Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

qauser001 / Split topic


  • Please log in to reply
30 replies to this topic

#1 qauser001

qauser001

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:40 PM

Posted 26 October 2009 - 07:14 PM

HI:

I am a different user than the one posted this thread, but i have the exact same problem. Please find my log from Malwarebytes after your suggested steps.

Appreciate your help.

Malwarebytes' Anti-Malware 1.41
Database version: 3027
Windows 5.1.2600 Service Pack 2

10/26/2009 8:07:19 PM
mbam-log-2009-10-26 (20-07-13).txt

Scan type: Quick Scan
Objects scanned: 117957
Time elapsed: 3 minute(s), 41 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 9
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 14

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ESENT\Process\lizkavd (Trojan.FakeAlert) -> No action taken.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mserv (Trojan.FakeAlert) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost (Trojan.FakeAlert) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysgif32 (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\promoreg (Trojan.Dropper) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\92381427 (Rogue.Multiple) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Regedit32 (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RList (Malware.Trace) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\restorer64_a (Trojan.FakeAlert) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\restorer64_a (Trojan.FakeAlert) -> No action taken.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: gvmcpin.dll -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\gvmcpin.dll (Trojan.Vundo.H) -> No action taken.
C:\Documents and Settings\Vikram\Application Data\seres.exe (Trojan.FakeAlert) -> No action taken.
C:\Documents and Settings\Vikram\Application Data\svcst.exe (Trojan.FakeAlert) -> No action taken.
C:\Documents and Settings\Vikram\Application Data\lizkavd.exe (Rogue.Installer) -> No action taken.
C:\Documents and Settings\Vikram\Local Settings\temp\BN71.tmp (Trojan.FakeAlert) -> No action taken.
C:\Documents and Settings\Vikram\Local Settings\Temporary Internet Files\Content.IE5\DK7JCIGJ\Install[1].exe (Rogue.Installer) -> No action taken.
C:\WINDOWS\temp\wpv331255703227.exe (Trojan.Agent) -> No action taken.
C:\Documents and Settings\Vikram\Application Data\wiaserva.log (Malware.Trace) -> No action taken.
C:\WINDOWS\temp\_ex-08.exe (Trojan.Dropper) -> No action taken.
C:\WINDOWS\temp\wpv651256085323.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\temp\wpv701255594149.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\temp\wpv781255562528.exe (Trojan.Agent) -> No action taken.
C:\Documents and Settings\Vikram\restorer64_a.exe (Trojan.FakeAlert) -> No action taken.
C:\WINDOWS\system32\restorer64_a.exe (Trojan.FakeAlert) -> No action taken.

BC AdBot (Login to Remove)

 


#2 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:40 AM

Posted 26 October 2009 - 10:49 PM

Have Malwarebytes remove everything found. Reboot your computer. Run another Malwarebytes quick-scan and post the new log.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#3 qauser001

qauser001
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:40 PM

Posted 27 October 2009 - 08:42 AM

Thanks and just to confirm, i assume i have to do this in safe mode? Also should i ikeep my internet connection on? The problem comes as soon as i fire up the internet i immediately see a new .exe in the task manager with randon numbers.

#4 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:40 AM

Posted 27 October 2009 - 02:44 PM

No - don't run the scan in Safe Mode. Normal Mode is fine. You can leave your internet connection on.

Run this file first:

http://download.bleepingcomputer.com/grinler/rkill.scr

Then scan with Malwarebytes.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#5 qauser001

qauser001
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:40 PM

Posted 27 October 2009 - 06:00 PM

Ok, here is the log..the infection is still there it seems, though till now it has not appeared as a pop-up warning yet. thanks.

Malwarebytes' Anti-Malware 1.41
Database version: 3027
Windows 5.1.2600 Service Pack 2

10/27/2009 6:55:53 PM
mbam-log-2009-10-27 C(18-55-48)

Scan type: Quick Scan
Objects scanned: 118344
Time elapsed: 4 minute(s), 4 second(s)

Memory Processes Infected: 3
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 4
Registry Data Items Infected: 2
Folders Infected: 1
Files Infected: 9

Memory Processes Infected:
C:\WINDOWS\temp\_ex-08.exe (Trojan.Dropper) -> No action taken.
C:\WINDOWS\temp\wpv631255703227.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\temp\wpv941255562528.exe (Trojan.Agent) -> No action taken.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\promoreg (Trojan.Dropper) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\30883325 (Rogue.WindowsSmartSecurity) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysgif32 (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RList (Malware.Trace) -> No action taken.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: gvmcpin.dll -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (Explorer.exe rundll32.exe pqrs.tmo printer) Good: (Explorer.exe) -> No action taken.

Folders Infected:
C:\Documents and Settings\All Users\Application Data\30883325 (Rogue.Multiple) -> No action taken.

Files Infected:
C:\WINDOWS\gvmcpin.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\temp\_ex-08.exe (Trojan.Dropper) -> No action taken.
C:\Documents and Settings\All Users\Application Data\30883325\30883325.exe (Rogue.Multiple) -> No action taken.
C:\WINDOWS\temp\wpv631255703227.exe (Trojan.Agent) -> No action taken.
C:\Documents and Settings\Vikram\Application Data\wiaserva.log (Malware.Trace) -> No action taken.
C:\WINDOWS\temp\wpv041255492056.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\temp\wpv601255594149.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\temp\wpv941255562528.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\temp\wpv951256559586.exe (Trojan.Agent) -> No action taken.

#6 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:40 AM

Posted 27 October 2009 - 06:12 PM

Your log shows "No action taken" for the items found. Did you have Malwarebytes remove them?
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#7 qauser001

qauser001
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:40 PM

Posted 27 October 2009 - 06:25 PM

Yes, so i clicked "Remove Selected" and malware removed a bunch of them then gave a message the a particular dll and an exe needs a reboot, so i clicked yes and the system rebooted but still some instances were not removed.

I have tried several things in the past 2 days, incuding combox fix and removing the random number files manually, but something is still getting left.

thanks again.

#8 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:40 AM

Posted 27 October 2009 - 06:30 PM

Please download ATF Cleaner by Atribune & save it to your desktop. alternate download link DO NOT use yet.
Please download and install SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here and unzip into the program's folder.)
  • Under the "Configuration and Preferences", click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#9 qauser001

qauser001
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:40 PM

Posted 27 October 2009 - 10:34 PM

Thanks you so much for your help, i think the virus as been removed. It has not come up in the past 10 mins since my laptop is on. I dont see a log in the SUPERAntiSpyware, maybe it got deleted, is there are place i can find it?

Anyhow, i am very grateful for your help. Can you suggest anantivirus that i shud use? I used Avira for almost a year and it worked really well but recently expired.

thanks again.

#10 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:40 AM

Posted 27 October 2009 - 10:36 PM

Please run another scan with Malwarebytes and post the log.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#11 qauser001

qauser001
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:40 PM

Posted 28 October 2009 - 09:28 AM

ok, still some problems based on the log:(

Malwarebytes' Anti-Malware 1.41
Database version: 3027
Windows 5.1.2600 Service Pack 2

10/28/2009 10:11:14 AM
mbam-log-2009-10-28 (10-11-05).txt

Scan type: Quick Scan
Objects scanned: 117965
Time elapsed: 3 minute(s), 46 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 4
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 5

Memory Processes Infected:
C:\WINDOWS\system32\qtplugin.exe (Rootkit.Agent) -> No action taken.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysgif32 (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\registrymonitor1 (Rootkit.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Regedit32 (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RList (Malware.Trace) -> No action taken.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: gvmcpin.dll -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (Explorer.exe rundll32.exe pqrs.tmo printer) Good: (Explorer.exe) -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\gvmcpin.dll (Trojan.Vundo.H) -> No action taken.
C:\Documents and Settings\Vikram\Desktop\Security Tool.LNK (Rogue.SecurityTool) -> No action taken.
C:\Documents and Settings\Vikram\Start Menu\Programs\Security Tool.LNK (Rogue.SecurityTool) -> No action taken.
C:\Documents and Settings\Vikram\Application Data\wiaserva.log (Malware.Trace) -> No action taken.
C:\WINDOWS\system32\qtplugin.exe (Rootkit.Agent) -> No action taken.

#12 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:40 AM

Posted 28 October 2009 - 02:31 PM

We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive (If you did not use the "Direct Download" mirror).
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#13 qauser001

qauser001
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:40 PM

Posted 28 October 2009 - 08:09 PM

Here is the log from rootrepeal:

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/10/28 18:16
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xB69F8000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xBA5FA000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xB231F000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Stealth Objects
-------------------
Object: Hidden Module [Name: svchost.exe]
Process: svchost.exe (PID: 3660) Address: 0x01000000 Size: 20480

==EOF==

Thanks again.

#14 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:40 AM

Posted 28 October 2009 - 08:12 PM

I'm not seeing much in that log. Let's try a different scanner.

Please download Rooter.exe and save to your desktop.
alternate download link
  • Double-click on Rooter.exe to start the tool. If using Vista, right-click and Run as Administrator...
  • Click the Scan button to begin.
  • Once the scan is complete, Notepad will open with a report named Rooter_#.txt (where # is the number assigned to the report).
  • A folder will be created at the %systemdrive% (usually, C:\Rooter$) where the log will be saved.
  • Rooter will automatically close. If it doesn't, just press the Close button.
  • Copy and paste the contents of Rooter_#.txt in your next reply.
Important: Before performing a scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.
  • Disconnect from the Internet or physically unplug you Internet cable connection.
  • Clean out your temporary files.
  • Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
  • Temporarily disable your anti-virus and real-time anti-spyware protection.
  • After starting the scan, do not use the computer until the scan has completed.
  • When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.

The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#15 qauser001

qauser001
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:08:40 PM

Posted 28 October 2009 - 08:47 PM

this ran really ran fast, log is below. In the temp folder one file will not get deleted, its WCESlog.txt.

