Inactive Another victim: Vista 64-bit sirefef restart after 1 minute

Please run the F-Secure Online Scanner
  • Accept the License Agreement and check the box. Then click on Run Check.
  • fsecurescan.png
  • It will ask you to Run the Java plugin. Please confirm.
  • Once the download completes, the window for the scanner will launch.
  • Please confirm anymore prompts, and then select Full Scan.
  • The scan will take some time to finish, so please be patient.
  • When the scan completes, click the Automatic cleaning (recommended) button.
  • It will run its cleaning.
  • Click the Full report button and Copy & Paste the entire report (except the bold text at the foot of the page) in your next reply. Once that's done, click the Close button on the scan window.
 
I was unable to get F-Secure to run.

I downloaded the Java plugin, then launched the "online scanner now" the dialog box pictured above had the rotating clock icon, which kept on for over an hour, with no opportunity to "select Full Scan". I tried to run this several times, and even did a hard reboot, all to no avail.

Regards,
Grampz719
 
I just had a thought, pretty impressive for someone of my age!

I booted into safe mode/networking got the "full" scan to start. Oddly enough Firefox fired up without the normal problems I've been having.

Will update after the Automatic cleaning, then post the full report.

Cheers!
Grampz719
 
Here is the scan log after the autoclean:

Scanning Report
Wednesday, August 29, 2012 11:08:34 - 12:37:15

Computer name: COREI7
Scanning type: Scan system for malware, spyware and rootkits
Target: C:\
2 malware found
TrackingCookie.Webtrends (spyware)

System (Disinfected)

Suspicious:W32/Malware!Gemini (virus)

C:\UNZIPPED\BATTLEFIELD.2.NO-KEY.SETUP.PATCH-FAWKES\BATTLEFIELD2.NO-KEY.SETUP-PATCHER_DISTANTX.EXE (Not cleaned & Submitted)

Statistics
Scanned:

Files: 94236
System: 5326
Not scanned: 67

Actions:

Disinfected: 1
Renamed: 0
Deleted: 0
Not cleaned: 1
Submitted: 1

Files not scanned:

C:\PAGEFILE.SYS
C:\WINDOWS\SYSTEM32\CONFIG\SYSTEM
C:\WINDOWS\SYSTEM32\CONFIG\COMPONENTS
C:\WINDOWS\SYSTEM32\CONFIG\SOFTWARE
C:\WINDOWS\SYSTEM32\CONFIG\SAM
C:\WINDOWS\SYSTEM32\CONFIG\SECURITY
C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\COMPONENTS
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\DEFAULT
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SAM
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SECURITY
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SYSTEM
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SOFTWARE
C:\WINDOWS\SYSTEM32\CATROOT2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\CATDB
C:\WINDOWS\SYSTEM32\CATROOT2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\CATDB
C:\WINDOWS\CSC\V2.0.6\PQ
C:\WINDOWS\CSC\V2.0.6\TEMP\EA-{A93AED40-E213-11DE-BA61-ECABF6D07B1B}
C:\USERS\MAIN\APPDATA\LOCAL\TEMP\HSPERFDATA_MAIN\1412
C:\USERS\MAIN\APPDATA\LOCAL\TEMP\HSPERFDATA_MAIN\1832
C:\SYSTEM VOLUME INFORMATION\{060C6FDE-DC2A-11E1-85E6-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{060C701D-DC2A-11E1-85E6-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{060C7040-DC2A-11E1-85E6-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{1E8E815D-D5C1-11E1-B015-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{1E8E819E-D5C1-11E1-B015-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{260FC912-EA18-11E1-9DB3-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{2BD8CDC0-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{2BD8CDD4-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{2BD8CDDD-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{2BD8CDE5-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{2BD8CDE1-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{2BD8CDD9-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{39AB9D2F-EE27-11E1-807A-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{2BD8CE6F-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{2BD8CEAA-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{39AB9D58-EE27-11E1-807A-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{42910AA4-DA6E-11E1-996B-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{4737516E-EAD2-11E1-826D-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{473751DA-EAD2-11E1-826D-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{5A30096B-DF61-11E1-B2D0-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{5A300A3B-DF61-11E1-B2D0-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{5A300A9F-DF61-11E1-B2D0-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{5A300A18-DF61-11E1-B2D0-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{5A300ACC-DF61-11E1-B2D0-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{9591EC85-EC94-11E1-85AF-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{9DCE1318-D9DD-11E1-97E6-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{5A300AF4-DF61-11E1-B2D0-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{963DA1F0-EA52-11E1-9664-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{B2F9ACDA-E960-11E1-A21D-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{DA7BBCFC-E898-11E1-8A81-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{A897BEB3-E885-11E1-8CBD-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{E9052051-EF97-11E1-A824-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{E9052088-EF97-11E1-A824-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{E905206F-EF97-11E1-A824-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{F0290BF5-DAB8-11E1-85ED-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{F0290C08-DAB8-11E1-85ED-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{F52CA6F2-F137-11E1-8248-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{F7A97F2D-ECA5-11E1-8808-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{F0290C0C-DAB8-11E1-85ED-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{F7A97F1E-ECA5-11E1-8808-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\PROGRAMDATA\MICROSOFT\CRYPTO\RSA\MACHINEKEYS\5FC1B5EBB352A8DA28C6AF5DFC4A4372_88E4D4D6-A311-42F5-A309-ADA055688D64
C:\PROGRAMDATA\MICROSOFT\CRYPTO\RSA\MACHINEKEYS\6FAE98B93AE344C3C0D7E1721321B5D7_88E4D4D6-A311-42F5-A309-ADA055688D64
C:\PROGRAMDATA\MICROSOFT\CRYPTO\RSA\MACHINEKEYS\B438E4303587BCC3C2A277FF5ED8AAF1_88E4D4D6-A311-42F5-A309-ADA055688D64
C:\PROGRAMDATA\MICROSOFT\CRYPTO\RSA\MACHINEKEYS\DABDACFCED9A0DA44CE62A678EF1EB0F_88E4D4D6-A311-42F5-A309-ADA055688D64
C:\PROGRAMDATA\MICROSOFT\CRYPTO\RSA\MACHINEKEYS\D59D2CA440F4A5C3AA3B32E85CA42222_88E4D4D6-A311-42F5-A309-ADA055688D64
C:\FRST\QUARANTINE\DESKTOP.INI
C:\BOOT\BCD

Options
Scanning engines:

Scanning options:

Scan defined files: COM EXE SYS OV? BIN SCR DLL SHS HTM HTML HTT VBS JS INF VXD DO? XL? RTF CPL WIZ HTA PP? PWZ P?T MSO PIF . ACM ASP AX CNV CSC DRV INI MDB MPD MPP MPT OBD OBT OCX PCI TLB TSP WBK WBT WPC WSH VWP WML BOO HLP TD0 TT6 MSG ASD JSE VBE WSC CHM EML PRC SHB LNK WSF {* PDF ZL? XML XXX ANI AVB BAT CMD JOB LSP MAP MHT MIF PHP POT SWF WMF NWS TAR TMP
Use advanced heuristics

Copyright © 1998-2009 Product support | Send virus sample to F-Secure
F-Secure assumes no responsibility for material created or published by third parties that F-Secure World Wide Web pages have a link to. Unless you have clearly stated otherwise, by submitting material to any of our servers, for example by E-mail or via our F-Secure's CGI E-mail, you agree that the material you make available may be published in the F-Secure World Wide Pages or hard-copy publications. You will reach F-Secure public web site by clicking on underlined links. While doing this, your access will be logged to our private access statistics with your domain name. This information will not be given to any third party. You agree not to take action against us in relation to material that you submit. Unless you have clearly stated otherwise, by submitting material you warrant that F-Secure may incorporate any concepts described in it in the F-Secure products/publications without liability.
 
The same graphics problems with firefox, IE and windows photo gallery (plus the same type of graphics write problem is in iTunes too, although the music part works fine). Also, when using chrome, I try to log into my techspot.com account, but can never click in the box to type username or password. Also in chrome, when I try to switch between tabs, the new tab never "writes" the graphics, the tab highlights, but the content never appears.

Everything else seems ok. I use gmail, word, local games and "my computer" functions are all normal.
 
Found an error in my scripting above. Let's redo a fix...

FRST64 Fixlist

Please run the following:

Open notepad (Start =>All Programs => Accessories => Notepad). Please copy the entire contents of the code box below. (To do this highlight the contents of the box, right click on it and select copy. Right-click in the open notepad and select Paste). Save it on the flashdrive as fixlist.txt

start
Replace: C:\Windows\winsxs\amd64_microsoft-windows-userinit_31bf3856ad364e35_6.0.6001.18000_none_384755998a0d6941\userinit.exe c:\windows\SysWow64\userinit.exe
Replace: C:\Windows\winsxs\amd64_microsoft-windows-userinit_31bf3856ad364e35_6.0.6001.18000_none_384755998a0d6941\userinit.exe C:\Windows\System32\userinit.exe
end

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system

Now, please enter System Recovery Options then select Command Prompt.

