red X on C: drive

Hewlett-packard / Pavillion ze5738rs
May 6, 2009 at 19:35:45
Specs: WindowsXP, Celeron 2.80Ghz/ 448RAM
i need help with my PC it has a Red X on the C: Disk and it has lots of .tmp files

See More: red X on C: drive

Report •


#1
May 6, 2009 at 23:15:48
Try using an updated Antivirus.

Want A Weekly Update on Latest System Security Problem http://www.systemsecurityinstitute.org


Report •

#2
May 7, 2009 at 20:58:35
Please download Malwarebytes' Anti-Malware from one of these sites:

MalwareBytes1

MalwareBytes2

Rename the setup file, mbam-setup.exe, before you download it. To do that once the "enter name of file to save to" box appears as the download begins in the filename box rename mbam-setup.exe to tool.exe> click save.

1. Double Click tool.exe to install the application.
2. Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
3. If an update is found, it will download and install the latest version.
4. Once the program has loaded, select "Perform Quick Scan", then click Scan. The scan may take some time to finish,so please be patient.
5. When the scan is complete, click OK, then Show Results to view the results.
6. Make sure that everything found is checked, and click Remove Selected.
7. When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.
8. The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
9. Copy&Paste the entire report in your next reply.


If Malwarebytes installed but will not run navigate to this folder:

C:\Programs Files\Malwarebytes' AntiMalware

Rename all the .exe files in the MAlwarebytes' Anti-Malware folder and try to run it again.

Please download and install the latest version of HijackThis v2.0.2:


Download the "HijackThis" Installer from this link:
Hijack This

Rename the setup file, HJTInstall.exe, before you download it. To do that once the "enter name of file to save to" box appears as the download begins in the filename box rename HJTInstall.exe to tools.exe> click save.
1. Save " tools.exe" to your desktop.
2. Double click on tools.exe to run the program.
3. By default it will install to C:\Program Files\Trend Micro\HijackThis.
4. Accept the license agreement by clicking the "I Accept" button.
5.Click on the "Do a system scan and save a log file" button. It will scan and then ask you to save the log.
6. Click "Save log" to save the log file and then the log will open in Notepad.
7. Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
8. Paste the log in your next reply.
9. Do NOT have HijackThis fix anything yet! Most of what it finds will be harmless or even required.


Report •

#3
May 7, 2009 at 21:50:06
this is are the reports. the date is 2008 but it is fresh ill explain later

MALWARE REPORT


Malwarebytes' Anti-Malware 1.34
Database version: 1749
Windows 5.1.2600 Service Pack 2

11/17/2008 5:03:44 AM
mbam-log-2008-11-17 (05-03-44).txt

Scan type: Quick Scan
Objects scanned: 67762
Time elapsed: 34 minute(s), 40 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 4
Registry Keys Infected: 39
Registry Values Infected: 6
Registry Data Items Infected: 2
Folders Infected: 2
Files Infected: 55

Memory Processes Infected:
C:\WINDOWS\system32\windows (Trojan.Zapchast) -> Unloaded process successfully.

Memory Modules Infected:
C:\WINDOWS\system32\qommj.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\hyoxuhtl.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\xvtipjuv.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\uidgdokb.dll (Trojan.Vundo.H) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a798c318-6621-4daf-8460-247c678fae64} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a798c318-6621-4daf-8460-247c678fae64} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a95b2816-1d7e-4561-a202-68c0de02353a} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{a95b2816-1d7e-4561-a202-68c0de02353a} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\xvtipjuv (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{d15f2de8-a491-4fe5-88e3-6525ed9685b6} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{d15f2de8-a491-4fe5-88e3-6525ed9685b6} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b245cf05-e523-4bd1-aa5d-19342ce45c9b} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{b245cf05-e523-4bd1-aa5d-19342ce45c9b} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{11a69ae4-fbed-4832-a2bf-45af82825583} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{a95b2816-1d7e-4561-a202-68c0de02353a} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{d15f2de8-a491-4fe5-88e3-6525ed9685b6} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{a798c318-6621-4daf-8460-247c678fae64} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mscontrolservice (Trojan.Zapchast) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\mscontrolservice (Trojan.Zapchast) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{89ad4d75-2429-462e-bd4e-443f233f6033} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{89ad4d75-2429-462e-bd4e-443f233f6033} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{c3352fcd-cfe5-4f35-831a-19c68ddb7cf4} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c3352fcd-cfe5-4f35-831a-19c68ddb7cf4} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c3352fcd-cfe5-4f35-831a-19c68ddb7cf4} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b245cf05-e523-4bd1-aa5d-19342ce45c9b} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\xpre (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\aldd (Trojan.Vundo) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MS Juan (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\jkwslist (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Juan (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DomainService (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DomainService (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DomainService (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3ca04df2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bm3f937e6e (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{f710fa10-2031-3106-8872-93a2b5c5c620} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{6780a29e-6a18-0c70-1dff-1610dde00108} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{c3352fcd-cfe5-4f35-831a-19c68ddb7cf4} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\\windows\\system32\\qommj -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo.H) -> Data: c:\\windows\\system32\\qommj -> Quarantined and deleted successfully.

