Another victim: Vista 64-bit sirefef restart after 1 minute

Inactive
By Grampz719
Aug 17, 2012
  1. Jay Pfoutz

    Jay Pfoutz Malware Helper Posts: 4,286   +49

    Please run the F-Secure Online Scanner
    • Accept the License Agreement and check the box. Then click on Run Check.
    • [​IMG]
    • It will ask you to Run the Java plugin. Please confirm.
    • Once the download completes, the window for the scanner will launch.
    • Please confirm anymore prompts, and then select Full Scan.
    • The scan will take some time to finish, so please be patient.
    • When the scan completes, click the Automatic cleaning (recommended) button.
    • It will run its cleaning.
    • Click the Full report button and Copy & Paste the entire report (except the bold text at the foot of the page) in your next reply. Once that's done, click the Close button on the scan window.
  2. Grampz719

    Grampz719 Newcomer, in training Topic Starter Posts: 26

    I was unable to get F-Secure to run.

    I downloaded the Java plugin, then launched the "online scanner now" the dialog box pictured above had the rotating clock icon, which kept on for over an hour, with no opportunity to "select Full Scan". I tried to run this several times, and even did a hard reboot, all to no avail.

    Regards,
    Grampz719
  3. Grampz719

    Grampz719 Newcomer, in training Topic Starter Posts: 26

    I just had a thought, pretty impressive for someone of my age!

    I booted into safe mode/networking got the "full" scan to start. Oddly enough Firefox fired up without the normal problems I've been having.

    Will update after the Automatic cleaning, then post the full report.

    Cheers!
    Grampz719
  4. Grampz719

    Grampz719 Newcomer, in training Topic Starter Posts: 26

    Here is the scan log after the autoclean:

    Scanning Report
    Wednesday, August 29, 2012 11:08:34 - 12:37:15

    Computer name: COREI7
    Scanning type: Scan system for malware, spyware and rootkits
    Target: C:\
    2 malware found
    TrackingCookie.Webtrends (spyware)

    System (Disinfected)

    Suspicious:W32/Malware!Gemini (virus)

    C:\UNZIPPED\BATTLEFIELD.2.NO-KEY.SETUP.PATCH-FAWKES\BATTLEFIELD2.NO-KEY.SETUP-PATCHER_DISTANTX.EXE (Not cleaned & Submitted)

    Statistics
    Scanned:

    Files: 94236
    System: 5326
    Not scanned: 67

    Actions:

    Disinfected: 1
    Renamed: 0
    Deleted: 0
    Not cleaned: 1
    Submitted: 1

    Files not scanned:

    C:\PAGEFILE.SYS
    C:\WINDOWS\SYSTEM32\CONFIG\SYSTEM
    C:\WINDOWS\SYSTEM32\CONFIG\COMPONENTS
    C:\WINDOWS\SYSTEM32\CONFIG\SOFTWARE
    C:\WINDOWS\SYSTEM32\CONFIG\SAM
    C:\WINDOWS\SYSTEM32\CONFIG\SECURITY
    C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT
    C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\COMPONENTS
    C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\DEFAULT
    C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SAM
    C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SECURITY
    C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SYSTEM
    C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SOFTWARE
    C:\WINDOWS\SYSTEM32\CATROOT2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\CATDB
    C:\WINDOWS\SYSTEM32\CATROOT2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\CATDB
    C:\WINDOWS\CSC\V2.0.6\PQ
    C:\WINDOWS\CSC\V2.0.6\TEMP\EA-{A93AED40-E213-11DE-BA61-ECABF6D07B1B}
    C:\USERS\MAIN\APPDATA\LOCAL\TEMP\HSPERFDATA_MAIN\1412
    C:\USERS\MAIN\APPDATA\LOCAL\TEMP\HSPERFDATA_MAIN\1832
    C:\SYSTEM VOLUME INFORMATION\{060C6FDE-DC2A-11E1-85E6-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{060C701D-DC2A-11E1-85E6-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{060C7040-DC2A-11E1-85E6-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{1E8E815D-D5C1-11E1-B015-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{1E8E819E-D5C1-11E1-B015-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{260FC912-EA18-11E1-9DB3-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{2BD8CDC0-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{2BD8CDD4-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{2BD8CDDD-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{2BD8CDE5-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{2BD8CDE1-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{2BD8CDD9-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{39AB9D2F-EE27-11E1-807A-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{2BD8CE6F-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{2BD8CEAA-E3CA-11E1-92E4-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{39AB9D58-EE27-11E1-807A-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{42910AA4-DA6E-11E1-996B-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{4737516E-EAD2-11E1-826D-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{473751DA-EAD2-11E1-826D-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{5A30096B-DF61-11E1-B2D0-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{5A300A3B-DF61-11E1-B2D0-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{5A300A9F-DF61-11E1-B2D0-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{5A300A18-DF61-11E1-B2D0-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{5A300ACC-DF61-11E1-B2D0-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{9591EC85-EC94-11E1-85AF-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{9DCE1318-D9DD-11E1-97E6-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{5A300AF4-DF61-11E1-B2D0-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{963DA1F0-EA52-11E1-9664-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{B2F9ACDA-E960-11E1-A21D-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{DA7BBCFC-E898-11E1-8A81-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{A897BEB3-E885-11E1-8CBD-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{E9052051-EF97-11E1-A824-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{E9052088-EF97-11E1-A824-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{E905206F-EF97-11E1-A824-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{F0290BF5-DAB8-11E1-85ED-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{F0290C08-DAB8-11E1-85ED-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{F52CA6F2-F137-11E1-8248-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{F7A97F2D-ECA5-11E1-8808-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{F0290C0C-DAB8-11E1-85ED-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\SYSTEM VOLUME INFORMATION\{F7A97F1E-ECA5-11E1-8808-90E6BA1F8BF8}{3808876B-C176-4E48-B7AE-04046E6CC752}
    C:\PROGRAMDATA\MICROSOFT\CRYPTO\RSA\MACHINEKEYS\5FC1B5EBB352A8DA28C6AF5DFC4A4372_88E4D4D6-A311-42F5-A309-ADA055688D64
    C:\PROGRAMDATA\MICROSOFT\CRYPTO\RSA\MACHINEKEYS\6FAE98B93AE344C3C0D7E1721321B5D7_88E4D4D6-A311-42F5-A309-ADA055688D64
    C:\PROGRAMDATA\MICROSOFT\CRYPTO\RSA\MACHINEKEYS\B438E4303587BCC3C2A277FF5ED8AAF1_88E4D4D6-A311-42F5-A309-ADA055688D64
    C:\PROGRAMDATA\MICROSOFT\CRYPTO\RSA\MACHINEKEYS\DABDACFCED9A0DA44CE62A678EF1EB0F_88E4D4D6-A311-42F5-A309-ADA055688D64
    C:\PROGRAMDATA\MICROSOFT\CRYPTO\RSA\MACHINEKEYS\D59D2CA440F4A5C3AA3B32E85CA42222_88E4D4D6-A311-42F5-A309-ADA055688D64
    C:\FRST\QUARANTINE\DESKTOP.INI
    C:\BOOT\BCD

    Options
    Scanning engines:

    Scanning options:

    Scan defined files: COM EXE SYS OV? BIN SCR DLL SHS HTM HTML HTT VBS JS INF VXD DO? XL? RTF CPL WIZ HTA PP? PWZ P?T MSO PIF . ACM ASP AX CNV CSC DRV INI MDB MPD MPP MPT OBD OBT OCX PCI TLB TSP WBK WBT WPC WSH VWP WML BOO HLP TD0 TT6 MSG ASD JSE VBE WSC CHM EML PRC SHB LNK WSF {* PDF ZL? XML XXX ANI AVB BAT CMD JOB LSP MAP MHT MIF PHP POT SWF WMF NWS TAR TMP
    Use advanced heuristics

    Copyright © 1998-2009 Product support | Send virus sample to F-Secure
    F-Secure assumes no responsibility for material created or published by third parties that F-Secure World Wide Web pages have a link to. Unless you have clearly stated otherwise, by submitting material to any of our servers, for example by E-mail or via our F-Secure's CGI E-mail, you agree that the material you make available may be published in the F-Secure World Wide Pages or hard-copy publications. You will reach F-Secure public web site by clicking on underlined links. While doing this, your access will be logged to our private access statistics with your domain name. This information will not be given to any third party. You agree not to take action against us in relation to material that you submit. Unless you have clearly stated otherwise, by submitting material you warrant that F-Secure may incorporate any concepts described in it in the F-Secure products/publications without liability.
  5. Jay Pfoutz

    Jay Pfoutz Malware Helper Posts: 4,286   +49

    Hmm odd. What other problems are occurring?
  6. Grampz719

    Grampz719 Newcomer, in training Topic Starter Posts: 26

    The same graphics problems with firefox, IE and windows photo gallery (plus the same type of graphics write problem is in iTunes too, although the music part works fine). Also, when using chrome, I try to log into my techspot.com account, but can never click in the box to type username or password. Also in chrome, when I try to switch between tabs, the new tab never "writes" the graphics, the tab highlights, but the content never appears.