Run FRST64 and press the Fix button just once and wait.
The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.

Now restart, let it boot normally and tell me how it went.
 
Here is fixlog.txt:

Fix result of Farbar Recovery Tool (FRST written by Farbar) Version: 15-08-2012
Ran by SYSTEM at 2012-09-03 08:40:00 Run:3
Running from F:\VI_TOOLS

==============================================

c:\windows\SysWow64\userinit.exe moved successfully.
C:\Windows\winsxs\amd64_microsoft-windows-userinit_31bf3856ad364e35_6.0.6001.18000_none_384755998a0d6941\userinit.exe copied successfully to c:\windows\SysWow64\userinit.exe
C:\Windows\System32\userinit.exe moved successfully.
C:\Windows\winsxs\amd64_microsoft-windows-userinit_31bf3856ad364e35_6.0.6001.18000_none_384755998a0d6941\userinit.exe copied successfully to C:\Windows\System32\userinit.exe

==== End of Fixlog ====


The system still has all of the same graphics issues as before. Basically it doesn't seem to have made any difference.
 
Hi DMJ,

I don't know if this has anything to do with anything, but I just noticed the scripts above have "amd64" in the fix script. My system has an intel processor (i920 I think, 2.67GHz quad-core about 3 years old).
 
Let's find out for sure...

Please download Speccy and save to your Desktop.
  • Double-click on setup file and install Speccy on your computer.
  • Start Speccy and give it 30 seconds to 1 minute to load.
  • Then, click File > Save as Text file...
  • Save the report to your Desktop or other location you can remember.
  • Find the report and attach it to your next reply.
 