Folders Infected:
C:\WINDOWS\system32\f02WtR (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\A1 (Trojan.Downloader) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\uidgdokb.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\xvtipjuv.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\xvtipjuv.dllbox (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\qommj.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\jmmoq.bak1 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jmmoq.bak2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jmmoq.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jmmoq.ini2 (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\fxoycrnv.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vnrcyoxf.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ghsckary.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\yrakcshg.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\hyoxuhtl.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\lthuxoyh.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\iimhvunu.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\unuvhmii.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jlrfshse.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\eshsfrlj.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mbmastsi.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\istsambm.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nfikilcc.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\cclikifn.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nrfryfai.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\iafyrfrn.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\uguahjqy.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\yqjhaugu.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
c:\\WINDOWS\\system32\\qommj.dll (Trojan.Vundo.H) -> Delete on reboot.
c:\\WINDOWS\\system32\\jmmoq.bak1 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
c:\\WINDOWS\\system32\\jmmoq.bak2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
c:\\WINDOWS\\system32\\jmmoq.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
c:\\WINDOWS\\system32\\jmmoq.ini2 (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\ilhhnclc.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\gvygqjmq.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\windows (Trojan.Zapchast) -> Delete on reboot.
C:\WINDOWS\system32\tvsjlosg.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\iibwhffn.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\doxauhvp.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\rxcuoqbi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wdeiyonq.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\toitcnir.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\iowcpxsp.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ppporhts.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qlkomqth.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ucevulqn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ugpymexu.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\xlixfohb.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\xoinkqss.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Aliseida M. Bosques\Local Settings\Temporary Internet Files\Content.IE5\GNWKAU4Z\hctp[1] (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\Documents and Settings\Aliseida M. Bosques\Local Settings\Temporary Internet Files\Content.IE5\WA14BW2S\iddqd[1] (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Aliseida M. Bosques\Desktop\Help and Support Center.lnk (Rogue.Link) -> Delete on reboot.
C:\WINDOWS\pskt.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\BM3f937e6e.xml (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\BM3f937e6e.txt (Trojan.Vundo) -> Quarantined and deleted successfully.

HIJACK REPORT

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:42:06 AM, on 5/8/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16827)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\PROGRA~1\AVG\AVG8\avgnsx.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\Aliseida M. Bosques\Desktop\tools.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.cooppepiniana.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?Lin...
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?Lin...
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?Lin...
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.0.301.7164\swg.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-18\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe (User 'Default user')
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microso...
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microso...
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.6.0) - http://sdlc-esd.sun.com/ESD7/JSCDL/...
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
O20 - Winlogon Notify: avgrsstarter - C:\WINDOWS\SYSTEM32\avgrsstx.dll
O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe

--
End of file - 4334 bytes


Report •

Related Solutions

#4
May 10, 2009 at 18:37:09
So is the red cross gone now after those fixes ?

You were actually quite lucky, because your xp still knows the C
drive is there. There are some viruses going around that makes
xp not recognize any drives at all.

Microsoft will not create a fix for this until some Politicians from all countries get the same virus.


Report •

#5
May 10, 2009 at 19:05:14
Please download ComboFix to the desktop from one of the following links:

Link1

Link 2

Link 3

Rename the setup file, combofix.exe, before you download it. To do that once the "enter name of file to save to" box appears as the download begins in the filename box rename combofix.exe to toolb.exe> click save.

Combofix is a powerful tool so follow the instructions exactly or you could damage your computer.

Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with Combofix and remove some of its embedded files which may cause "unpredictable results".
Click on This Link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

In your case to run Combofix do the following:
1. Go offline turn off your AVG antivirus, and any other antispyware that you may have. (to completely turnoff AVG click the systray AVG icon then click exit. Next click the desktop AVG icon> resident shield> uncheck the box to the left of resident shield active> save changes.) Restart the computer and recheck the box you unchecked before getting back online.
2. Run Combofix by double clicking the toolb.exe icon on your desktop and save its log.
3. Restart the computer to get the antivirus running again but leave the antispyware programs off until we get the computer cleaned.
4. Post the Combofix log.


