Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Found This In My Webroot Log


  • Please log in to reply
9 replies to this topic

#1 BostonBen

BostonBen

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:04:31 AM

Posted 08 June 2008 - 04:00 PM

Am I in trouble what is this?
10:06 AM: ApplicationMinimized - EXIT
10:06 AM: ApplicationMinimized - ENTER
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:37 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:36 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:36 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:36 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:36 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:36 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:36 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:36 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:36 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:36 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:36 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:36 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:36 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:36 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:36 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:36 AM: Tamper Detection
5:40 PM: Your virus definitions have been updated.
5:40 PM: Informational: Loaded AntiVirus Engine: 2.74.1; SDK Version: 4.30E; Virus Definitions: 6/7/2008 5:27:46 PM (GMT)
5:39 PM: Your definitions are up to date.
4:25 PM: Warning: AntiVirus engine for IFO returned [Error Code 8000FFFF] on [C:\DOCUMENTS AND SETTINGS\BEN\MY DOCUMENTS\POKERACEHUDLAYOUTS\MY VIDEOS\DAUT44_2_TABLE_2-4_6MAX_VIDEO.WMV]
4:25 PM: Warning: AntiVirus engine for IFO returned [Error Code 8000FFFF] on [C:\DOCUMENTS AND SETTINGS\ALL USERS\DOCUMENTS\MY VIDEOS\EXTREME RUSH.WMV]
4:25 PM: Warning: AntiVirus engine for IFO returned [Error Code 8000FFFF] on [C:\DOCUMENTS AND SETTINGS\ALL USERS\DOCUMENTS\MY VIDEOS\ALANIS MORISSETTE - EVERYTHING.WMV]
4:24 PM: Warning: AntiVirus engine for IFO returned [Error Code 8000FFFF] on [C:\DOCUMENTS AND SETTINGS\ALL USERS\DOCUMENTS\MY VIDEOS\CORAL REEF - JEWELS OF THE CARIBBEAN.WMV]
4:24 PM: Warning: AntiVirus engine for IFO returned [Error Code 8000FFFF] on [C:\DOCUMENTS AND SETTINGS\BEN\MY DOCUMENTS\POKERACEHUDLAYOUTS\MY VIDEOS\DAUT44_2_TABLE_2-4_6MAX_VIDEO.WMV]
4:24 PM: Warning: AntiVirus engine for IFO returned [Error Code 8000FFFF] on [C:\DOCUMENTS AND SETTINGS\ALL USERS\DOCUMENTS\MY VIDEOS\DARE TO EXPLORE.WMV]
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:30 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\ForcedConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\AllocConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BootConfigVector
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\OverrideConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE
12:29 AM: Tamper Detection
Operation: Registry Access
Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\FilteredConfig
Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE

BC AdBot (Login to Remove)

 


#2 BostonBen

BostonBen
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:04:31 AM

Posted 09 June 2008 - 04:05 PM

no opinions?

#3 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,492 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:31 AM

Posted 09 June 2008 - 07:26 PM

Is this a Vista machine?
Also what are your antivirus and other spyware tools?

Edited by boopme, 09 June 2008 - 07:29 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#4 BostonBen

BostonBen
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:04:31 AM

Posted 09 June 2008 - 08:10 PM

Im running XP I have SAS, Webroot, and Mcafee, I also have MBAM and rogue remover

Edited by BostonBen, 09 June 2008 - 08:10 PM.


#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,492 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:31 AM

Posted 09 June 2008 - 08:14 PM

OK great run MBAM from normal mode and SAS fro m safe mode . Update both first and Post their scan logs.............
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#6 BostonBen

BostonBen
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:04:31 AM

Posted 09 June 2008 - 08:55 PM

first log ready, I'm supposed to delete it out of quarentine?
Malwarebytes' Anti-Malware 1.16
Database version: 845

9:47:46 PM 6/9/2008
mbam-log-6-9-2008 (21-47-46).txt

Scan type: Quick Scan
Objects scanned: 38446
Time elapsed: 22 minute(s), 20 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\clkcnt.txt (Trojan.Vundo) -> Quarantined and deleted successfully.

Edited by BostonBen, 09 June 2008 - 08:56 PM.


#7 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,492 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:31 AM

Posted 09 June 2008 - 09:35 PM

This may be an issue with windows updates,but lets do one more scan anyway. Aeait the SAS log.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#8 BostonBen

BostonBen
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:04:31 AM

Posted 09 June 2008 - 09:35 PM

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 06/08/2008 at 09:20 AM

Application Version : 4.1.1046

Core Rules Database Version : 3473
Trace Rules Database Version: 1464

Scan type : Complete Scan
Total Scan Time : 00:23:37

Memory items scanned : 530
Memory threats detected : 0
Registry items scanned : 5340
Registry threats detected : 0
File items scanned : 18177
File threats detected : 0

Adware.Tracking Cookie
.deucescracked.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
www.deucescracked.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.deucescracked.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.deucescracked.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.rakeback.deucescracked.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.rakeback.deucescracked.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.rakeback.deucescracked.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.rakeback.deucescracked.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.imrworldwide.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.imrworldwide.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.videoegg.adbureau.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.doubleclick.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.atdmt.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.imeem.112.2o7.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.zedo.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.zedo.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.zedo.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.zedo.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.efashionsolutions.122.2o7.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
server.iad.liveperson.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
server.iad.liveperson.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.adbrite.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.adbrite.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.adbrite.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
media.adrevolver.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
media.adrevolver.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
media.adrevolver.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
media.adrevolver.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.adrevolver.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.adrevolver.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.adrevolver.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.adrevolver.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.247realmedia.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.247realmedia.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
www.googleadservices.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.dynamic.media.adrevolver.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.tacoda.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.tacoda.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.tacoda.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.tacoda.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.tacoda.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.overture.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.ads.pointroll.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.ads.pointroll.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.ads.pointroll.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.ads.pointroll.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.ads.pointroll.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.ads.pointroll.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.ads.pointroll.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.ads.pointroll.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.friendfinder.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.friendfinder.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.adultfriendfinder.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.adultfriendfinder.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.adultfriendfinder.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.adultfriendfinder.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.advertising.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.advertising.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.advertising.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.advertising.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.advertising.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.adopt.euroclick.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.adopt.euroclick.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.adopt.euroclick.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.adopt.euroclick.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.tribalfusion.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.statcounter.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.statcounter.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.statcounter.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.statcounter.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.hitbox.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.hitbox.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.ehg-drjays.hitbox.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.apmebf.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.atradius.solution.weborama.fr [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.atradius.solution.weborama.fr [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.atradius.solution.weborama.fr [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.weborama.fr [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.atradius.solution.weborama.fr [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.web-stat.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.web-stat.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
data.coremetrics.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.realmedia.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.realmedia.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.fastclick.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.realmedia.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.pentonmedia.122.2o7.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.revsci.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.revsci.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.revsci.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.revsci.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
ads.revsci.net [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.mediaplex.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
www.burstnet.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.burstnet.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.burstnet.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.questionmarket.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
.questionmarket.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]
statse.webtrendslive.com [ C:\Documents and Settings\Ben\Application Data\Mozilla\Firefox\Profiles\x5n9wz0t.default\cookies.txt ]

#9 BostonBen

BostonBen
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:04:31 AM

Posted 09 June 2008 - 09:37 PM

Am I supposed to delete the stuff out of the MBAM quarentine? there's some nasties in there

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,492 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:31 AM

Posted 09 June 2008 - 09:43 PM

You can delete if you want to, as quarantined they can not harm your PC.
How is it running now?
Please u[date webroot and scan again also.

Edited by boopme, 09 June 2008 - 09:48 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users