Rooter.exe (v1.0.2) by Eric_71
.
SeDebugPrivilege granted successfully ...
.
Windows XP Home Edition (5.1.2600) Service Pack 2
[32_bits] - x86 Family 6 Model 15 Stepping 13, GenuineIntel
.
[wscsvc] STOPPED (state:1) : Security Center -> Disabled !
[SharedAccess] STOPPED (state:1) : Windows Firewall -> Disabled !
.
Internet Explorer 8.0.6001.18702
.
C:\ [Fixed-NTFS] .. ( Total:109 Go - Free:87 Go )
D:\ [CD_Rom]
.
Scan : 21:44.04
Path : C:\Documents and Settings\Vikram\Desktop\Rooter.exe
User : Vikram ( Administrator -> YES )
.
----------------------\\ Processes
.
Locked [System Process] (0)
______ System (4)
______ \SystemRoot\System32\smss.exe (844)
______ \??\C:\WINDOWS\system32\csrss.exe (924)
______ \??\C:\WINDOWS\system32\winlogon.exe (956)
______ C:\WINDOWS\system32\services.exe (1000)
______ C:\WINDOWS\system32\lsass.exe (1012)
______ C:\WINDOWS\system32\svchost.exe (1188)
______ C:\WINDOWS\system32\svchost.exe (1292)
______ C:\WINDOWS\System32\svchost.exe (1332)
______ C:\WINDOWS\system32\svchost.exe (1368)
______ C:\WINDOWS\system32\svchost.exe (1420)
______ C:\WINDOWS\system32\svchost.exe (1500)
______ C:\WINDOWS\System32\WLTRYSVC.EXE (1552)
______ C:\WINDOWS\System32\bcmwltry.exe (1564)
______ C:\WINDOWS\system32\spoolsv.exe (1688)
______ C:\WINDOWS\system32\svchost.exe (1820)
______ C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe (1856)
______ C:\Program Files\Java\jre6\bin\jqs.exe (1888)
______ C:\WINDOWS\system32\nvsvc32.exe (1920)
______ C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe (1948)
______ C:\Program Files\Dell Support Center\bin\sprtsvc.exe (216)
______ C:\WINDOWS\system32\svchost.exe (248)
______ C:\WINDOWS\Explorer.exe (1632)
______ C:\Program Files\Synaptics\SynTP\SynTPEnh.exe (464)
______ C:\WINDOWS\system32\rundll32.exe (580)
______ C:\WINDOWS\system32\RUNDLL32.EXE (592)
______ C:\WINDOWS\OEM02Mon.exe (672)
______ C:\Program Files\Dell\Dell Webcam Manager\DellWMgr.exe (684)
______ C:\WINDOWS\stsystra.exe (700)
______ C:\WINDOWS\system32\KADxMain.exe (736)
______ C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe (804)
______ C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe (852)
______ C:\Program Files\Roxio\Drag-to-Disc\DrgToDsc.exe (772)
______ C:\Program Files\Dell\MediaDirect\PCMService.exe (1356)
______ C:\WINDOWS\system32\svchost.exe (1256)
______ C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe (1484)
______ C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe (2072)
______ C:\Program Files\Brother\Brmfcmon\BrMfcWnd.exe (2124)
______ C:\Program Files\Dell Support Center\bin\sprtcmd.exe (2228)
______ C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSHelpRunner.exe (2444)
______ C:\Program Files\DellSupport\DSAgnt.exe (2556)
______ C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe (2620)
______ C:\Program Files\SlySoft\AnyDVD\AnyDVDtray.exe (2756)
______ C:\Program Files\Microsoft ActiveSync\wcescomm.exe (2788)
______ C:\WINDOWS\system32\ctfmon.exe (2808)
______ C:\WINDOWS\sslsfil.exe (2824)
______ C:\Program Files\Digital Line Detect\DLG.exe (3432)
______ C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe (3448)
______ C:\PROGRA~1\MICROS~4\rapimgr.exe (3536)
______ C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe (3816)
______ C:\WINDOWS\System32\svchost.exe (1972)
______ C:\WINDOWS\system32\svchost.exe (3660)
______ C:\WINDOWS\system32\wuauclt.exe (4208)
______ C:\Documents and Settings\Vikram\Desktop\Rooter.exe (5384)
.
----------------------\\ Device\Harddisk0\
.
\Device\Harddisk0 [Sectors : 63 x 512 Bytes]
.
\Device\Harddisk0\Partition1 (Start_Offset:32256 | Length:82220544)
\Device\Harddisk0\Partition2 --[ MBR ]-- (Start_Offset:82252800 | Length:117267816960)
\Device\Harddisk0\Partition0 (Start_Offset:117350069760 | Length:2681441280)
\Device\Harddisk0\Partition3 (Start_Offset:117350102016 | Length:2681409024)
.
----------------------\\ Scheduled Tasks
.
C:\WINDOWS\Tasks\desktop.ini
C:\WINDOWS\Tasks\SA.DAT
.
----------------------\\ Registry
.
.
----------------------\\ Files & Folders
.
----------------------\\ Scan completed at 21:44.12
.
C:\Rooter$\Rooter_1.txt - (28/10/2009 | 21:44.12)

Edited by qauser001, 28 October 2009 - 08:50 PM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users