Big file, here is part 1 of 4

Summary
Operating System
MS Windows Vista Ultimate 64-bit SP2
CPU
Intel Core i7 920 @ 2.67GHz 33 °C
Bloomfield 45nm Technology
RAM
6.00 GB Triple-Channel DDR3 @ 534MHz (8-8-8-20)
Motherboard
ASUSTeK Computer INC. P6TD DELUXE (LGA1366) 42 °C
Graphics
DELL D1025TM (1600x1200@65Hz)
HP w2007 (1050x1680@60Hz)
ATI Radeon HD 4800 Series (VISIONTEK) 61 °C
Hard Drives
1397GB Seagate ST31500341AS ATA Device (SATA) 35 °C
Optical Drives
PLEXTOR DVDR PX-880SA ATA Device
Audio
SoundMAX Integrated Digital HD Audio
Operating System
MS Windows Vista Ultimate 64-bit SP2
Computer type: Desktop
Installation Date: 05 December 2009, 20:04
Serial Number: CQVDQ-BVQ7D-PYGRR-3CYHM-BYKCY
Windows Security Center
User Account Control (UAC) Disabled
Firewall Enabled
Windows Update
AutoUpdate Download Automatically and Install at Set Scheduled time
Schedule Frequency Every day
Schedule Time 3 am
Windows Defender
Windows Defender Enabled
Environment Variables
USERPROFILE C:\Users\Main
SystemRoot C:\Windows
User Variables
TEMP C:\Users\Main\AppData\Local\Temp
TMP C:\Users\Main\AppData\Local\Temp
Machine Variables
ComSpec C:\Windows\system32\cmd.exe
FP_NO_HOST_CHECK NO
OS Windows_NT
Path C:\Program Files (x86)\AMD APP\bin\x86_64
C:\Program Files (x86)\AMD APP\bin\x86
C:\Windows\system32
C:\Windows
C:\Windows\system32\wbem
C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static
%SYSTEMROOT%\System32\WindowsPowerShell\v1.0
C:\Program Files (x86)\QuickTime\QTSystem
PATHEXT .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE AMD64
TEMP C:\Windows\TEMP
TMP C:\Windows\TEMP
USERNAME SYSTEM
windir C:\Windows
PROCESSOR_LEVEL 6
PROCESSOR_IDENTIFIER Intel64 Family 6 Model 26 Stepping 4, GenuineIntel
PROCESSOR_REVISION 1a04
NUMBER_OF_PROCESSORS 8
TRACE_FORMAT_SEARCH_PATH \\NTREL202.ntdev.corp.microsoft.com\34FB5F65-FFEB-4B61-BF0E-A6A76C450FAA\TraceFormat
DFSTRACINGON FALSE
asl.log Destination=file;OnFirstLog=command,environment
PSModulePath C:\Windows\system32\WindowsPowerShell\v1.0\Modules\
CLASSPATH .;C:\Program Files (x86)\Java\jre6\lib\ext\QTJava.zip
QTJAVA C:\Program Files (x86)\Java\jre6\lib\ext\QTJava.zip
AMDAPPSDKROOT C:\Program Files (x86)\AMD APP\
Power Profile
Active power scheme Home/Office Desk
Hibernation Disabled
Power Shutdown Enabled
Power Suspend Enabled
Turn Off Monitor after: (On AC Power) 20 min
Turn Off Hard Disk after: (On AC Power) Never
Suspend after: (On AC Power) Never
Screen saver Enabled
Uptime
Current Session
Current Time 9/4/2012 10:10:55 AM
Current Uptime 91305 sec (1 d, 01 h, 21 m, 45 s)
Last Boot Time 9/3/2012 8:49:10 AM
Last ShutDown Time 8/30/2012 4:32:57 PM
Uptime Statistics
First Boot Time 7/30/2012 11:45:25 AM
First Shutdown Time 7/30/2012 11:43:17 AM
Total Uptime 1320501 sec (15 d, 06 h, 48 m, 21 s)
Total Downtime 6518 sec (0 d, 01 h, 48 m, 38 s)
Longest Uptime 343970 sec (3 d, 23 h, 32 m, 50 s)
Longest Downtime 3684 sec (0 d, 01 h, 01 m, 24 s)
Total Reboots 20
System Availability 99.51%
TimeZone
TimeZone GMT -7 Hours
Language English
Country United States
Currency $
Date Format M/d/yyyy
Time Format h:mm:ss tt
Scheduler
9/4/2012 10:23 AM; GoogleUpdateTaskMachineUA
9/4/2012 10:38 AM; Adobe Flash Player Updater
9/4/2012 11:08 AM; GoogleUpdateTaskUserS-1-5-21-1669438090-637224408-139502534-1000UA
9/4/2012 12:08 PM; GoogleUpdateTaskUserS-1-5-21-1669438090-637224408-139502534-1000Core
9/4/2012 12:23 PM; GoogleUpdateTaskMachineCore
9/10/2012 8:50 AM; RealUpgradeScheduledTaskS-1-5-21-1669438090-637224408-139502534-1000
RealUpgradeLogonTaskS-1-5-21-1669438090-637224408-139502534-1000
win4036e0
Your File Updater
Process List
aeadisrv.exe
Process ID 2308
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\AEADISRV.EXE
Memory Usage 4.06 MB
Peak Memory Usage 4.06 MB
applemobiledeviceservice.exe
Process ID 2352
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
Memory Usage 10 MB
Peak Memory Usage 10 MB
armsvc.exe
Process ID 2296
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
Memory Usage 4.81 MB
Peak Memory Usage 4.85 MB
assysctrlservice.exe
Process ID 2392
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.02\AsSysCtrlService.exe
Memory Usage 3.74 MB
Peak Memory Usage 3.77 MB
atieclxx.exe
Process ID 1224
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\atieclxx.exe
Memory Usage 7.61 MB
Peak Memory Usage 7.64 MB
atiesrxx.exe
Process ID 972
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\atiesrxx.exe
Memory Usage 4.81 MB
Peak Memory Usage 4.81 MB
audiodg.exe
Process ID 540
chrome.exe
Process ID 2616
User Main
Domain Corei7
Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
Memory Usage 42 MB
Peak Memory Usage 58 MB
chrome.exe
Process ID 2236
User Main
Domain Corei7
Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
Memory Usage 13 MB
Peak Memory Usage 17 MB
chrome.exe
Process ID 3356
User Main
Domain Corei7
Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
Memory Usage 15 MB
Peak Memory Usage 16 MB
chrome.exe
Process ID 1016
User Main
Domain Corei7
Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
Memory Usage 9.29 MB
Peak Memory Usage 9.29 MB
csrss.exe
Process ID 536
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\csrss.exe
Memory Usage 8.11 MB
Peak Memory Usage 8.11 MB
csrss.exe
Process ID 620
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\csrss.exe
Memory Usage 24 MB
Peak Memory Usage 30 MB
dvmexportservice.exe
Process ID 2584
User SYSTEM
Domain NT AUTHORITY
Path C:\ASUS.SYS\CONFIG\DVMExportService.exe
Memory Usage 5.15 MB
Peak Memory Usage 5.64 MB
explorer.exe
Process ID 1852
User Main
Domain Corei7
Path C:\Windows\explorer.exe
Memory Usage 68 MB
Peak Memory Usage 73 MB
lsass.exe
Process ID 668
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\lsass.exe
Memory Usage 3.67 MB
Peak Memory Usage 12 MB
lsm.exe
Process ID 676
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\lsm.exe
Memory Usage 6.38 MB
Peak Memory Usage 6.39 MB
lssrvc.exe
Process ID 2464
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files (x86)\Common Files\LightScribe\LSSrvc.exe
Memory Usage 5.15 MB
Peak Memory Usage 5.18 MB
mdnsresponder.exe
Process ID 2416
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\Bonjour\mDNSResponder.exe
Memory Usage 6.30 MB
Peak Memory Usage 6.30 MB
nbservice.exe
Process ID 2640
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files (x86)\Common Files\Nero\Nero BackItUp 4\NBService.exe
Memory Usage 9.28 MB
Peak Memory Usage 9.35 MB
notepad.exe
Process ID 4052
User Main
Domain Corei7
Path C:\Windows\system32\NOTEPAD.EXE
Memory Usage 6.73 MB
Peak Memory Usage 6.73 MB
sdwinsec.exe
Process ID 3016
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files (x86)\Spybot - Search & Destroy\SDWinSec.exe
Memory Usage 18 MB
Peak Memory Usage 18 MB
searchfilterhost.exe
Process ID 3740
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\SearchFilterHost.exe
Memory Usage 11 MB
Peak Memory Usage 11 MB
searchindexer.exe
Process ID 2888
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\SearchIndexer.exe
Memory Usage 46 MB
Peak Memory Usage 62 MB
searchprotocolhost.exe
Process ID 844
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\SearchProtocolHost.exe
Memory Usage 14 MB
Peak Memory Usage 14 MB
services.exe
Process ID 656
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\services.exe
Memory Usage 9.51 MB
Peak Memory Usage 9.70 MB
slsvc.exe
Process ID 868
User NETWORK SERVICE
Domain NT AUTHORITY
Path C:\Windows\system32\SLsvc.exe
Memory Usage 15 MB
Peak Memory Usage 18 MB
smss.exe
Process ID 460
User SYSTEM
Domain NT AUTHORITY
Path \SystemRoot\System32\smss.exe
Memory Usage 1.24 MB
Peak Memory Usage 1.24 MB
speccy64.exe
Process ID 3684
User Main
Domain Corei7
Path C:\Program Files\Speccy\Speccy64.exe
Memory Usage 48 MB
Peak Memory Usage 48 MB
splwow64.exe
Process ID 3568
User Main
Domain Corei7
Path C:\Windows\splwow64.exe
Memory Usage 16 MB
Peak Memory Usage 20 MB
spoolsv.exe
Process ID 1652
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\System32\spoolsv.exe
Memory Usage 22 MB
Peak Memory Usage 22 MB
svchost.exe
Process ID 2796
User LOCAL SERVICE
Domain NT AUTHORITY
Path C:\Windows\system32\svchost.exe
Memory Usage 10 MB
Peak Memory Usage 11 MB
svchost.exe
Process ID 2868
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\System32\svchost.exe
Memory Usage 3.67 MB
Peak Memory Usage 3.71 MB
svchost.exe
Process ID 876
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\svchost.exe
Memory Usage 8.91 MB
Peak Memory Usage 9.02 MB
svchost.exe
Process ID 936
User NETWORK SERVICE
Domain NT AUTHORITY
Path C:\Windows\system32\svchost.exe
Memory Usage 12 MB
Peak Memory Usage 12 MB
svchost.exe
Process ID 332
User LOCAL SERVICE
Domain NT AUTHORITY
Path C:\Windows\System32\svchost.exe
Memory Usage 23 MB
Peak Memory Usage 23 MB
svchost.exe
Process ID 408
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\svchost.exe
Memory Usage 165 MB
Peak Memory Usage 923 MB
svchost.exe
Process ID 708
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\svchost.exe
Memory Usage 8.59 MB
Peak Memory Usage 8.59 MB
svchost.exe
Process ID 3476
User LOCAL SERVICE
Domain NT AUTHORITY
Path C:\Windows\system32\svchost.exe
Memory Usage 20 MB
Peak Memory Usage 20 MB
svchost.exe
Process ID 1108
User LOCAL SERVICE
Domain NT AUTHORITY
Path C:\Windows\system32\svchost.exe
Memory Usage 22 MB
Peak Memory Usage 22 MB
svchost.exe
Process ID 1240
User NETWORK SERVICE
Domain NT AUTHORITY
Path C:\Windows\system32\svchost.exe
Memory Usage 34 MB
Peak Memory Usage 45 MB
svchost.exe
Process ID 1676
User LOCAL SERVICE
Domain NT AUTHORITY
Path C:\Windows\system32\svchost.exe
Memory Usage 25 MB
Peak Memory Usage 107 MB
svchost.exe
Process ID 360
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\System32\svchost.exe
Memory Usage 145 MB
Peak Memory Usage 253 MB
svchost.exe
Process ID 2776
User NETWORK SERVICE
Domain NT AUTHORITY
Path C:\Windows\system32\svchost.exe
Memory Usage 7.04 MB
Peak Memory Usage 7.18 MB
system
Process ID 4
system idle process
Process ID 0