    Everything else seems ok. I use gmail, word, local games and "my computer" functions are all normal.
  7. Jay Pfoutz

    Jay Pfoutz Malware Helper Posts: 4,286   +49

    Found an error in my scripting above. Let's redo a fix...

    FRST64 Fixlist

    Please run the following:

    Open notepad (Start =>All Programs => Accessories => Notepad). Please copy the entire contents of the code box below. (To do this highlight the contents of the box, right click on it and select copy. Right-click in the open notepad and select Paste). Save it on the flashdrive as fixlist.txt

    NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system

    Now, please enter System Recovery Options then select Command Prompt.

    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.

    Now restart, let it boot normally and tell me how it went.
  8. Grampz719

    Grampz719 Newcomer, in training Topic Starter Posts: 26

    Here is fixlog.txt:

    Fix result of Farbar Recovery Tool (FRST written by Farbar) Version: 15-08-2012
    Ran by SYSTEM at 2012-09-03 08:40:00 Run:3
    Running from F:\VI_TOOLS

    ==============================================

    c:\windows\SysWow64\userinit.exe moved successfully.
    C:\Windows\winsxs\amd64_microsoft-windows-userinit_31bf3856ad364e35_6.0.6001.18000_none_384755998a0d6941\userinit.exe copied successfully to c:\windows\SysWow64\userinit.exe
    C:\Windows\System32\userinit.exe moved successfully.
    C:\Windows\winsxs\amd64_microsoft-windows-userinit_31bf3856ad364e35_6.0.6001.18000_none_384755998a0d6941\userinit.exe copied successfully to C:\Windows\System32\userinit.exe

    ==== End of Fixlog ====


    The system still has all of the same graphics issues as before. Basically it doesn't seem to have made any difference.
  9. Grampz719

    Grampz719 Newcomer, in training Topic Starter Posts: 26

    Hi DMJ,

    I don't know if this has anything to do with anything, but I just noticed the scripts above have "amd64" in the fix script. My system has an intel processor (i920 I think, 2.67GHz quad-core about 3 years old).
  10. Jay Pfoutz

    Jay Pfoutz Malware Helper Posts: 4,286   +49

    Let's find out for sure...

    Please download Speccy and save to your Desktop.
    • Double-click on setup file and install Speccy on your computer.
    • Start Speccy and give it 30 seconds to 1 minute to load.
    • Then, click File > Save as Text file...
    • Save the report to your Desktop or other location you can remember.
    • Find the report and attach it to your next reply.
  11. Grampz719

    Grampz719 Newcomer, in training Topic Starter Posts: 26

    Big file, here is part 1 of 4

    Summary
    Operating System
    MS Windows Vista Ultimate 64-bit SP2
    CPU
    Intel Core i7 920 @ 2.67GHz 33 °C
    Bloomfield 45nm Technology
    RAM
    6.00 GB Triple-Channel DDR3 @ 534MHz (8-8-8-20)
    Motherboard
    ASUSTeK Computer INC. P6TD DELUXE (LGA1366) 42 °C
    Graphics
    DELL D1025TM (1600x1200@65Hz)
    HP w2007 (1050x1680@60Hz)
    ATI Radeon HD 4800 Series (VISIONTEK) 61 °C
    Hard Drives
    1397GB Seagate ST31500341AS ATA Device (SATA) 35 °C
    Optical Drives
    PLEXTOR DVDR PX-880SA ATA Device
    Audio
    SoundMAX Integrated Digital HD Audio
    Operating System
    MS Windows Vista Ultimate 64-bit SP2
    Computer type: Desktop
    Installation Date: 05 December 2009, 20:04
    Serial Number: CQVDQ-BVQ7D-PYGRR-3CYHM-BYKCY
    Windows Security Center
    User Account Control (UAC) Disabled
    Firewall Enabled
    Windows Update
    AutoUpdate Download Automatically and Install at Set Scheduled time
    Schedule Frequency Every day
    Schedule Time 3 am
    Windows Defender
    Windows Defender Enabled
    Environment Variables
    USERPROFILE C:\Users\Main
    SystemRoot C:\Windows
    User Variables
    TEMP C:\Users\Main\AppData\Local\Temp
    TMP C:\Users\Main\AppData\Local\Temp
    Machine Variables
    ComSpec C:\Windows\system32\cmd.exe
    FP_NO_HOST_CHECK NO
    OS Windows_NT
    Path C:\Program Files (x86)\AMD APP\bin\x86_64
    C:\Program Files (x86)\AMD APP\bin\x86
    C:\Windows\system32
    C:\Windows
    C:\Windows\system32\wbem
    C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static
    %SYSTEMROOT%\System32\WindowsPowerShell\v1.0
    C:\Program Files (x86)\QuickTime\QTSystem
    PATHEXT .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
    PROCESSOR_ARCHITECTURE AMD64
    TEMP C:\Windows\TEMP
    TMP C:\Windows\TEMP
    USERNAME SYSTEM
    windir C:\Windows
    PROCESSOR_LEVEL 6
    PROCESSOR_IDENTIFIER Intel64 Family 6 Model 26 Stepping 4, GenuineIntel
    PROCESSOR_REVISION 1a04
    NUMBER_OF_PROCESSORS 8
    TRACE_FORMAT_SEARCH_PATH \\NTREL202.ntdev.corp.microsoft.com\34FB5F65-FFEB-4B61-BF0E-A6A76C450FAA\TraceFormat
    DFSTRACINGON FALSE
    asl.log Destination=file;OnFirstLog=command,environment
    PSModulePath C:\Windows\system32\WindowsPowerShell\v1.0\Modules\
    CLASSPATH .;C:\Program Files (x86)\Java\jre6\lib\ext\QTJava.zip
    QTJAVA C:\Program Files (x86)\Java\jre6\lib\ext\QTJava.zip
    AMDAPPSDKROOT C:\Program Files (x86)\AMD APP\
    Power Profile
    Active power scheme Home/Office Desk
    Hibernation Disabled
    Power Shutdown Enabled
    Power Suspend Enabled
    Turn Off Monitor after: (On AC Power) 20 min
    Turn Off Hard Disk after: (On AC Power) Never
    Suspend after: (On AC Power) Never
    Screen saver Enabled
    Uptime
    Current Session
    Current Time 9/4/2012 10:10:55 AM
    Current Uptime 91305 sec (1 d, 01 h, 21 m, 45 s)
    Last Boot Time 9/3/2012 8:49:10 AM
    Last ShutDown Time 8/30/2012 4:32:57 PM
    Uptime Statistics
    First Boot Time 7/30/2012 11:45:25 AM
    First Shutdown Time 7/30/2012 11:43:17 AM
    Total Uptime 1320501 sec (15 d, 06 h, 48 m, 21 s)
    Total Downtime 6518 sec (0 d, 01 h, 48 m, 38 s)
    Longest Uptime 343970 sec (3 d, 23 h, 32 m, 50 s)
    Longest Downtime 3684 sec (0 d, 01 h, 01 m, 24 s)
    Total Reboots 20
    System Availability 99.51%
    TimeZone
    TimeZone GMT -7 Hours
    Language English
    Country United States
    Currency $
    Date Format M/d/yyyy
    Time Format h:mm:ss tt
    Scheduler
    9/4/2012 10:23 AM; GoogleUpdateTaskMachineUA
    9/4/2012 10:38 AM; Adobe Flash Player Updater
    9/4/2012 11:08 AM; GoogleUpdateTaskUserS-1-5-21-1669438090-637224408-139502534-1000UA
    9/4/2012 12:08 PM; GoogleUpdateTaskUserS-1-5-21-1669438090-637224408-139502534-1000Core
    9/4/2012 12:23 PM; GoogleUpdateTaskMachineCore
    9/10/2012 8:50 AM; RealUpgradeScheduledTaskS-1-5-21-1669438090-637224408-139502534-1000
    RealUpgradeLogonTaskS-1-5-21-1669438090-637224408-139502534-1000
    win4036e0
    Your File Updater
    Process List
    aeadisrv.exe
    Process ID 2308
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\AEADISRV.EXE
    Memory Usage 4.06 MB
    Peak Memory Usage 4.06 MB
    applemobiledeviceservice.exe
    Process ID 2352
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
    Memory Usage 10 MB
    Peak Memory Usage 10 MB
    armsvc.exe
    Process ID 2296
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
    Memory Usage 4.81 MB
    Peak Memory Usage 4.85 MB
    assysctrlservice.exe
    Process ID 2392
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.02\AsSysCtrlService.exe
    Memory Usage 3.74 MB
    Peak Memory Usage 3.77 MB
    atieclxx.exe
    Process ID 1224
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\atieclxx.exe
    Memory Usage 7.61 MB
    Peak Memory Usage 7.64 MB
    atiesrxx.exe
    Process ID 972
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\atiesrxx.exe
    Memory Usage 4.81 MB
    Peak Memory Usage 4.81 MB
    audiodg.exe
    Process ID 540
