Rootkit-revealer results... anyone good intrepreting?

Hi!

Isn’t there a online-tool where you can check your rootkitrevealer-logs?

Here’s my log:

HKU\S-1-5-21-854245398-1957994488-839522115-500\Software\SecuROM!CAUTION! NEVER DELETE OR CHANGE ANY KEY* 10.11.2008 05:04 0 bytes Key name contains embedded nulls ()
HKLM\SECURITY\Policy\Secrets\SAC
27.02.2008 06:42 0 bytes Key name contains embedded nulls ()
HKLM\SECURITY\Policy\Secrets\SAI
27.02.2008 06:42 0 bytes Key name contains embedded nulls (*)
HKLM\SYSTEM\ControlSet001\Services\sptd\Cfg 02.02.2009 12:38 0 bytes Access is denied. <<< wth? ???

http://forum.sysinternals.com/forum_posts.asp?TID=8881&PN=1

http://www.wilderssecurity.com/showthread.php?t=145763

Ok thanks. Got Daemon.

Now I’m just curious of what that first one could be, SecuROM? Researching… :stuck_out_tongue:

Hi tanya,

Answer for you here: http://en.wikipedia.org/wiki/Securom

polonus

P.S. “The old google can be your best friend”

Securom is a game copy protection system used by many pc games and sptd.sys belongs to daemon tools cd/dvd emulation software. So nothing to worry about here. :slight_smile: