Jump to content

sphan

Members
  • Content Count

    15
  • Joined

  • Last visited

About sphan

  • Rank
    Member
  1. 7:52 PM: Tamper Detection Operation: Registry Access Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE 7:52 PM: Tamper Detection Operation: Registry Access Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE 7:52 PM: Tamper Detection Operation: Registry Access Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig Sour
  2. 10:37 PM: Tamper Detection Operation: Registry Access Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE 10:37 PM: Tamper Detection Operation: Registry Access Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE 10:37 PM: Tamper Detection Operation: Registry Access Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\ForcedConfigVector Source
  3. 6:16 PM: Processing: ccbill cookie 6:16 PM: Processing: ccbill cookie 6:16 PM: Processing: whenu savenow 6:16 PM: Processing: whenu savenow 6:16 PM: Processing: whenu savenow 6:16 PM: Processing: whenu savenow 6:16 PM: Processing: whenu savenow 6:16 PM: Processing: whenu savenow 6:16 PM: Processing: whenu savenow 6:16 PM: Processing: whenu savenow 6:16 PM: Processing: whenu savenow 6:16 PM: Processing: whenu savenow 6:16 PM: Processing: whenu savenow 6:16 PM: Processing: whenu savenow 6:16 PM: Processing: whenu savenow 6:16 PM: Processing: whenu savenow 6:16 PM:
  4. 1:52 AM: Warning: AntiVirus engine for IFO returned [File Corrupted] on [C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\PPTAE7.TMP] 1:42 AM: Warning: AntiVirus engine for IFO returned [File Corrupted] on [C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\PPTAE7.TMP] 1:32 AM: Warning: AntiVirus engine for IFO returned [File Corrupted] on [C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\PPTAE7.TMP] 1:29 AM: Warning: AntiVirus engine for IFO returned [File Corrupted] on [C:\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\PPT848.TMP] 1:22 AM: Warning: AntiVirus engine for IFO r
  5. 4:24 AM: Tamper Detection 4:13 AM: Warning: AntiVirus engine for IFO returned [Access Denied] on [c:\documents and settings\localservice\application data\webroot\spy sweeper\temp\ssmsed0a3d15-498a-47eb-9e0f-1322696ab817.tmp] 4:13 AM: Warning: AntiVirus engine for IFO returned [Access Denied] on [c:\documents and settings\localservice\application data\webroot\spy sweeper\temp\ssms36188cea-ae3d-4003-aa2a-fa3bee92c65f.tmp] 4:11 AM: Warning: AntiVirus engine for IFO returned [Access Denied] on [c:\windows\system32\config\default] 4:08 AM: Warning: AntiVirus engine for IFO returne
  6. 12:09 AM: Removal process initiated Operation: Registry Access Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\OverrideConfig Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE 10:46 PM: Tamper Detection Operation: Registry Access Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\FilteredConfig Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE 10:46 PM: Tamper Detection Operation: Registry Access Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSIDRV\0000\LogConf\BasicConfig S
  7. 4:47 PM: Sweep Canceled 4:19 PM: Warning: AntiVirus engine for IFO returned [Access Denied] on [c:\windows\sf6da12ef.tmp] 4:19 PM: Warning: Failed to open file "c:\windows\sf6da12ef.tmp". The operation completed successfully 4:17 PM: Warning: AntiVirus engine for IFO returned [Access Denied] on [c:\documents and settings\localservice\application data\webroot\spy sweeper\temp\ssmsa8664720-6c13-4bf0-97b2-1e8bf14e94e3.tmp] 4:17 PM: Warning: AntiVirus engine for IFO returned [Access Denied] on [c:\documents and settings\localservice\application data\webroot\spy sweeper\temp\ssms8
  8. 7:00 PM: Tamper Detection Operation: Registry Access Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\OverrideConfig Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE 7:00 PM: Tamper Detection Operation: Registry Access Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\FilteredConfig Source: C:\WINDOWS\SYSTEM32\SERVICES.EXE 7:00 PM: Tamper Detection Operation: Registry Access Target: \SYSTEM\ControlSet001\Enum\Root\LEGACY_SSHRMD\0000\LogConf\BasicConfig Source: C:\WINDOWS\SYSTE
  9. 10:44 PM: Warning: Failed to open file "c:\documents and settings\owner\local settings\application data\opera\opera\profile\cache4\opr003r8". The operation completed successfully 10:44 PM: Warning: Failed to open file "c:\documents and settings\owner\local settings\application data\opera\opera\profile\cache4\opr003of". The operation completed successfully 10:44 PM: Warning: Failed to open file "c:\documents and settings\owner\local settings\temporary internet files\content.ie5\1gqxo684\2b000003ca[1]". The operation completed successfully 10:44 PM: Warning: Failed to open file "c:
  10. 11:46 PM: Warning: Failed to open file "c:\documents and settings\owner\local settings\application data\opera\opera\profile\cache4\opr00344". The operation completed successfully 11:46 PM: Warning: Failed to open file "c:\documents and settings\owner\local settings\application data\opera\opera\profile\cache4\opr00341". The operation completed successfully 11:46 PM: Warning: AntiVirus engine for IFO returned [Error Code DFFBFDF0] on [c:\documents and settings\owner\local settings\application data\opera\opera\profile\cache4\opr0033v] 11:46 PM: Warning: AntiVirus engine for IFO retu
  11. 12:25 AM: Removal process completed. Elapsed time 00:00:43 12:25 AM: Informational: Virus infected file c:\recycler\s-1-5-21-2393387428-2213101547-2949826486-1005\dc184.vir not cleaned. 12:25 AM: Informational: File c:\recycler\s-1-5-21-2393387428-2213101547-2949826486-1005\dc184.vir still infected with virus Mal/Swizzor-D after 20 rounds of disinfection. 12:25 AM: Informational: File c:\recycler\s-1-5-21-2393387428-2213101547-2949826486-1005\dc184.vir still infected with virus Mal/Swizzor-D after 19 rounds of disinfection. 12:25 AM: Informational: File c:\recycler\s-1-5-21-239338
  12. It doesn't seem to have a log anywhere.
  13. A few days ago my spysweeper detected this some sort of malware/behavioral along the names of Malware Swizzor D. Slightly panicked I did everything I could in attempt to get rid of it but webroot wasn't able to quarantine it. and Malware bytes' Anti-malware didn't pick up any sign of threats, however, just this morning there was something wrong with my IE browser. No matter how many browsers were up, if you closed one, a runtime error would appear and close out all the other IE browers! Pleasee help. Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 9:52:18 PM, on 12/22/2008 Plat
×
×
  • Create New...