    chrome.exe
    Process ID 2616
    User Main
    Domain Corei7
    Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
    Memory Usage 42 MB
    Peak Memory Usage 58 MB
    chrome.exe
    Process ID 2236
    User Main
    Domain Corei7
    Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
    Memory Usage 13 MB
    Peak Memory Usage 17 MB
    chrome.exe
    Process ID 3356
    User Main
    Domain Corei7
    Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
    Memory Usage 15 MB
    Peak Memory Usage 16 MB
    chrome.exe
    Process ID 1016
    User Main
    Domain Corei7
    Path C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
    Memory Usage 9.29 MB
    Peak Memory Usage 9.29 MB
    csrss.exe
    Process ID 536
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\csrss.exe
    Memory Usage 8.11 MB
    Peak Memory Usage 8.11 MB
    csrss.exe
    Process ID 620
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\csrss.exe
    Memory Usage 24 MB
    Peak Memory Usage 30 MB
    dvmexportservice.exe
    Process ID 2584
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\ASUS.SYS\CONFIG\DVMExportService.exe
    Memory Usage 5.15 MB
    Peak Memory Usage 5.64 MB
    explorer.exe
    Process ID 1852
    User Main
    Domain Corei7
    Path C:\Windows\explorer.exe
    Memory Usage 68 MB
    Peak Memory Usage 73 MB
    lsass.exe
    Process ID 668
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\lsass.exe
    Memory Usage 3.67 MB
    Peak Memory Usage 12 MB
    lsm.exe
    Process ID 676
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\lsm.exe
    Memory Usage 6.38 MB
    Peak Memory Usage 6.39 MB
    lssrvc.exe
    Process ID 2464
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Program Files (x86)\Common Files\LightScribe\LSSrvc.exe
    Memory Usage 5.15 MB
    Peak Memory Usage 5.18 MB
    mdnsresponder.exe
    Process ID 2416
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Program Files\Bonjour\mDNSResponder.exe
    Memory Usage 6.30 MB
    Peak Memory Usage 6.30 MB
    nbservice.exe
    Process ID 2640
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Program Files (x86)\Common Files\Nero\Nero BackItUp 4\NBService.exe
    Memory Usage 9.28 MB
    Peak Memory Usage 9.35 MB
    notepad.exe
    Process ID 4052
    User Main
    Domain Corei7
    Path C:\Windows\system32\NOTEPAD.EXE
    Memory Usage 6.73 MB
    Peak Memory Usage 6.73 MB
    sdwinsec.exe
    Process ID 3016
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Program Files (x86)\Spybot - Search & Destroy\SDWinSec.exe
    Memory Usage 18 MB
    Peak Memory Usage 18 MB
    searchfilterhost.exe
    Process ID 3740
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\SearchFilterHost.exe
    Memory Usage 11 MB
    Peak Memory Usage 11 MB
    searchindexer.exe
    Process ID 2888
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\SearchIndexer.exe
    Memory Usage 46 MB
    Peak Memory Usage 62 MB
    searchprotocolhost.exe
    Process ID 844
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\SearchProtocolHost.exe
    Memory Usage 14 MB
    Peak Memory Usage 14 MB
    services.exe
    Process ID 656
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\services.exe
    Memory Usage 9.51 MB
    Peak Memory Usage 9.70 MB
    slsvc.exe
    Process ID 868
    User NETWORK SERVICE
    Domain NT AUTHORITY
    Path C:\Windows\system32\SLsvc.exe
    Memory Usage 15 MB
    Peak Memory Usage 18 MB
    smss.exe
    Process ID 460
    User SYSTEM
    Domain NT AUTHORITY
    Path \SystemRoot\System32\smss.exe
    Memory Usage 1.24 MB
    Peak Memory Usage 1.24 MB
    speccy64.exe
    Process ID 3684
    User Main
    Domain Corei7
    Path C:\Program Files\Speccy\Speccy64.exe
    Memory Usage 48 MB
    Peak Memory Usage 48 MB
    splwow64.exe
    Process ID 3568
    User Main
    Domain Corei7
    Path C:\Windows\splwow64.exe
    Memory Usage 16 MB
    Peak Memory Usage 20 MB
    spoolsv.exe
    Process ID 1652
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\System32\spoolsv.exe
    Memory Usage 22 MB
    Peak Memory Usage 22 MB
    svchost.exe
    Process ID 2796
    User LOCAL SERVICE
    Domain NT AUTHORITY
    Path C:\Windows\system32\svchost.exe
    Memory Usage 10 MB
    Peak Memory Usage 11 MB
    svchost.exe
    Process ID 2868
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\System32\svchost.exe
    Memory Usage 3.67 MB
    Peak Memory Usage 3.71 MB
    svchost.exe
    Process ID 876
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\svchost.exe
    Memory Usage 8.91 MB
    Peak Memory Usage 9.02 MB
    svchost.exe
    Process ID 936
    User NETWORK SERVICE
    Domain NT AUTHORITY
    Path C:\Windows\system32\svchost.exe
    Memory Usage 12 MB
    Peak Memory Usage 12 MB
    svchost.exe
    Process ID 332
    User LOCAL SERVICE
    Domain NT AUTHORITY
    Path C:\Windows\System32\svchost.exe
    Memory Usage 23 MB
    Peak Memory Usage 23 MB
    svchost.exe
    Process ID 408
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\svchost.exe
    Memory Usage 165 MB
    Peak Memory Usage 923 MB
    svchost.exe
    Process ID 708