taskeng.exe
Process ID 1956
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\taskeng.exe
Memory Usage 8.36 MB
Peak Memory Usage 9.03 MB
taskeng.exe
Process ID 2504
User LOCAL SERVICE
Domain NT AUTHORITY
Path C:\Windows\system32\taskeng.exe
Memory Usage 6.11 MB
Peak Memory Usage 6.15 MB
taskeng.exe
Process ID 1912
User Main
Domain Corei7
Path C:\Windows\system32\taskeng.exe
Memory Usage 14 MB
Peak Memory Usage 16 MB
wininit.exe
Process ID 608
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\wininit.exe
Memory Usage 5.49 MB
Peak Memory Usage 5.57 MB
winlogon.exe
Process ID 728
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\winlogon.exe
Memory Usage 8.91 MB
Peak Memory Usage 9.16 MB
wmiadap.exe
Process ID 3448
User SYSTEM
Domain NT AUTHORITY
Path \\?\C:\Windows\system32\wbem\WMIADAP.EXE
Memory Usage 6.26 MB
Peak Memory Usage 6.26 MB
wmiprvse.exe
Process ID 2408
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\sysWOW64\wbem\wmiprvse.exe
Memory Usage 23 MB
Peak Memory Usage 26 MB
wmiprvse.exe
Process ID 3992
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\system32\wbem\wmiprvse.exe
Memory Usage 8.46 MB
Peak Memory Usage 8.59 MB
wmiprvse.exe
Process ID 484
User NETWORK SERVICE
Domain NT AUTHORITY
Path C:\Windows\system32\wbem\wmiprvse.exe
Memory Usage 17 MB
Peak Memory Usage 19 MB
wmpnetwk.exe
Process ID 3252
User NETWORK SERVICE
Domain NT AUTHORITY
Path C:\Program Files\Windows Media Player\wmpnetwk.exe
Memory Usage 37 MB
Peak Memory Usage 37 MB
wmpnscfg.exe
Process ID 3092
User Main
Domain Corei7
Path C:\Program Files\Windows Media Player\wmpnscfg.exe
Memory Usage 7.54 MB
Peak Memory Usage 7.57 MB
wudfhost.exe
Process ID 3024
User LOCAL SERVICE
Domain NT AUTHORITY
Path C:\Windows\system32\WUDFHost.exe
Memory Usage 7.12 MB
Peak Memory Usage 7.13 MB
Hotfixes
9/4/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/4/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/4/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
9/4/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/4/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/4/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
9/4/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/4/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.415.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
9/4/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
9/4/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/4/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
9/4/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
9/4/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
9/3/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/3/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/3/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
9/3/2012 Western Digital Technologies - Other hardware - WD SES Device
Western Digital Technologies Other hardware software update released
in January, 2011
9/3/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/3/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/3/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
9/3/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/3/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
9/3/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.203.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
9/3/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/3/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
9/3/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
9/3/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
 
Part 2 of 4

9/2/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/2/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/2/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
9/2/2012 Western Digital Technologies - Other hardware - WD SES Device
Western Digital Technologies Other hardware software update released
in January, 2011
9/2/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/2/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/2/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
9/2/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/2/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
9/2/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.203.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
9/2/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/2/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
9/2/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
9/2/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
9/1/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/1/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/1/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
9/1/2012 Western Digital Technologies - Other hardware - WD SES Device
Western Digital Technologies Other hardware software update released
in January, 2011
9/1/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/1/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/1/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
9/1/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/1/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
9/1/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.203.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
9/1/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
9/1/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
9/1/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
9/1/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
8/31/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/31/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/31/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
8/31/2012 Western Digital Technologies - Other hardware - WD SES Device
Western Digital Technologies Other hardware software update released
in January, 2011
8/31/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/31/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/31/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/31/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/31/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/31/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.203.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
8/31/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/31/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/31/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
8/31/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
8/31/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/31/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/31/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
8/31/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.1.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
8/31/2012 Western Digital Technologies - Other hardware - WD SES Device
Western Digital Technologies Other hardware software update released
in January, 2011
8/31/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/31/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/31/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/31/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/31/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/31/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/31/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/31/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
8/31/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
8/30/2012 Western Digital Technologies - Other hardware - WD SES Device
Western Digital Technologies Other hardware software update released
in January, 2011
8/30/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/30/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/30/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
8/30/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.1.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
8/30/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/30/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/30/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/30/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/30/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/30/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/30/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/30/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
8/30/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
8/29/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/29/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/29/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
8/29/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.1.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
8/29/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/29/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/29/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/29/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/29/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/29/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/29/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/29/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
8/29/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
8/28/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/28/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/28/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
8/28/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.1.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
8/28/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/28/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/28/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/28/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/28/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/28/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/28/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/28/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
8/28/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
 
Part 3 of 4

8/27/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/27/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/27/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
8/27/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.277.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
8/27/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/27/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/27/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/27/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/27/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/27/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/27/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/27/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
8/27/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
8/27/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/27/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/27/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
8/27/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.277.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
8/27/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/27/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/27/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/27/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/27/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/27/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/27/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/27/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
8/27/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
8/26/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/26/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/26/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
8/26/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.277.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
8/26/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/26/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/26/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/26/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/26/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/26/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/26/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/26/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
8/26/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
8/25/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/25/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/25/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
8/25/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.277.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
8/25/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/25/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/25/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/25/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/25/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/25/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/25/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/25/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
8/25/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
8/24/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/24/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/24/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
8/24/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.277.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
8/24/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/24/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/24/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/24/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/24/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/24/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/24/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/24/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
8/24/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
8/23/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/23/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/23/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
8/23/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/23/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/23/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/23/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.47.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
8/23/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/23/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/23/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/23/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/23/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
8/23/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
8/22/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/22/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/22/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
8/22/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/22/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/22/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/22/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.47.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
8/22/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/22/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/22/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/22/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/22/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
8/22/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
 
3 of 4

8/21/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/21/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/21/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
8/21/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/21/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/21/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/21/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.47.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
8/21/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/21/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/21/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/21/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/21/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
8/21/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
8/21/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/21/2012 Definition Update for Windows Defender - KB915597 (Definition 1.131.2244.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
8/21/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/21/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
8/21/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/21/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/21/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/21/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/21/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/21/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/21/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/21/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
8/21/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
8/20/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/20/2012 Definition Update for Windows Defender - KB915597 (Definition 1.131.2244.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
8/20/2012 Security Update for Microsoft Office 2003 (KB2687323)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/20/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
Security issues have been identified that could allow an attacker
to compromise a system that is running Microsoft Internet Explorer
and gain control over it. You can help protect your system by
installing this update from Microsoft. After you install this
item, you may have to restart your computer.
8/20/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/20/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/20/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
A security issue has been identified that could allow an authenticated
local attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/20/2012 Security Update for Microsoft Office 2003 (KB2687324)
A security vulnerability exists in Microsoft Office 2003 that
could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/20/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/20/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
A security vulnerability exists in Microsoft Office 2007 suites
that could allow arbitrary code to run when a maliciously modified
file is opened. This update resolves that vulnerability.
8/20/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
A security issue has been identified that could allow an unauthenticated
remote attacker to compromise your system and gain control over
it. You can help protect your system by installing this update
from Microsoft. After you install this update, you may have to
restart your system.
8/20/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
This update provides the Junk E-mail Filter in Microsoft Office
Outlook 2007 Junk Email Filter with a more current definition
of which e-mail messages should be considered junk e-mail.
8/20/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
After the download, this tool runs one time to check your computer
for infection by specific, prevalent malicious software (including
Blaster, Sasser, and Mydoom) and helps remove any infection that
is found. If an infection is found, the tool will display a status
report the next time that you start your computer. A new version
of the tool will be offered every month. If you want to manually
run the tool on your computer, you can download a copy from the
Microsoft Download Center, or you can run an online version from
microsoft.com. This tool is not a replacement for an antivirus
product. To help protect your computer, you should use an antivirus
product.
System Folders
Path for burning CD C:\Users\Main\AppData\Local\Microsoft\Windows\Burn\Burn1
Application Data C:\ProgramData
Public Desktop C:\Users\Public\Desktop
Documents C:\Users\Public\Documents
Global Favorites C:\Users\Main\Favorites
Music C:\Users\Public\Music
Pictures C:\Users\Public\Pictures
Start Menu Programs C:\ProgramData\Microsoft\Windows\Start Menu\Programs
Start Menu C:\ProgramData\Microsoft\Windows\Start Menu
Startup C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup
Templates C:\ProgramData\Microsoft\Windows\Templates
Videos C:\Users\Public\Videos
Cookies C:\Users\Main\AppData\Roaming\Microsoft\Windows\Cookies
Desktop C:\Users\Main\Desktop
Physical Desktop C:\Users\Main\Desktop
User Favorites C:\Users\Main\Favorites
Fonts C:\Windows\Fonts
Internet History C:\Users\Main\AppData\Local\Microsoft\Windows\History
Temporary Internet Files C:\Users\Main\AppData\Local\Microsoft\Windows\Temporary Internet Files
Local Application Data C:\Users\Main\AppData\Local
Windows directory C:\Windows
Windows/System C:\Windows\system32
Program Files C:\Program Files
Security Options
Accounts: Administrator account status Disabled
Accounts: Guest account status Enabled
Accounts: Limit local account use of blank passwords to console logon only Enabled
Accounts: Rename administrator account Administrator
Accounts: Rename guest account Guest
Audit: Audit the access of global system objects Disabled
Audit: Audit the use of Backup and Restore privilege Disabled
Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings Not Defined
Audit: Shut down system immediately if unable to log security audits Disabled
DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax Not Defined
DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax Not Defined
Devices: Allow undock without having to log on Enabled
Devices: Allowed to format and eject removable media Not Defined
Devices: Prevent users from installing printer drivers Disabled
Devices: Restrict CD-ROM access to locally logged-on user only Not Defined
Devices: Restrict floppy access to locally logged-on user only Not Defined
Domain controller: Allow server operators to schedule tasks Not Defined
Domain controller: LDAP server signing requirements Not Defined
Domain controller: Refuse machine account password changes Not Defined
Domain member: Digitally encrypt or sign secure channel data (always) Enabled
Domain member: Digitally encrypt secure channel data (when possible) Enabled
Domain member: Digitally sign secure channel data (when possible) Enabled
Domain member: Disable machine account password changes Disabled
Domain member: Maximum machine account password age 30 days
Domain member: Require strong (Windows 2000 or later) session key Disabled
Interactive logon: Do not display last user name Disabled
Interactive logon: Do not require CTRL+ALT+DEL Not Defined
Interactive logon: Message text for users attempting to log on Not Defined
Interactive logon: Message title for users attempting to log on
Interactive logon: Number of previous logons to cache (in case domain controller is not available) 10 logons
Interactive logon: Prompt user to change password before expiration 14 days
Interactive logon: Require Domain Controller authentication to unlock workstation Disabled
Interactive logon: Require smart card Disabled
Interactive logon: Smart card removal behavior No Action
Microsoft network client: Digitally sign communications (always) Disabled
Microsoft network client: Digitally sign communications (if server agrees) Enabled
Microsoft network client: Send unencrypted password to third-party SMB servers Disabled
Microsoft network server: Amount of idle time required before suspending session 15 minutes
Microsoft network server: Digitally sign communications (always) Disabled
Microsoft network server: Digitally sign communications (if client agrees) Disabled
Microsoft network server: Disconnect clients when logon hours expire Enabled
Network access: Allow anonymous SID/Name translation Disabled
Network access: Do not allow anonymous enumeration of SAM accounts Enabled
Network access: Do not allow anonymous enumeration of SAM accounts and shares Disabled
Network access: Do not allow storage of credentials or .NET Passports for network authentication Disabled
Network access: Let Everyone permissions apply to anonymous users Disabled
Network access: Named Pipes that can be accessed anonymously netlogon,lsarpc,samr,browser
Network access: Remotely accessible registry paths System\CurrentControlSet\Control\ProductOptions,System\CurrentControlSet\Control\Server Applications,Software\Microsoft\Windows NT\CurrentVersion
Network access: Remotely accessible registry paths and sub-paths System\CurrentControlSet\Control\Print\Printers,System\CurrentControlSet\Services\Eventlog,Software\Microsoft\OLAP Server,Software\Microsoft\Windows NT\CurrentVersion\Print,Software\Microsoft\Windows NT\CurrentVersion\Windows,System\CurrentControlSet\Control\ContentIndex,System\CurrentControlSet\Control\Terminal Server,System\CurrentControlSet\Control\Terminal Server\UserConfig,System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration,Software\Microsoft\Windows NT\CurrentVersion\Perflib,System\CurrentControlSet\Services\SysmonLog
Network access: Restrict anonymous access to Named Pipes and Shares Enabled
Network access: Shares that can be accessed anonymously Not Defined
Network access: Sharing and security model for local accounts Classic - local users authenticate as themselves
Network security: Do not store LAN Manager hash value on next password change Enabled
Network security: Force logoff when logon hours expire Disabled
Network security: LAN Manager authentication level Send NTLMv2 response only
Network security: LDAP client signing requirements Negotiate signing
Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
Network security: Minimum session security for NTLM SSP based (including secure RPC) servers
Recovery console: Allow automatic administrative logon Disabled
Recovery console: Allow floppy copy and access to all drives and all folders Disabled
Shutdown: Allow system to be shut down without having to log on Enabled
Shutdown: Clear virtual memory pagefile Disabled
System cryptography: Force strong key protection for user keys stored on the computer Not Defined
System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing Disabled
System objects: Require case insensitivity for non-Windows subsystems Not Defined
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) Enabled
System settings: Optional subsystems Posix
System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies Disabled
User Account Control: Admin Approval Mode for the Built-in Administrator account Disabled
User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop Disabled
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode Prompt for consent
User Account Control: Behavior of the elevation prompt for standard users Prompt for credentials
User Account Control: Detect application installations and prompt for elevation Enabled
User Account Control: Only elevate executables that are signed and validated Disabled
User Account Control: Only elevate UIAccess applications that are installed in secure locations Enabled
User Account Control: Run all administrators in Admin Approval Mode Disabled
User Account Control: Switch to the secure desktop when prompting for elevation Enabled
User Account Control: Virtualize file and registry write failures to per-user locations Enabled
Services
Running Adobe Acrobat Update Service
Running AMD External Events Utility
Running Andrea ADI Filters Service
Running Apple Mobile Device
Running Application Experience
Running ASUS System Control Service
Running Base Filtering Engine
Running Bonjour Service
Running COM+ Event System
Running Computer Browser
Running Cryptographic Services
Running DCOM Server Process Launcher
Running Desktop Window Manager Session Manager
Running DHCP Client
Running Diagnostic Policy Service
Running Diagnostic System Host
Running Distributed Link Tracking Client
Running DNS Client
Running DVM Meta Data Export Service
Running Function Discovery Provider Host
Running Function Discovery Resource Publication
Running Group Policy Client
Running Human Interface Device Access
Running IKE and AuthIP IPsec Keying Modules
Running IP Helper
Running IPsec Policy Agent
Running KtmRm for Distributed Transaction Coordinator
Running LightScribeService Direct Disc Labeling Service
Running Multimedia Class Scheduler
Running Nero BackItUp Scheduler 4.0
Running Network Connections
Running Network List Service
Running Network Location Awareness
Running Network Store Interface Service
Running Offline Files
Running Peer Name Resolution Protocol
Running Peer Networking Identity Manager
Running Plug and Play
Running Portable Device Enumerator Service
Running Print Spooler
Running Program Compatibility Assistant Service
Running ReadyBoost
Running Remote Access Connection Manager
Running Remote Procedure Call (RPC)
Running SBSD Security Center Service
Running Secondary Logon
Running Secure Socket Tunneling Protocol Service
Running Security Accounts Manager
Running Security Center
Running Server
Running Shell Hardware Detection
Running Software Licensing
Running SSDP Discovery
Running Superfetch
Running System Event Notification Service
Running Tablet PC Input Service
Running Task Scheduler
Running TCP/IP NetBIOS Helper
Running Telephony
Running Terminal Services
Running Themes
Running UPnP Device Host
Running User Profile Service
Running WebClient
Running Windows Audio
Running Windows Audio Endpoint Builder
Running Windows Driver Foundation - User-mode Driver Framework
Running Windows Error Reporting Service
Running Windows Event Log
Running Windows Firewall
Running Windows Font Cache Service
Running Windows Image Acquisition (WIA)
Running Windows Management Instrumentation
Running Windows Media Player Network Sharing Service
Running Windows Search
Running Windows Time
Running Windows Update
Running Workstation
Stopped Adobe Flash Player Update Service
Stopped Application Information
Stopped Application Layer Gateway Service
Stopped Application Management
Stopped Block Level Backup Engine Service
Stopped Certificate Propagation
Stopped CNG Key Isolation
Stopped COM+ System Application
Stopped DFS Replication
Stopped Diagnostic Service Host
Stopped Distributed Transaction Coordinator
Stopped Extensible Authentication Protocol
Stopped Fax
Stopped Google Update Service (gupdate)
Stopped Google Update Service (gupdatem)
Stopped GoToAssist
Stopped Health Key and Certificate Management
Stopped Interactive Services Detection
Stopped Internet Connection Sharing (ICS)
Stopped iPod Service
Stopped Link-Layer Topology Discovery Mapper
Stopped Microsoft .NET Framework NGEN v2.0.50727_X64
Stopped Microsoft .NET Framework NGEN v2.0.50727_X86
Stopped Microsoft .NET Framework NGEN v4.0.30319_X64
Stopped Microsoft .NET Framework NGEN v4.0.30319_X86
Stopped Microsoft iSCSI Initiator Service
Stopped Microsoft Office Diagnostics Service
Stopped Microsoft Office Groove Audit Service
Stopped Microsoft Software Shadow Copy Provider
Stopped Mozilla Maintenance Service
Stopped Net Driver HPZ12
Stopped Net.Tcp Port Sharing Service
Stopped Netlogon
Stopped Network Access Protection Agent
Stopped Norton Internet Security
Stopped Office Source Engine
Stopped Parental Controls
Stopped Peer Networking Grouping
Stopped Performance Counter DLL Host
Stopped Performance Logs & Alerts
Stopped Pml Driver HPZ12
Stopped PnP-X IP Bus Enumerator
Stopped PNRP Machine Name Publication Service
Stopped Problem Reports and Solutions Control Panel Support
Stopped Protected Storage
Stopped Quality Windows Audio Video Experience
Stopped Remote Access Auto Connection Manager
Stopped Remote Procedure Call (RPC) Locator
Stopped Remote Registry
Stopped Removable Storage
Stopped Routing and Remote Access
Stopped SL UI Notification Service
Stopped Smart Card
Stopped Smart Card Removal Policy
Stopped SNMP Trap
Stopped Terminal Services Configuration
Stopped Terminal Services UserMode Port Redirector
Stopped Thread Ordering Server
Stopped TPM Base Services
Stopped Virtual Disk
Stopped Volume Shadow Copy
Stopped Windows Backup
Stopped Windows CardSpace
Stopped Windows Color System
Stopped Windows Connect Now - Config Registrar
Stopped Windows Defender
Stopped Windows Event Collector
Stopped Windows Installer
Stopped Windows Media Center Extender Service
Stopped Windows Media Center Receiver Service
Stopped Windows Media Center Scheduler Service
Stopped Windows Media Center Service Launcher
Stopped Windows Modules Installer
Stopped Windows Presentation Foundation Font Cache 3.0.0.0
Stopped Windows Presentation Foundation Font Cache 4.0.0.0
Stopped Windows Remote Management (WS-Management)
Stopped WinHTTP Web Proxy Auto-Discovery Service
Stopped Wired AutoConfig
Stopped WLAN AutoConfig
Stopped WMI Performance Adapter
 
4 of 4
Device Tree
ACPI x64-based PC
Microsoft ACPI-Compliant System
Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
System board
ACPI Power Button
ACPI Fixed Feature Button
PCI bus
Intel(R) 5520/5500/X58 I/O Hub to ESI Port - 3405
Intel(R) 5520/5500/X58 I/O Hub PCI Express Root Port 1 - 3408
Intel(R) 5520/5500/X58 I/O Hub PCI Express Root Port 7 - 340E
Intel(R) 5520/5500/X58 I/O Hub System Management Registers - 342E
Intel(R) 5520/5500/X58 I/O Hub GPIO and Scratch Pad Registers - 3422
Intel(R) 5520/5500/X58 I/O Hub Control Status and RAS Registers - 3423
Intel(R) 5520/5500/X58 I/O Hub Throttle Registers - 3438
Intel(R) ICH10 Family PCI Express Root Port 1 - 3A40
Intel(R) ICH10 Family SMBus Controller - 3A30
System board
Motherboard resources
Microsoft Windows Management Interface for ACPI
Intel(R) 5520/5500/X58 I/O Hub PCI Express Root Port 3 - 340A
ATI Radeon HD 4800 Series
HP w2007 Wide LCD Monitor
Dell D1025TM
High Definition Audio Controller
AMD High Definition Audio Device
Intel(R) ICH10 Family USB Universal Host Controller - 3A37
USB Root Hub
Intel(R) ICH10 Family USB Universal Host Controller - 3A38
USB Root Hub
Intel(R) ICH10 Family USB Universal Host Controller - 3A39
USB Root Hub
Intel(R) ICH10 Family USB Enhanced Host Controller - 3A3C
USB Root Hub
Apple Mobile Device USB Driver
USB Mass Storage Device
Apple iPod USB Device
Generic USB Hub
USB Mass Storage Device
Generic USB SD Reader USB Device
Generic USB CF Reader USB Device
Generic USB xD/SM Reader USB Device
Generic USB MS Reader USB Device
USB Mass Storage Device
SWISSBIT Victorinox 2.0 USB Device
High Definition Audio Controller
SoundMAX Integrated Digital HD Audio
Intel(R) ICH10 Family PCI Express Root Port 3 - 3A44
Marvell Yukon 88E8056 PCI-E Gigabit Ethernet Controller
Intel(R) ICH10 Family PCI Express Root Port 5 - 3A48
Marvell 61xx RAID Controller
Marvell Virtual Device
Intel(R) ICH10 Family PCI Express Root Port 6 - 3A4A
Marvell Yukon 88E8056 PCI-E Gigabit Ethernet Controller #2
Intel(R) ICH10 Family USB Universal Host Controller - 3A34
USB Root Hub
Generic USB Hub
USB Composite Device
USB Human Interface Device
HID Keyboard Device
USB Human Interface Device
HID-compliant consumer control device
Microsoft USB IntelliMouse Optical
Microsoft USB IntelliMouse Optical
Intel(R) ICH10 Family USB Universal Host Controller - 3A35
USB Root Hub
Intel(R) ICH10 Family USB Universal Host Controller - 3A36
USB Root Hub
Intel(R) ICH10 Family USB Enhanced Host Controller - 3A3A
USB Root Hub
Intel(R) 82801 PCI Bridge - 244E
VIA OHCI Compliant IEEE 1394 Host Controller
Intel(R) ICH10R LPC Interface Controller - 3A16
Programmable interrupt controller
Direct memory access controller
System timer
System CMOS/real time clock
System speaker
Numeric data processor
Motherboard resources
Motherboard resources
ATK0110 ACPI UTILITY
High precision event timer
Intel(R) 82802 Firmware Hub Device
Motherboard resources
Motherboard resources
Intel(R) ICH10 Family 4 port Serial ATA Storage Controller 1 - 3A20
IDE Channel
PLEXTOR DVDR PX-880SA ATA Device
IDE Channel
ST31500341AS ATA Device
Intel(R) ICH10 Family 2 port Serial ATA Storage Controller 2 - 3A26
IDE Channel
IDE Channel
CPU
Intel Core i7 920
Cores 4
Threads 8
Name Intel Core i7 920
Code Name Bloomfield
Package Socket 1366 LGA
Technology 45nm
Specification Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
Family 6
Extended Family 6
Model A
Extended Model 1A
Stepping 4
Revision C0/C1
Instructions MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, Intel 64
Virtualization Supported, Enabled
Hyperthreading Supported, Enabled
Fan Speed 1534 RPM
Bus Speed 133.6 MHz
Rated Bus Speed 2405.4 MHz
Stock Core Speed 2666 MHz
Stock Bus Speed 133 MHz
Average Temperature 33 °C
Caches
L1 Data Cache Size 4 x 32 KBytes
L1 Instructions Cache Size 4 x 32 KBytes
L2 Unified Cache Size 4 x 256 KBytes
L3 Unified Cache Size 8192 KBytes
Core 0
Core Speed 1603.6 MHz
Multiplier x 12.0
Bus Speed 133.6 MHz
Rated Bus Speed 2405.4 MHz
Temperature 34 °C
Thread 1
APIC ID 0
Thread 2
APIC ID 1
Core 1
Core Speed 1603.6 MHz
Multiplier x 12.0
Bus Speed 133.6 MHz
Rated Bus Speed 2405.4 MHz
Temperature 30 °C
Thread 1
APIC ID 2
Thread 2
APIC ID 3
Core 2
Core Speed 1603.6 MHz
Multiplier x 12.0
Bus Speed 133.6 MHz
Rated Bus Speed 2405.4 MHz
Temperature 36 °C
Thread 1
APIC ID 4
Thread 2
APIC ID 5
Core 3
Core Speed 1603.6 MHz
Multiplier x 12.0
Bus Speed 133.6 MHz
Rated Bus Speed 2405.4 MHz
Temperature 31 °C
Thread 1
APIC ID 6
Thread 2
APIC ID 7
RAM
Memory slots
Total memory slots 6
Used memory slots 3
Free memory slots 3
Memory
Type DDR3
Size 6144 MBytes
Channels # Triple
DRAM Frequency 534.5 MHz
CAS# Latency (CL) 8 clocks
RAS# to CAS# Delay (tRCD) 8 clocks
RAS# Precharge (tRP) 8 clocks
Cycle Time (tRAS) 20 clocks
Command Rate (CR) 1T
Physical Memory
Memory Usage 33 %
Total Physical 5.99 GB
Available Physical 4.00 GB
Total Virtual 12 GB
Available Virtual 10 GB
SPD
Number Of SPD Modules 3
Slot #1
Type DDR3
Size 2048 MBytes
Manufacturer Corsair
Max Bandwidth PC3-10700H (667 MHz)
Part Number CM3X2G1600C8
Week/year 12 / 09
SPD Ext. EPP
XMP--2
Frequency
JEDEC #3
Frequency 666.7 MHz
CAS# Latency 9.0
RAS# To CAS# 9
RAS# Precharge 9
tRAS 24
tRC 34
Voltage 1.500 V
JEDEC #2
Frequency 592.6 MHz
CAS# Latency 8.0
RAS# To CAS# 8
RAS# Precharge 8
tRAS 22
tRC 30
Voltage 1.500 V
JEDEC #1
Frequency 444.4 MHz
CAS# Latency 6.0
RAS# To CAS# 6
RAS# Precharge 6
tRAS 16
tRC 23
Voltage 1.500 V
Slot #2
Type DDR3
Size 2048 MBytes
Manufacturer Corsair
Max Bandwidth PC3-10700H (667 MHz)
Part Number CM3X2G1600C8
Week/year 12 / 09
SPD Ext. EPP
XMP--2
Frequency
JEDEC #3
Frequency 666.7 MHz
CAS# Latency 9.0
RAS# To CAS# 9
RAS# Precharge 9
tRAS 24
tRC 34
Voltage 1.500 V
JEDEC #2
Frequency 592.6 MHz
CAS# Latency 8.0
RAS# To CAS# 8
RAS# Precharge 8
tRAS 22
tRC 30
Voltage 1.500 V
JEDEC #1
Frequency 444.4 MHz
CAS# Latency 6.0
RAS# To CAS# 6
RAS# Precharge 6
tRAS 16
tRC 23
Voltage 1.500 V
Slot #3
Type DDR3
Size 2048 MBytes
Manufacturer Corsair
Max Bandwidth PC3-10700H (667 MHz)
Part Number CM3X2G1600C8
Week/year 12 / 09
SPD Ext. EPP
XMP--2
Frequency
JEDEC #3
Frequency 666.7 MHz
CAS# Latency 9.0
RAS# To CAS# 9
RAS# Precharge 9
tRAS 24
tRC 34
Voltage 1.500 V
JEDEC #2
Frequency 592.6 MHz
CAS# Latency 8.0
RAS# To CAS# 8
RAS# Precharge 8
tRAS 22
tRC 30
Voltage 1.500 V
JEDEC #1
Frequency 444.4 MHz
CAS# Latency 6.0
RAS# To CAS# 6
RAS# Precharge 6
tRAS 16
tRC 23
Voltage 1.500 V
Motherboard
Manufacturer ASUSTeK Computer INC.
Model P6TD DELUXE (LGA1366)
Version System Version
Chipset Vendor Intel
Chipset Model X58
Chipset Revision 13
Southbridge Vendor Intel
Southbridge Model 82801JR (ICH10R)
Southbridge Revision 00
System Temperature 42 °C
BIOS
Brand American Megatrends Inc.
Version 0106
Date 07/15/2009
Voltage
CPU CORE 1.040 V
MEMORY CONTROLLER 1.720 V
+3.3V 3.280 V
+5V 4.872 V
+12V 11.821 V
VIN6 1.920 V
PCI Data
Slot PCI-E
Slot Type PCI-E
Slot Usage Available
Bus Width 32 bit
Slot Designation PCIEX4_1
Slot Number 0
Slot PCI-E
Slot Type PCI-E
Slot Usage In Use
Bus Width 32 bit