Remember to re-enable the protection again afterwards before connecting to the Internet.


Report •

#6
May 10, 2009 at 20:26:13
Here is the combofix log:

ComboFix 09-05-09.05 - Aliseida M. Bosques 05/10/2009 22:57.7 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.447.174 [GMT -4:00]
Running from: c:\documents and settings\Aliseida M. Bosques\Desktop\toolb.exe
AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated)

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((( Files Created from 2009-04-11 to 2009-05-11 )))))))))))))))))))))))))))))))
.

2009-05-08 04:18 . 2009-04-06 19:32 15504 ----a-w c:\windows\system32\drivers\mbam.sys
2009-05-08 04:18 . 2009-04-06 19:32 38496 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys
2009-05-08 04:18 . 2009-05-08 04:18 -------- d-----w c:\program files\Malwarebytes' Anti-Malware
2009-05-07 14:45 . 2009-05-09 06:49 -------- d--h--w C:\$AVG8.VAULT$
2009-05-07 14:24 . 2009-05-07 14:24 11952 ----a-w c:\windows\system32\avgrsstx.dll
2009-05-07 14:24 . 2009-05-07 14:24 108552 ----a-w c:\windows\system32\drivers\avgtdix.sys
2009-05-07 14:24 . 2009-05-07 14:24 325896 ----a-w c:\windows\system32\drivers\avgldx86.sys
2009-05-07 14:24 . 2009-05-07 16:17 -------- d-----w c:\windows\system32\drivers\Avg
2009-05-07 14:23 . 2009-05-07 14:23 -------- d-----w c:\program files\AVG
2009-05-07 14:23 . 2009-05-07 14:23 -------- d-----w c:\documents and settings\All Users\Application Data\avg8
2009-05-07 02:59 . 2009-05-07 02:59 410984 ----a-w c:\windows\system32\deploytk.dll
2009-05-07 02:54 . 2009-05-07 02:54 -------- d-----w c:\windows\Sun
2009-04-30 13:42 . 2009-04-30 13:42 -------- d-----w c:\program files\ActMon-Password-Recovery
2009-04-29 04:20 . 2009-04-30 13:17 -------- d-----w c:\program files\Thegrideon Software
2009-04-29 02:36 . 2009-04-29 02:36 -------- d-----w c:\documents and settings\Aliseida M. Bosques\Application Data\Watchtower
2009-04-29 02:28 . 2009-04-29 02:28 -------- d-----w c:\program files\Watchtower
2009-04-26 04:52 . 2009-04-26 04:52 -------- d-----w c:\windows\system32\scripting
2009-04-26 04:52 . 2009-04-26 04:52 -------- d-----w c:\windows\l2schemas
2009-04-26 04:52 . 2009-04-26 04:52 -------- d-----w c:\windows\system32\en
2009-04-26 04:39 . 2008-06-13 11:05 272128 -c----w c:\windows\system32\dllcache\bthport.sys
2009-04-26 04:33 . 2009-03-06 14:22 284160 -c----w c:\windows\system32\dllcache\pdh.dll
2009-04-26 04:33 . 2009-02-09 12:10 401408 -c----w c:\windows\system32\dllcache\rpcss.dll
2009-04-26 04:33 . 2009-02-06 11:11 110592 -c----w c:\windows\system32\dllcache\services.exe
2009-04-26 04:33 . 2009-02-09 12:10 473600 -c----w c:\windows\system32\dllcache\fastprox.dll
2009-04-26 04:33 . 2009-02-06 10:10 227840 -c----w c:\windows\system32\dllcache\wmiprvse.exe
2009-04-26 04:33 . 2009-02-09 12:10 453120 -c----w c:\windows\system32\dllcache\wmiprvsd.dll
2009-04-26 04:33 . 2009-02-09 12:10 729088 -c----w c:\windows\system32\dllcache\lsasrv.dll
2009-04-26 04:33 . 2009-02-09 12:10 617472 -c----w c:\windows\system32\dllcache\advapi32.dll
2009-04-26 04:33 . 2009-02-09 12:10 714752 -c----w c:\windows\system32\dllcache\ntdll.dll
2009-04-26 04:33 . 2009-02-06 11:06 2145280 -c----w c:\windows\system32\dllcache\ntkrnlmp.exe
2009-04-26 04:33 . 2009-02-06 11:08 2189056 -c----w c:\windows\system32\dllcache\ntoskrnl.exe
2009-04-26 04:33 . 2009-02-06 10:32 2023936 -c----w c:\windows\system32\dllcache\ntkrpamp.exe
2009-04-26 04:26 . 2008-05-08 14:02 203136 -c----w c:\windows\system32\dllcache\rmcast.sys
2009-04-26 04:26 . 2008-10-24 11:21 455296 -c----w c:\windows\system32\dllcache\mrxsmb.sys
2009-04-26 04:26 . 2008-12-11 10:57 333952 -c----w c:\windows\system32\dllcache\srv.sys
2009-04-26 04:25 . 2008-05-01 14:33 331776 -c----w c:\windows\system32\dllcache\msadce.dll
2009-04-26 04:24 . 2008-04-11 19:04 691712 -c----w c:\windows\system32\dllcache\inetcomm.dll
2009-04-26 04:21 . 2008-10-15 16:34 337408 -c----w c:\windows\system32\dllcache\netapi32.dll
2009-04-26 04:21 . 2008-09-04 17:15 1106944 -c----w c:\windows\system32\dllcache\msxml3.dll
2009-04-26 04:20 . 2008-05-03 11:55 2560 ------w c:\windows\system32\xpsp4res.dll
2009-04-26 04:20 . 2008-04-21 12:08 215552 -c----w c:\windows\system32\dllcache\wordpad.exe
2009-04-26 04:17 . 2008-04-14 00:12 10240 -c----w c:\windows\system32\dllcache\npwmsdrm.dll
2009-04-26 04:16 . 2008-04-14 00:09 6144 ------w c:\windows\system32\kbdpash.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-05-07 02:59 . 2006-09-02 01:35 -------- d-----w c:\program files\Java
2009-04-28 03:03 . 2005-06-10 20:55 -------- d-----w c:\program files\MSN Messenger
2009-04-28 02:58 . 2007-10-31 00:35 -------- d-----w c:\program files\Google
2009-04-26 04:56 . 2005-06-10 17:58 76487 ----a-w c:\windows\PCHealth\HelpCtr\OfflineCache\index.dat
2009-04-25 20:53 . 2006-03-19 23:56 -------- d-----w c:\program files\Common Files\Adobe
2009-03-06 14:22 . 2003-03-31 19:00 284160 ----a-w c:\windows\system32\pdh.dll
2009-03-03 00:18 . 2006-06-23 15:33 826368 ----a-w c:\windows\system32\wininet.dll
2009-02-20 18:09 . 2004-08-04 07:56 78336 ----a-w c:\windows\system32\ieencode.dll
2008-02-15 23:56 . 2007-11-21 03:51 67696 ----a-w c:\program files\mozilla firefox\components\jar50.dll
2008-02-15 23:56 . 2007-11-21 03:52 54376 ----a-w c:\program files\mozilla firefox\components\jsd3250.dll
2008-02-15 23:56 . 2007-11-21 04:05 34952 ----a-w c:\program files\mozilla firefox\components\myspell.dll
2008-02-15 23:56 . 2007-11-21 04:05 46720 ----a-w c:\program files\mozilla firefox\components\spellchk.dll
2008-02-15 23:56 . 2007-11-21 03:51 172144 ----a-w c:\program files\mozilla firefox\components\xpinstal.dll
2008-02-27 00:58 . 2008-02-27 00:57 259929 --sh--w c:\windows\system32\jmmoq.tmp
.