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\svchost.exe
    Memory Usage 8.59 MB
    Peak Memory Usage 8.59 MB
    svchost.exe
    Process ID 3476
    User LOCAL SERVICE
    Domain NT AUTHORITY
    Path C:\Windows\system32\svchost.exe
    Memory Usage 20 MB
    Peak Memory Usage 20 MB
    svchost.exe
    Process ID 1108
    User LOCAL SERVICE
    Domain NT AUTHORITY
    Path C:\Windows\system32\svchost.exe
    Memory Usage 22 MB
    Peak Memory Usage 22 MB
    svchost.exe
    Process ID 1240
    User NETWORK SERVICE
    Domain NT AUTHORITY
    Path C:\Windows\system32\svchost.exe
    Memory Usage 34 MB
    Peak Memory Usage 45 MB
    svchost.exe
    Process ID 1676
    User LOCAL SERVICE
    Domain NT AUTHORITY
    Path C:\Windows\system32\svchost.exe
    Memory Usage 25 MB
    Peak Memory Usage 107 MB
    svchost.exe
    Process ID 360
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\System32\svchost.exe
    Memory Usage 145 MB
    Peak Memory Usage 253 MB
    svchost.exe
    Process ID 2776
    User NETWORK SERVICE
    Domain NT AUTHORITY
    Path C:\Windows\system32\svchost.exe
    Memory Usage 7.04 MB
    Peak Memory Usage 7.18 MB
    system
    Process ID 4
    system idle process
    Process ID 0
    taskeng.exe
    Process ID 1956
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\taskeng.exe
    Memory Usage 8.36 MB
    Peak Memory Usage 9.03 MB
    taskeng.exe
    Process ID 2504
    User LOCAL SERVICE
    Domain NT AUTHORITY
    Path C:\Windows\system32\taskeng.exe
    Memory Usage 6.11 MB
    Peak Memory Usage 6.15 MB
    taskeng.exe
    Process ID 1912
    User Main
    Domain Corei7
    Path C:\Windows\system32\taskeng.exe
    Memory Usage 14 MB
    Peak Memory Usage 16 MB
    wininit.exe
    Process ID 608
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\wininit.exe
    Memory Usage 5.49 MB
    Peak Memory Usage 5.57 MB
    winlogon.exe
    Process ID 728
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\winlogon.exe
    Memory Usage 8.91 MB
    Peak Memory Usage 9.16 MB
    wmiadap.exe
    Process ID 3448
    User SYSTEM
    Domain NT AUTHORITY
    Path \\?\C:\Windows\system32\wbem\WMIADAP.EXE
    Memory Usage 6.26 MB
    Peak Memory Usage 6.26 MB
    wmiprvse.exe
    Process ID 2408
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\sysWOW64\wbem\wmiprvse.exe
    Memory Usage 23 MB
    Peak Memory Usage 26 MB
    wmiprvse.exe
    Process ID 3992
    User SYSTEM
    Domain NT AUTHORITY
    Path C:\Windows\system32\wbem\wmiprvse.exe
    Memory Usage 8.46 MB
    Peak Memory Usage 8.59 MB
    wmiprvse.exe
    Process ID 484
    User NETWORK SERVICE
    Domain NT AUTHORITY
    Path C:\Windows\system32\wbem\wmiprvse.exe
    Memory Usage 17 MB
    Peak Memory Usage 19 MB
    wmpnetwk.exe
    Process ID 3252
    User NETWORK SERVICE
    Domain NT AUTHORITY
    Path C:\Program Files\Windows Media Player\wmpnetwk.exe
    Memory Usage 37 MB
    Peak Memory Usage 37 MB
    wmpnscfg.exe
    Process ID 3092
    User Main
    Domain Corei7
    Path C:\Program Files\Windows Media Player\wmpnscfg.exe
    Memory Usage 7.54 MB
    Peak Memory Usage 7.57 MB
    wudfhost.exe
    Process ID 3024
    User LOCAL SERVICE
    Domain NT AUTHORITY
    Path C:\Windows\system32\WUDFHost.exe
    Memory Usage 7.12 MB
    Peak Memory Usage 7.13 MB
    Hotfixes
    9/4/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/4/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/4/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    9/4/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/4/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/4/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    9/4/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/4/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.415.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    9/4/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    9/4/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/4/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    9/4/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    9/4/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    9/3/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/3/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/3/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    9/3/2012 Western Digital Technologies - Other hardware - WD SES Device
    Western Digital Technologies Other hardware software update released
    in January, 2011
    9/3/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/3/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/3/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    9/3/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/3/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    9/3/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.203.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    9/3/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/3/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    9/3/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    9/3/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
     