Slot Designation PCIEX16_1
Slot Number 1
Slot PCI
Slot Type PCI
Slot Usage Available
Bus Width 32 bit
Slot Designation PCI1
Slot Number 2
Slot PCI
Slot Type PCI
Slot Usage Available
Bus Width 32 bit
Slot Designation PCI2
Slot Number 3
Slot PCI-E
Slot Type PCI-E
Slot Usage Available
Bus Width 32 bit
Slot Designation PCIEX16_2
Slot Number 4
Slot PCI-E
Slot Type PCI-E
Slot Usage Available
Bus Width 32 bit
Slot Designation PCIEX16_3
Slot Number 5
Graphics
Monitor
Name DELL D1025TM on ATI Radeon HD 4800 Series
Current Resolution 1600x1200 pixels
Work Resolution 1600x1200 pixels
State enabled, primary, output devices support
Monitor Width 1600
Monitor Height 1200
Monitor BPP 32 bits per pixel
Monitor Frequency 65 Hz
Device \\.\DISPLAY1\Monitor0
Name HP w2007 on ATI Radeon HD 4800 Series
Current Resolution 1050x1680 pixels
Work Resolution 1050x1650 pixels
State enabled
Monitor Width 1050
Monitor Height 1680
Monitor BPP 32 bits per pixel
Monitor Frequency 60 Hz
Device \\.\DISPLAY2\Monitor0
ATI Radeon HD 4800 Series
GPU RV770
Device ID 1002-9440
Subvendor VISIONTEK (1545)
Current Performance Level Level 1
Voltage 1.263 V
Technology 56 nm
Die Size 256 nm?
Transistors 956 M
Release Date Jun 25, 2008
DirectX Support 10.1
DirectX Shader Model 4.1
OpenGL Support 3.0
Bios Core Clock 750.00
Bios Mem Clock 900.00
Temperature 60 °C
Core Voltage 1.263 V
BIOS Version 113-AA48709075.24V
ROPs 16
Shaders 800 unified
Memory Type GDDR5
Bus Width 32x8 (256 bit)
Pixel Fillrate 12.0 GPixels/s
Texture Fillrate 30.0 GTexels/s
Bandwidth 57.6 GB/s
Noise Level Moderate
Max Power Draw 150 Watts
Count of performance levels : 1
Level 1
OpenGL
Version 3.3.10750 Compatibility Profile Context
Vendor ATI Technologies Inc.
Renderer ATI Radeon HD 4800 Series
GLU Version 1.2.2.0 Microsoft Corporation
Values
GL_MAX_LIGHTS 8
GL_MAX_TEXTURE_SIZE 8192
GL_MAX_TEXTURE_STACK_DEPTH 10
GL Extensions
GL_AMDX_debug_output
GL_AMDX_vertex_shader_tessellator
GL_AMD_conservative_depth
GL_AMD_debug_output
GL_AMD_depth_clamp_separate
GL_AMD_draw_buffers_blend
GL_AMD_name_gen_delete
GL_AMD_performance_monitor
GL_AMD_sample_positions
GL_AMD_seamless_cubemap_per_texture
GL_AMD_shader_stencil_export
GL_AMD_texture_cube_map_array
GL_AMD_texture_texture4
GL_AMD_vertex_shader_tessellator
GL_ARB_ES2_compatibility
GL_ARB_blend_func_extended
GL_ARB_color_buffer_float
GL_ARB_copy_buffer
GL_ARB_depth_buffer_float
GL_ARB_depth_clamp
GL_ARB_depth_texture
GL_ARB_draw_buffers
GL_ARB_draw_buffers_blend
GL_ARB_draw_elements_base_vertex
GL_ARB_draw_instanced
GL_ARB_explicit_attrib_location
GL_ARB_fragment_coord_conventions
GL_ARB_fragment_program
GL_ARB_fragment_program_shadow
GL_ARB_fragment_shader
GL_ARB_framebuffer_object
GL_ARB_framebuffer_sRGB
GL_ARB_geometry_shader4
GL_ARB_get_program_binary
GL_ARB_half_float_pixel
GL_ARB_half_float_vertex
GL_ARB_imaging
GL_ARB_instanced_arrays
GL_ARB_map_buffer_range
GL_ARB_multisample
GL_ARB_multitexture
GL_ARB_occlusion_query
GL_ARB_occlusion_query2
GL_ARB_pixel_buffer_object
GL_ARB_point_parameters
GL_ARB_point_sprite
GL_ARB_provoking_vertex
GL_ARB_sample_shading
GL_ARB_sampler_objects
GL_ARB_seamless_cube_map
GL_ARB_separate_shader_objects
GL_ARB_shader_bit_encoding
GL_ARB_shader_objects
GL_ARB_shader_precision
GL_ARB_shader_stencil_export
GL_ARB_shader_texture_lod
GL_ARB_shading_language_100
GL_ARB_shadow
GL_ARB_shadow_ambient
GL_ARB_sync
GL_ARB_texture_border_clamp
GL_ARB_texture_buffer_object
GL_ARB_texture_buffer_object_rgb32
GL_ARB_texture_compression
GL_ARB_texture_compression_rgtc
GL_ARB_texture_cube_map
GL_ARB_texture_cube_map_array
GL_ARB_texture_env_add
GL_ARB_texture_env_combine
GL_ARB_texture_env_crossbar
GL_ARB_texture_env_dot3
GL_ARB_texture_float
GL_ARB_texture_gather
GL_ARB_texture_mirrored_repeat
GL_ARB_texture_multisample
GL_ARB_texture_non_power_of_two
GL_ARB_texture_query_lod
GL_ARB_texture_rectangle
GL_ARB_texture_rg
GL_ARB_texture_rgb10_a2ui
GL_ARB_texture_snorm
GL_ARB_timer_query
GL_ARB_transform_feedback2
GL_ARB_transform_feedback3
GL_ARB_transpose_matrix
GL_ARB_uniform_buffer_object
GL_ARB_vertex_array_bgra
GL_ARB_vertex_array_object
GL_ARB_vertex_buffer_object
GL_ARB_vertex_program
GL_ARB_vertex_shader
GL_ARB_vertex_type_2_10_10_10_rev
GL_ARB_viewport_array
GL_ARB_window_pos
GL_ATI_draw_buffers
GL_ATI_envmap_bumpmap
GL_ATI_fragment_shader
GL_ATI_meminfo
GL_ATI_separate_stencil
GL_ATI_texture_compression_3dc
GL_ATI_texture_env_combine3
GL_ATI_texture_float
GL_ATI_texture_mirror_once
GL_EXT_abgr
GL_EXT_bgra
GL_EXT_bindable_uniform
GL_EXT_blend_color
GL_EXT_blend_equation_separate
GL_EXT_blend_func_separate
GL_EXT_blend_minmax
GL_EXT_blend_subtract
GL_EXT_compiled_vertex_array
GL_EXT_copy_buffer
GL_EXT_copy_texture
GL_EXT_direct_state_access
GL_EXT_draw_buffers2
GL_EXT_draw_instanced
GL_EXT_draw_range_elements
GL_EXT_fog_coord
GL_EXT_framebuffer_blit
GL_EXT_framebuffer_multisample
GL_EXT_framebuffer_object
GL_EXT_framebuffer_sRGB
GL_EXT_geometry_shader4
GL_EXT_gpu_program_parameters
GL_EXT_gpu_shader4
GL_EXT_histogram
GL_EXT_multi_draw_arrays
GL_EXT_packed_depth_stencil
GL_EXT_packed_float
GL_EXT_packed_pixels
GL_EXT_pixel_buffer_object
GL_EXT_point_parameters
GL_EXT_provoking_vertex
GL_EXT_rescale_normal
GL_EXT_secondary_color
GL_EXT_separate_specular_color
GL_EXT_shadow_funcs
GL_EXT_stencil_wrap
GL_EXT_subtexture
GL_EXT_texgen_reflection
GL_EXT_texture3D
GL_EXT_texture_array
GL_EXT_texture_buffer_object
GL_EXT_texture_compression_latc
GL_EXT_texture_compression_rgtc
GL_EXT_texture_compression_s3tc
GL_EXT_texture_cube_map
GL_EXT_texture_edge_clamp
GL_EXT_texture_env_add
GL_EXT_texture_env_combine
GL_EXT_texture_env_dot3
GL_EXT_texture_filter_anisotropic
GL_EXT_texture_integer
GL_EXT_texture_lod
GL_EXT_texture_lod_bias
GL_EXT_texture_mirror_clamp
GL_EXT_texture_object
GL_EXT_texture_rectangle
GL_EXT_texture_sRGB
GL_EXT_texture_shared_exponent
GL_EXT_texture_snorm
GL_EXT_texture_swizzle
GL_EXT_timer_query
GL_EXT_transform_feedback
GL_EXT_vertex_array
GL_EXT_vertex_array_bgra
GL_IBM_texture_mirrored_repeat
GL_KTX_buffer_region
GL_NV_blend_square
GL_NV_conditional_render
GL_NV_copy_depth_to_color
GL_NV_explicit_multisample
GL_NV_float_buffer
GL_NV_half_float
GL_NV_primitive_restart
GL_NV_texgen_reflection
GL_NV_texture_barrier
GL_SGIS_generate_mipmap
GL_SGIS_texture_edge_clamp
GL_SGIS_texture_lod
GL_SUN_multi_draw_arrays
GL_WIN_swap_hint
WGL_EXT_swap_control
GL_EXT_bgra
Hard Drives
ST31500341AS ATA Device
Manufacturer Seagate
Form Factor 3.5"
Heads 16
Cylinders 16383
SATA type SATA-II 3.0Gb/s
Device type Fixed
ATA Standard ATA8-ACS
Serial Number 9VS2V662
LBA Size 48-bit LBA
Power On Count 462 times
Power On Time 863.9 days
Speed, Expressed in Revolutions Per Minute (rpm) 7200
Features S.M.A.R.T., AAM, NCQ
Transfer Mode SATA II
Interface SATA
Capacity 1397GB
Real size 1,500,301,910,016 bytes
RAID Type None
S.M.A.R.T
01 Read Error Rate 119 (099 worst) Data 000C58C66F
03 Spin-Up Time 100 (093) Data 0000000000
04 Start/Stop Count 100 (100) Data 00000001FA
05 Reallocated Sectors Count 099 (099) Data 000000004B