((((((((((((((((((((((((((((( SnapShot@2009-05-06_05.24.47 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-05-11 02:50 . 2009-05-11 02:50 16384 c:\windows\temp\Perflib_Perfdata_758.dat
+ 2009-05-07 14:24 . 2009-05-07 14:24 27784 c:\windows\system32\drivers\avgmfx86.sys
+ 2009-05-07 02:59 . 2009-05-07 02:59 148888 c:\windows\system32\javaws.exe
+ 2009-05-07 02:59 . 2009-05-07 02:59 144792 c:\windows\system32\javaw.exe
+ 2009-05-07 02:59 . 2009-05-07 02:59 144792 c:\windows\system32\java.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2009-05-07 1947928]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"MySpaceIM"="c:\program files\MySpace\IM\MySpaceIM.exe" [2007-01-12 4898816]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2009-05-07 14:24 11952 ----a-w c:\windows\system32\avgrsstx.dll

HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32
"wave1"= serwvdrv.dll

[HKLM\~\startupfolder\C:^Documents and Settings^Aliseida M. Bosques^Start Menu^Programs^Startup^LimeWire On Startup.lnk]
backup=c:\windows\pss\LimeWire On Startup.lnkStartup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office.lnk]

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Uninstall.exe]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"usnjsvc"=3 (0x3)
"PSIMSVC"=2 (0x2)
"PAVSRV"=2 (0x2)
"mnmsrvc"=3 (0x3)
"LxrJD31s"=2 (0x2)
"ImapiService"=3 (0x3)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\MSN Messenger\\msnmsgr.exe"=
"c:\\Program Files\\MSN Messenger\\livecall.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgupd.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgnsx.exe"=

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [5/7/2009 10:24 AM 325896]
R1 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [5/7/2009 10:24 AM 108552]
R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [5/7/2009 10:23 AM 298776]
R3 ALiIRDA;ALi Infrared Device Driver;c:\windows\system32\drivers\alifir.sys [6/10/2005 9:33 AM 26624]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.cooppepiniana.com/
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
mStart Page = hxxp://www.google.com
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
FF - ProfilePath - c:\documents and settings\Aliseida M. Bosques\Application Data\Mozilla\Firefox\Profiles\j2kgadle.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
FF - prefs.js: browser.search.selectedEngine - Google
FF - component: c:\documents and settings\Aliseida M. Bosques\Application Data\Mozilla\Firefox\Profiles\j2kgadle.default\extensions\{3112ca9c-de6d-4884-a869-9855de68056c}\components\googletoolbar.dll
FF - component: c:\documents and settings\Aliseida M. Bosques\Application Data\Mozilla\Firefox\Profiles\j2kgadle.default\extensions\{3112ca9c-de6d-4884-a869-9855de68056c}\components\metrics.dll
FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-05-10 23:05
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2009-05-11 23:10
ComboFix-quarantined-files.txt 2009-05-11 03:10
ComboFix2.txt 2009-05-07 06:09
ComboFix3.txt 2009-05-07 05:55
ComboFix4.txt 2009-05-07 05:38
ComboFix5.txt 2009-05-11 02:55

Pre-Run: 50,061,172,736 bytes free
Post-Run: 50,049,519,616 bytes free

152 --- E O F --- 2009-04-28 03:08


Report •

#7
May 11, 2009 at 03:38:25
Open Notepad and copy/paste everything between the X's into it and make sure the first word (such as KILLALL, File, Folder, Registry etc.) is at the very top of the page.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
KILLALL::
File::
c:\windows\system32\jmmoq.tmp

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Go to File on the top bar and choose" Save As", Change the "Save As Type" to All Files, Name it CFScript.txt then save it to your desktop.
Then drag/drop the CFScript.txt onto ComboFix.exe (the red symbol on your desktop) if combofix does not auto start click "run".

Please post the log that is produced.

Empty the restore folder. Go to start>control panel>system>system restore tab>check the box beside "turn off system restore>apply (takes a minute)>ok. Go back and uncheck the box to turn system restore back on>apply>ok.


Download ATF Cleaner from this link:
http://www.majorgeeks.com/ATF_Cleaner_d4949.html
Run ATF-Cleaner
Double-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.

Run an online scan with Kaspersky from the following link:
Kaspersky Online Scanner

Note: If you have used this particular scanner before, you MAY HAVE TO UNINSTALL the program through Add/Remove Programs before downloading the new ActiveX component

1. Click Accept, when prompted to download and install the program files and database of malware definitions.
2. Click Run at the Security prompt.
The program will then begin downloading and installing and will also update the database.
Please be patient as this can take several minutes.
3.Once the update is complete, click on My Computer under the green Scan bar to the left to start the scan.
4. Once the scan is complete, it will display if your system has been infected. It does not provide an option to clean/disinfect. We only require a report from it.
5. Do NOT be alarmed by what you see in the report. Many of the finds have likely been quarantined.
6. Click View scan report at the bottom.
7. Click the Save Report As... button.
8. Click the Save as Text button to save the file to your desktop so that you may post it in your next reply.
**Note**

To optimize scanning time and produce a more sensible report for review:
Close any open programs.
Turn off the real-time scanner of all antivirus or antispyware programs while performing the online scan.
Note for Internet Explorer 7 users: If at any time you have trouble viewing the accept button of the license, click on the Zoom tool located at the bottom right of the IE window and set the zoom to 75%. Once the license is accepted, reset to 100%.


Report •

#8
May 11, 2009 at 13:43:32
This is the combofix log


ComboFix 09-05-09.05 - Aliseida M. Bosques 05/11/2009 13:06.8 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.447.170 [GMT -4:00]
Running from: c:\documents and settings\Aliseida M. Bosques\Desktop\toolb.exe
Command switches used :: c:\documents and settings\Aliseida M. Bosques\Desktop\CFScript.txt
AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated)

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!

FILE ::
c:\windows\system32\jmmoq.tmp
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\jmmoq.tmp

.
((((((((((((((((((((((((( Files Created from 2009-04-11 to 2009-05-11 )))))))))))))))))))))))))))))))
.