  12. Grampz719

    Grampz719 Newcomer, in training Topic Starter Posts: 26

    Part 2 of 4

    9/2/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/2/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/2/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    9/2/2012 Western Digital Technologies - Other hardware - WD SES Device
    Western Digital Technologies Other hardware software update released
    in January, 2011
    9/2/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/2/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/2/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    9/2/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/2/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    9/2/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.203.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    9/2/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/2/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    9/2/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    9/2/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    9/1/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/1/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/1/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    9/1/2012 Western Digital Technologies - Other hardware - WD SES Device
    Western Digital Technologies Other hardware software update released
    in January, 2011
    9/1/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/1/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/1/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    9/1/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/1/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    9/1/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.203.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    9/1/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    9/1/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    9/1/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    9/1/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    8/31/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/31/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/31/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    8/31/2012 Western Digital Technologies - Other hardware - WD SES Device
    Western Digital Technologies Other hardware software update released
    in January, 2011
    8/31/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/31/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/31/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/31/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/31/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/31/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.203.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    8/31/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/31/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/31/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    8/31/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    8/31/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/31/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/31/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    8/31/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.1.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    8/31/2012 Western Digital Technologies - Other hardware - WD SES Device
    Western Digital Technologies Other hardware software update released
    in January, 2011
    8/31/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/31/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/31/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/31/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/31/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/31/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/31/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/31/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    8/31/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    8/30/2012 Western Digital Technologies - Other hardware - WD SES Device
    Western Digital Technologies Other hardware software update released
    in January, 2011
    8/30/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/30/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/30/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    8/30/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.1.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    8/30/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/30/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/30/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/30/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/30/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/30/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/30/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/30/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    8/30/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    8/29/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/29/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/29/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    8/29/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.1.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    8/29/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/29/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/29/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/29/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/29/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/29/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/29/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/29/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    8/29/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    8/28/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/28/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/28/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    8/28/2012 Definition Update for Windows Defender - KB915597 (Definition 1.135.1.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    8/28/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/28/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/28/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/28/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/28/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/28/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/28/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/28/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    8/28/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
  13. Grampz719

    Grampz719 Newcomer, in training Topic Starter Posts: 26

    Part 3 of 4

    8/27/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/27/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/27/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    8/27/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.277.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    8/27/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/27/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/27/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/27/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/27/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/27/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/27/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/27/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    8/27/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    8/27/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/27/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/27/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    8/27/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.277.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    8/27/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/27/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/27/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/27/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/27/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/27/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/27/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/27/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    8/27/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    8/26/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/26/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/26/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    8/26/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.277.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    8/26/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/26/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/26/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/26/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/26/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/26/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/26/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/26/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    8/26/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    8/25/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/25/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/25/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    8/25/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.277.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    8/25/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/25/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/25/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/25/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/25/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/25/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/25/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/25/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    8/25/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    8/24/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/24/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/24/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    8/24/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.277.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    8/24/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/24/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/24/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/24/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/24/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/24/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/24/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/24/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    8/24/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    8/23/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/23/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/23/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    8/23/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/23/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/23/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/23/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.47.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    8/23/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/23/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/23/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/23/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/23/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    8/23/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    8/22/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/22/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/22/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    8/22/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/22/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/22/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/22/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.47.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    8/22/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/22/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/22/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/22/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/22/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    8/22/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
  14. Grampz719

