 11:45:49 0 dc-h--w- c:\windows\ie8

==================== Find3M ====================

2010-05-16 11:17:55 75 ----a-w- c:\documents and settings\administrator\jagex_runescape_preferences2.dat
2010-05-16 11:03:46 50 ----a-w- c:\documents and settings\administrator\jagex__preferences3.dat
2010-05-16 11:03:45 42 ----a-w- c:\documents and settings\administrator\jagex_runescape_preferences.dat
2010-03-31 21:10:16 43520 ----a-w- c:\windows\system32\CmdLineExt03.dll
2010-03-30 05:46:30 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-03-30 05:45:52 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-03-30 03:32:44 32768 ----a-w- c:\windows\system32\f3PSSavr.scr
2010-03-17 21:47:00 21840 ----atw- c:\windows\system32\SIntfNT.dll
2010-03-17 21:47:00 17212 ----atw- c:\windows\system32\SIntf32.dll
2010-03-17 21:47:00 12067 -c--atw- c:\windows\system32\SIntf16.dll
2010-03-17 00:25:08 74083 ----a-w- c:\windows\DIIUnin.dat
2010-03-17 00:08:33 94208 ----a-w- c:\windows\DIIUnin.exe
2010-03-17 00:08:33 2829 ----a-w- c:\windows\DIIUnin.pif
2010-03-10 06:15:52 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-02-25 06:24:37 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-16 14:08:49 2146304 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-16 13:25:04 2024448 ----a-w- c:\windows\system32\ntkrnlpa.exe
1601-01-01 00:03:28 51720 --sha-w- c:\windows\system32\pulasiya.exe
2010-02-06 08:00:03 16384 -csha-w- c:\windows\system32\config\systemprofile\cookies\index.dat
2009-11-20 23:58:30 16384 -csha-w- c:\windows\system32\config\systemprofile\ietldcache\index.dat
2010-02-06 08:00:03 16384 -csha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\index.dat
2010-02-06 08:00:03 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\temporary internet files\content.ie5\index.dat

============= FINISH: 6:37:09.67 ===============


TSF Security Manager, Emeritus
42,836 Posts
Re: "Application cannot be executed. The file "..." is infected. Do you want to activ

Hello Tjrulesz,

How did you get dds.scr to run?

I still need to see a rootkit scan before we begin. On your keyboard, press the Windows Logo key and the letter 'E' to open Windows Explorer.

Navigate to the following folder, then drag it to the desktop. Do not delete it.

c:\documents and settings\administrator\local settings\application data\kqpqaprrf

Now try again to run gmer:

Double click GMER.exe.
  • If it gives you a warning about rootkit activity and asks if you want to run a full on NO, then use the following settings for a more complete scan..

    Click the image to enlarge it

  • In the right panel, you will see several boxes that have been checked. Ensure the following are UNCHECKED ...
    • IAT/EAT
    • Drives/Partition other than Systemdrive (typically C:\)
    • Show All (don't miss this one)
  • Then click the Scan button & wait for it to finish.
  • Once done click on the [Save..] button, and in the File name area, type in "ark.txt" or it will save as a .log file which cannot be uploaded to your post.
  • Save it where you can easily find it, such as your desktop

Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries

Please note:

If (and only if) there are problems using gmer as indicated above, save a scan from the initial startup scan.

  • Before scanning, make sure all other running programs are closed and no other actions like a scheduled antivirus scan will occur while the scan is being performed. Do not use your computer for anything else during the scan.
  • Double click the gmer.exe file.
  • The program will begin to run, and perform an initial scan. If possible rootkit activity is found, you will be asked if you would like to perform a full scan. Click No.
  • In any case, after the initial scan is complete, click on the Save button, and save the log file somewhere you can easily find it, such as your desktop, and attach it in reply
1 - 4 of 4 Posts
Not open for further replies.