07 Seek Error Rate 086 (060) Data 00190B8875
09 Power-On Hours (POH) 077 (077) Data 00000050FD
0A Spin Retry Count 100 (100) Data 0000000000
0C Device Power Cycle Count 100 (100) Data 00000001CE
B8 End-to-End error / IOEDC 100 (100) Data 0000000000
BB Reported Uncorrectable Errors 100 (100) Data 0000000000
BC Command Timeout 100 (099) Data 0000010021
BD High Fly Writes (WDC) 001 (001) Data 0000000159
BE Temperature Difference from 100 065 (052) Data 00271B0023
C2 Temperature 035 (048) Data 0000000023
C3 Hardware ECC Recovered 050 (036) Data 000C58C66F
C5 Current Pending Sector Count 100 (100) Data 0000000000
C6 Uncorrectable Sector Count 100 (100) Data 0000000000
C7 UltraDMA CRC Error Count 200 (200) Data 0000000002
F0 Head Flying Hours 100 (253) Data 00000050F7
F1 Total LBAs Written 100 (253) Data 00C8691686
F2 Total LBAs Read 100 (253) Data 008CF3F457
Temperature 35 °C
Temperature Range ok (less than 50 °C)
Status Good
Partition 0
Partition ID Disk #0, Partition #0
Disk Letter C:
File System NTFS
Volume Serial Number 9E7F1466
Size 1397GB
Used Space 435GB (32%)
Free Space 962GB (68%)
Optical Drives
PLEXTOR DVDR PX-880SA ATA Device
Media Type DVD Writer
Name PLEXTOR DVDR PX-880SA ATA Device
Availability Running/Full Power
Capabilities Random Access, Supports Writing, Supports Removable Media
Config Manager Error Code Device is working properly
Config Manager User Config FALSE
Drive I:
DriveIntegrity TRUE
Media Loaded TRUE
SCSI Bus 0
SCSI Logical Unit 0
SCSI Port 0
SCSI Target Id 1
Size 3.66 GB
Status OK
Transfer Rate 7226 KB/S
Volume Name FRMCXFRE_EN_DVD
Volume Serial Number C5A8C992
Audio
Sound Cards
AMD High Definition Audio Device
SoundMAX Integrated Digital HD Audio
Playback Devices
SPDIF Interface (SoundMAX Integrated Digital HD Audio)
Digital Output (SoundMAX Integrated Digital HD Audio)
Speakers (SoundMAX Integrated Digital HD Audio) (default)
Recording Devices
Line In (SoundMAX Integrated Digital HD Audio)
Microphone (SoundMAX Integrated Digital HD Audio) (default)
Peripherals
HID Keyboard Device
Device Kind Keyboard
Device Name HID Keyboard Device
Vendor Unknown
Location USB Human Interface Device
Driver
Date 6-21-2006
Version 6.0.6002.18005
File C:\Windows\system32\DRIVERS\kbdhid.sys
File C:\Windows\system32\DRIVERS\kbdclass.sys
Microsoft USB IntelliMouse Optical
Device Kind Mouse
Device Name Microsoft USB IntelliMouse Optical
Vendor Microsoft
Location Microsoft USB IntelliMouse Optical
Driver
Date 6-21-2006
Version 6.0.6001.18000
File C:\Windows\system32\DRIVERS\mouhid.sys
File C:\Windows\system32\DRIVERS\mouclass.sys
Disk drive
Device Kind USB storage
Device Name Disk drive
Vendor APPLE
Comment Apple iPod USB Device
Location USB Mass Storage Device
Driver
Date 6-21-2006
Version 6.0.6002.18005
File C:\Windows\system32\DRIVERS\disk.sys
Disk drive
Device Kind USB storage
Device Name Disk drive
Vendor GENERIC
Comment Generic USB CF Reader USB Device
Location USB Mass Storage Device
Driver
Date 6-21-2006
Version 6.0.6002.18005
File C:\Windows\system32\DRIVERS\disk.sys
Disk drive
Device Kind USB storage
Device Name Disk drive
Vendor GENERIC
Comment Generic USB MS Reader USB Device
Location USB Mass Storage Device
Driver
Date 6-21-2006
Version 6.0.6002.18005
File C:\Windows\system32\DRIVERS\disk.sys
Disk drive
Device Kind USB storage
Device Name Disk drive
Vendor GENERIC
Comment Generic USB SD Reader USB Device
Location USB Mass Storage Device
Driver
Date 6-21-2006
Version 6.0.6002.18005
File C:\Windows\system32\DRIVERS\disk.sys
Disk drive
Device Kind USB storage
Device Name Disk drive
Vendor GENERIC
Comment Generic USB xD/SM Reader USB Device
Location USB Mass Storage Device
Driver
Date 6-21-2006
Version 6.0.6002.18005
File C:\Windows\system32\DRIVERS\disk.sys
Disk drive
Device Kind USB storage
Device Name Disk drive
Vendor SWISSBIT
Comment SWISSBIT Victorinox 2.0 USB Device
Location USB Mass Storage Device
Driver
Date 6-21-2006
Version 6.0.6002.18005
File C:\Windows\system32\DRIVERS\disk.sys
Printers
CutePDF Writer
Printer Port CPW2:
Print Processor WinPrint
Availability Always
Priority 1
Duplex None
Print Quality 600 * 600 dpi Color
Status Unknown
Driver
Driver Name CutePDF Writer (v6.00)
Driver Path C:\Windows\system32\spool\DRIVERS\x64\3\PSCRIPT5.DLL
Fax
Printer Port SHRFAX:
Print Processor WinPrint
Availability Always
Priority 1
Duplex None
Print Quality 200 * 200 dpi Monochrome
Status Unknown
Driver
Driver Name Microsoft Shared Fax Driver (v4.00)
Driver Path C:\Windows\system32\spool\DRIVERS\x64\3\FXSDRV.DLL
HP LaserJet 4600dtn PCL 5 (Default Printer)
Share Name HP LaserJet 4600dtn PCL 5
Printer Port 192.168.0.10_1
Print Processor hpcpp109
Availability Always
Priority 1
Duplex Long-edge binding
Print Quality 600 * 600 dpi Color
Status The printer is low on toner
Driver
Driver Name HP Universal Printing PCL 5 (v6.00)
Driver Path C:\Windows\system32\spool\DRIVERS\x64\3\unidrv.dll
Microsoft XPS Document Writer
Printer Port XPSPort:
Print Processor WinPrint
Availability Always
Priority 1
Duplex None
Print Quality 600 * 600 dpi Color
Status Unknown
Driver
Driver Name Microsoft XPS Document Writer (v6.00)
Driver Path C:\Windows\system32\spool\DRIVERS\x64\3\mxdwdrv.dll
Network
You are not connected to the internet
Computer Name
NetBIOS Name COREI7
DNS Name Corei7
Domain Name Corei7
Remote Desktop
Console
State Active
Domain Corei7
WinInet Info
LAN Connection
Local system uses a local area network to connect to the Internet
Local system has RAS to connect to the Internet
Wi-Fi Info
Wi-Fi not enabled
WinHTTPInfo
WinHTTPSessionProxyType No proxy
Session Proxy
Session Proxy Bypass
Connect Retries 5
Connect Timeout 60000
HTTP Version HTTP 1.1
Max Connects Per 1.0 Servers INFINITE
Max Connects Per Servers INFINITE
Max HTTP automatic redirects 10
Max HTTP status continue 10
Send Timeout 30000
IEProxy Auto Detect No
IEProxy Auto Config
IEProxy
IEProxy Bypass
Default Proxy Config Access Type No proxy
Default Config Proxy
Default Config Proxy Bypass
Sharing and Discovery
Network Discovery Enabled
File and Printer Sharing Disabled
Simple File Sharing Enabled
Administrative Shares Enabled
Adapters List
Marvell Yukon 88E8056 PCI-E Gigabit Ethernet Controller #2
IP Address 0.0.0.0
Subnet mask 0.0.0.0
Gateway server 0.0.0.0
Marvell Yukon 88E8056 PCI-E Gigabit Ethernet Controller
IP Address 192.168.0.2
Subnet mask 255.255.255.0
Gateway server 192.168.0.1
Network Shares
HP LaserJet 4600dtn PCL 5 HP LaserJet 4600dtn PCL 5,LocalsplOnly
 
It updated the driver, but now all of the displays are rotated 90 degrees. The "AMD Catalyst software" that installs with the driver has the same graphics issue as firefox, ie, et-all, so now I can't rotate the display back. I had to rotate the monitor 90 degrees (as in physically pick it up and turn it on its side) to be able to run the mouse.

I have backed all my data, and am getting ready to do a boot-n-nuke and start over...
 
Hello. Are you still with us?

Your thread has been marked as "Inactive" because of your lack of reply. Please let us know if you want to continue in this topic.

Thanks.
 
Back