2009-05-08 04:18 . 2009-04-06 19:32 15504 ----a-w c:\windows\system32\drivers\mbam.sys
2009-05-08 04:18 . 2009-04-06 19:32 38496 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys
2009-05-08 04:18 . 2009-05-08 04:18 -------- d-----w c:\program files\Malwarebytes' Anti-Malware
2009-05-07 14:45 . 2009-05-09 06:49 -------- d--h--w C:\$AVG8.VAULT$
2009-05-07 14:24 . 2009-05-07 14:24 11952 ----a-w c:\windows\system32\avgrsstx.dll
2009-05-07 14:24 . 2009-05-07 14:24 108552 ----a-w c:\windows\system32\drivers\avgtdix.sys
2009-05-07 14:24 . 2009-05-07 14:24 325896 ----a-w c:\windows\system32\drivers\avgldx86.sys
2009-05-07 14:24 . 2009-05-07 16:17 -------- d-----w c:\windows\system32\drivers\Avg
2009-05-07 14:23 . 2009-05-07 14:23 -------- d-----w c:\program files\AVG
2009-05-07 14:23 . 2009-05-07 14:23 -------- d-----w c:\documents and settings\All Users\Application Data\avg8
2009-05-07 02:59 . 2009-05-07 02:59 410984 ----a-w c:\windows\system32\deploytk.dll
2009-05-07 02:54 . 2009-05-07 02:54 -------- d-----w c:\windows\Sun
2009-04-30 13:42 . 2009-04-30 13:42 -------- d-----w c:\program files\ActMon-Password-Recovery
2009-04-29 04:20 . 2009-04-30 13:17 -------- d-----w c:\program files\Thegrideon Software
2009-04-29 02:36 . 2009-04-29 02:36 -------- d-----w c:\documents and settings\Aliseida M. Bosques\Application Data\Watchtower
2009-04-29 02:28 . 2009-04-29 02:28 -------- d-----w c:\program files\Watchtower
2009-04-26 04:52 . 2009-04-26 04:52 -------- d-----w c:\windows\system32\scripting
2009-04-26 04:52 . 2009-04-26 04:52 -------- d-----w c:\windows\l2schemas
2009-04-26 04:52 . 2009-04-26 04:52 -------- d-----w c:\windows\system32\en
2009-04-26 04:39 . 2008-06-13 11:05 272128 -c----w c:\windows\system32\dllcache\bthport.sys
2009-04-26 04:33 . 2009-03-06 14:22 284160 -c----w c:\windows\system32\dllcache\pdh.dll
2009-04-26 04:33 . 2009-02-09 12:10 401408 -c----w c:\windows\system32\dllcache\rpcss.dll
2009-04-26 04:33 . 2009-02-06 11:11 110592 -c----w c:\windows\system32\dllcache\services.exe
2009-04-26 04:33 . 2009-02-09 12:10 473600 -c----w c:\windows\system32\dllcache\fastprox.dll
2009-04-26 04:33 . 2009-02-06 10:10 227840 -c----w c:\windows\system32\dllcache\wmiprvse.exe
2009-04-26 04:33 . 2009-02-09 12:10 453120 -c----w c:\windows\system32\dllcache\wmiprvsd.dll
2009-04-26 04:33 . 2009-02-09 12:10 729088 -c----w c:\windows\system32\dllcache\lsasrv.dll
2009-04-26 04:33 . 2009-02-09 12:10 617472 -c----w c:\windows\system32\dllcache\advapi32.dll
2009-04-26 04:33 . 2009-02-09 12:10 714752 -c----w c:\windows\system32\dllcache\ntdll.dll
2009-04-26 04:33 . 2009-02-06 11:06 2145280 -c----w c:\windows\system32\dllcache\ntkrnlmp.exe
2009-04-26 04:33 . 2009-02-06 11:08 2189056 -c----w c:\windows\system32\dllcache\ntoskrnl.exe
2009-04-26 04:33 . 2009-02-06 10:32 2023936 -c----w c:\windows\system32\dllcache\ntkrpamp.exe
2009-04-26 04:26 . 2008-05-08 14:02 203136 -c----w c:\windows\system32\dllcache\rmcast.sys
2009-04-26 04:26 . 2008-10-24 11:21 455296 -c----w c:\windows\system32\dllcache\mrxsmb.sys
2009-04-26 04:26 . 2008-12-11 10:57 333952 -c----w c:\windows\system32\dllcache\srv.sys
2009-04-26 04:25 . 2008-05-01 14:33 331776 -c----w c:\windows\system32\dllcache\msadce.dll
2009-04-26 04:24 . 2008-04-11 19:04 691712 -c----w c:\windows\system32\dllcache\inetcomm.dll
2009-04-26 04:21 . 2008-10-15 16:34 337408 -c----w c:\windows\system32\dllcache\netapi32.dll
2009-04-26 04:21 . 2008-09-04 17:15 1106944 -c----w c:\windows\system32\dllcache\msxml3.dll
2009-04-26 04:20 . 2008-05-03 11:55 2560 ------w c:\windows\system32\xpsp4res.dll
2009-04-26 04:20 . 2008-04-21 12:08 215552 -c----w c:\windows\system32\dllcache\wordpad.exe
2009-04-26 04:17 . 2008-04-14 00:12 10240 -c----w c:\windows\system32\dllcache\npwmsdrm.dll
2009-04-26 04:16 . 2008-04-14 00:09 6144 ------w c:\windows\system32\kbdpash.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-05-07 02:59 . 2006-09-02 01:35 -------- d-----w c:\program files\Java
2009-04-28 03:03 . 2005-06-10 20:55 -------- d-----w c:\program files\MSN Messenger
2009-04-28 02:58 . 2007-10-31 00:35 -------- d-----w c:\program files\Google
2009-04-26 04:56 . 2005-06-10 17:58 76487 ----a-w c:\windows\PCHealth\HelpCtr\OfflineCache\index.dat
2009-04-25 20:53 . 2006-03-19 23:56 -------- d-----w c:\program files\Common Files\Adobe
2009-03-06 14:22 . 2003-03-31 19:00 284160 ----a-w c:\windows\system32\pdh.dll
2009-03-03 00:18 . 2006-06-23 15:33 826368 ----a-w c:\windows\system32\wininet.dll
2009-02-20 18:09 . 2004-08-04 07:56 78336 ----a-w c:\windows\system32\ieencode.dll
2008-02-15 23:56 . 2007-11-21 03:51 67696 ----a-w c:\program files\mozilla firefox\components\jar50.dll
2008-02-15 23:56 . 2007-11-21 03:52 54376 ----a-w c:\program files\mozilla firefox\components\jsd3250.dll
2008-02-15 23:56 . 2007-11-21 04:05 34952 ----a-w c:\program files\mozilla firefox\components\myspell.dll
2008-02-15 23:56 . 2007-11-21 04:05 46720 ----a-w c:\program files\mozilla firefox\components\spellchk.dll
2008-02-15 23:56 . 2007-11-21 03:51 172144 ----a-w c:\program files\mozilla firefox\components\xpinstal.dll
.

((((((((((((((((((((((((((((( SnapShot@2009-05-06_05.24.47 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-05-11 17:15 . 2009-05-11 17:15 16384 c:\windows\temp\Perflib_Perfdata_768.dat
+ 2009-05-07 14:24 . 2009-05-07 14:24 27784 c:\windows\system32\drivers\avgmfx86.sys
+ 2009-05-07 02:59 . 2009-05-07 02:59 148888 c:\windows\system32\javaws.exe
+ 2009-05-07 02:59 . 2009-05-07 02:59 144792 c:\windows\system32\javaw.exe
+ 2009-05-07 02:59 . 2009-05-07 02:59 144792 c:\windows\system32\java.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2009-05-07 1947928]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"MySpaceIM"="c:\program files\MySpace\IM\MySpaceIM.exe" [2007-01-12 4898816]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2009-05-07 14:24 11952 ----a-w c:\windows\system32\avgrsstx.dll

HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32
"wave1"= serwvdrv.dll

[HKLM\~\startupfolder\C:^Documents and Settings^Aliseida M. Bosques^Start Menu^Programs^Startup^LimeWire On Startup.lnk]
backup=c:\windows\pss\LimeWire On Startup.lnkStartup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office.lnk]

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Uninstall.exe]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"usnjsvc"=3 (0x3)
"PSIMSVC"=2 (0x2)
"PAVSRV"=2 (0x2)
"mnmsrvc"=3 (0x3)
"LxrJD31s"=2 (0x2)
"ImapiService"=3 (0x3)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\MSN Messenger\\msnmsgr.exe"=
"c:\\Program Files\\MSN Messenger\\livecall.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgupd.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgnsx.exe"=

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [5/7/2009 10:24 AM 325896]
R1 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [5/7/2009 10:24 AM 108552]
R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [5/7/2009 10:23 AM 298776]
R3 ALiIRDA;ALi Infrared Device Driver;c:\windows\system32\drivers\alifir.sys [6/10/2005 9:33 AM 26624]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.cooppepiniana.com/
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
mStart Page = hxxp://www.google.com
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
FF - ProfilePath - c:\documents and settings\Aliseida M. Bosques\Application Data\Mozilla\Firefox\Profiles\j2kgadle.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
FF - prefs.js: browser.search.selectedEngine - Google
FF - component: c:\documents and settings\Aliseida M. Bosques\Application Data\Mozilla\Firefox\Profiles\j2kgadle.default\extensions\{3112ca9c-de6d-4884-a869-9855de68056c}\components\googletoolbar.dll
FF - component: c:\documents and settings\Aliseida M. Bosques\Application Data\Mozilla\Firefox\Profiles\j2kgadle.default\extensions\{3112ca9c-de6d-4884-a869-9855de68056c}\components\metrics.dll
FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-05-11 13:17
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
c:\program files\AVG\AVG8\avgrsx.exe
c:\progra~1\AVG\AVG8\avgnsx.exe
.
**************************************************************************
.
Completion time: 2009-05-11 13:24 - machine was rebooted
ComboFix-quarantined-files.txt 2009-05-11 17:24
ComboFix2.txt 2009-05-11 03:10
ComboFix3.txt 2009-05-07 06:09
ComboFix4.txt 2009-05-07 05:55
ComboFix5.txt 2009-05-11 17:04

Pre-Run: 50,038,173,696 bytes free
Post-Run: 50,024,579,072 bytes free

167 --- E O F --- 2009-04-28 03:08


And this is the kaspersky log file


--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7.0 REPORT
Monday, May 11, 2009
Operating System: Microsoft Windows XP Home Edition Service Pack 3 (build 2600)
Kaspersky Online Scanner version: 7.0.26.13
Program database last update: Monday, May 11, 2009 18:13:09
Records in database: 2162472
--------------------------------------------------------------------------------

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:
C:\
D:\
E:\

Scan statistics:
Files scanned: 34184
Threat name: 2
Infected objects: 3
Suspicious objects: 0
Duration of the scan: 01:30:26


File name / Threat name / Threats count
C:\Program Files\ActMon-Password-Recovery\actmonpwd.exe Infected: not-a-virus:PSWTool.Win32.ActMon.b 1
E:\actmon-pwdrec-setup.exe Infected: not-a-virus:PSWTool.Win32.ActMon.b 1
E:\MSNPass_demo.exe Infected: Trojan-PSW.Win32.Delf.kn 1

The selected area was scanned.


Report •

#9
May 11, 2009 at 14:47:34
Most likely the files found by Kaspersky are false positives and should not be a problem.

Go to start> run> type in combofix /u (note the space after combofix) then press enter> run. This will uninstall combofix so give the uninstaller a minute to run.

Go to start> control panel> add/remove programs and uninstall these programs:

Hijack This

Malwarebytes

Kaspersky

You should keep AFT Cleaner and run it weekly.


You should consider adding "Spywareblaster" to your arsenol of antispyware tools, you can download it from this link Spywareblaster

Just download it,install it, and update it. Its free and runs in the background, so you don't actually run it, and re-writes malicious script before it can install on your computer. Look for updates weekly as there is no auto-update on the free version.

This should fix the red X.

Go to start> run> type in notepad > ok. Copy paste the following into notepad making [autorun] the very top line:

[autorun]

ICON=C:\WINDOWS\SYSTEM\SHELL32.DLL,8

Click "save as"> then using the drop down arrow on the far right of the "save in" window select Local Disk C: to be displayed in the "save in" window.

Next type "C:\autorun.inf" (you must use the quotes) in the file name window> click save.

Restart the computer.

How is the computer operating?


Report •

#10
May 11, 2009 at 16:52:24
Red X Gone!!! The PC runs fine, i find it a bit slow, but maybe thats because it doesn't have plenty of memory, right?

And the fact it isnt a New one. Hey man thanks a lot for taking some of your time to help me and others with our PC problems. Appreciate it a lot


Report •

#11
May 11, 2009 at 16:52:24
Red X Gone!!! The PC runs fine, i find it a bit slow, but maybe thats because it doesn't have plenty of memory, right?

And the fact it isnt a New one. Hey man thanks a lot for taking some of your time to help me and others with our PC problems. Appreciate it a lot


Report •

#12
May 11, 2009 at 18:49:16
Glad we could help.

Report •

#13
May 11, 2009 at 22:17:11
Also star to think for upgrade. See if the site below can help with their gadget reviews.

Want A Weekly Update on Latest System Security Problem http://www.systemsecurityinstitute.org


Report •


Ask Question