Executables won't run after a malware attack

Posted on 2011-04-20
Last Modified: 2012-06-21
I have had two computers on our network that have been victims of malware attacks. I have run malware bytes and it removes any found threats but executables will not work properly. When clicking on any icon that is not a document, you are prompted with the "Open with" dialog box. I have also used combofix. On the first computer that I encountered the issue with I ended up renaming the user's profile to "user.domain.old". When she logged on next time her profile was recreated and worked fine. Before I do the same to this computer I was hoping for some suggestions.
Question by:eBoNix71
    LVL 29

    Accepted Solution

    Check the following to fix the file and folder association:

    or save this to your desktop and double click it to fix the exe issues

    I hope that would help


    Author Comment

    The first link seemed to work, but when I logged on as the user having the issue to run it I got the message on the attached print screen. Any way of finding out what key are open? Or is it due to the user not having admin rights?
    LVL 15

    Expert Comment

    Try some of the other steps mentioned here. Use the reg script provided by SSharma since it's more complete but follow some of the steps on importing there. You can also check the file association type (one of the first steps mentioned there) to see if it's of any help.

    Author Comment

    I temporarily granted the user admin rights and the script ran fine and the executables seem to be working. Points will be granted tomorrow once user verification can be done.

    Thanks SSharma

    Featured Post

    Better Security Awareness With Threat Intelligence

    See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

    Join & Write a Comment

    UPDATE - 6/15/2011 Added support for Release Update 6 Maintenance Patch 2 Point Patch 1 (RU6 MP2 PP1). Fixed a defect in the username field that was hard-coded to look for a specific domain (left over code from testing). This release will be the …
    By the time you finish reading this article, you may have already lost all your money because you don't know the simple steps to securing your BitCoin wallet. BitCoin is an incredible invention. It is a decentralized currency system, which is the…
    Need more eyes on your posted question? Go ahead and follow the quick steps in this video to learn how to Request Attention to your question. *Log into your Experts Exchange account *Find the question you want to Request Attention for *Go to the e…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    731 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now