    Grampz719 Newcomer, in training Topic Starter Posts: 26

    3 of 4

    8/21/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/21/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/21/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    8/21/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/21/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/21/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/21/2012 Definition Update for Windows Defender - KB915597 (Definition 1.133.47.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    8/21/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/21/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/21/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/21/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/21/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    8/21/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    8/21/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/21/2012 Definition Update for Windows Defender - KB915597 (Definition 1.131.2244.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    8/21/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/21/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    8/21/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/21/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/21/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/21/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/21/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/21/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/21/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/21/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    8/21/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    8/20/2012 Security Update for Microsoft Office 2007 suites (KB2596856)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/20/2012 Definition Update for Windows Defender - KB915597 (Definition 1.131.2244.0)
    Install this update to revise the definition files used to detect
    spyware and other potentially unwanted software. Once you have
    installed this item, it cannot be removed.
    8/20/2012 Security Update for Microsoft Office 2003 (KB2687323)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/20/2012 Cumulative Security Update for Internet Explorer 9 for Windows Vista for x64-based Systems (KB2722913)
    Security issues have been identified that could allow an attacker
    to compromise a system that is running Microsoft Internet Explorer
    and gain control over it. You can help protect your system by
    installing this update from Microsoft. After you install this
    item, you may have to restart your computer.
    8/20/2012 Security Update for Microsoft Office 2007 suites (KB2687441)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/20/2012 Security Update for Microsoft Office 2007 suites (KB2596754)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/20/2012 Security Update for Windows Vista for x64-based Systems (KB2731847)
    A security issue has been identified that could allow an authenticated
    local attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/20/2012 Security Update for Microsoft Office 2003 (KB2687324)
    A security vulnerability exists in Microsoft Office 2003 that
    could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/20/2012 Security Update for Windows Vista for x64-based Systems (KB2712808)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/20/2012 Security Update for Microsoft Office 2007 suites (KB2596615)
    A security vulnerability exists in Microsoft Office 2007 suites
    that could allow arbitrary code to run when a maliciously modified
    file is opened. This update resolves that vulnerability.
    8/20/2012 Security Update for Windows Vista for x64-based Systems (KB2705219)
    A security issue has been identified that could allow an unauthenticated
    remote attacker to compromise your system and gain control over
    it. You can help protect your system by installing this update
    from Microsoft. After you install this update, you may have to
    restart your system.
    8/20/2012 Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2687400)
    This update provides the Junk E-mail Filter in Microsoft Office
    Outlook 2007 Junk Email Filter with a more current definition
    of which e-mail messages should be considered junk e-mail.
    8/20/2012 Windows Malicious Software Removal Tool x64 - August 2012 (KB890830)
    After the download, this tool runs one time to check your computer
    for infection by specific, prevalent malicious software (including
    Blaster, Sasser, and Mydoom) and helps remove any infection that
    is found. If an infection is found, the tool will display a status
    report the next time that you start your computer. A new version
    of the tool will be offered every month. If you want to manually
    run the tool on your computer, you can download a copy from the
    Microsoft Download Center, or you can run an online version from
    microsoft.com. This tool is not a replacement for an antivirus
    product. To help protect your computer, you should use an antivirus
    product.
    System Folders
    Path for burning CD C:\Users\Main\AppData\Local\Microsoft\Windows\Burn\Burn1
    Application Data C:\ProgramData
    Public Desktop C:\Users\Public\Desktop
    Documents C:\Users\Public\Documents
    Global Favorites C:\Users\Main\Favorites
    Music C:\Users\Public\Music
    Pictures C:\Users\Public\Pictures
    Start Menu Programs C:\ProgramData\Microsoft\Windows\Start Menu\Programs
    Start Menu C:\ProgramData\Microsoft\Windows\Start Menu
    Startup C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup
    Templates C:\ProgramData\Microsoft\Windows\Templates
    Videos C:\Users\Public\Videos
    Cookies C:\Users\Main\AppData\Roaming\Microsoft\Windows\Cookies
    Desktop C:\Users\Main\Desktop
    Physical Desktop C:\Users\Main\Desktop
    User Favorites C:\Users\Main\Favorites
    Fonts C:\Windows\Fonts
    Internet History C:\Users\Main\AppData\Local\Microsoft\Windows\History
    Temporary Internet Files C:\Users\Main\AppData\Local\Microsoft\Windows\Temporary Internet Files
    Local Application Data C:\Users\Main\AppData\Local
    Windows directory C:\Windows
    Windows/System C:\Windows\system32
    Program Files C:\Program Files
    Security Options
    Accounts: Administrator account status Disabled
    Accounts: Guest account status Enabled
    Accounts: Limit local account use of blank passwords to console logon only Enabled
    Accounts: Rename administrator account Administrator
    Accounts: Rename guest account Guest
    Audit: Audit the access of global system objects Disabled
    Audit: Audit the use of Backup and Restore privilege Disabled
    Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings Not Defined
    Audit: Shut down system immediately if unable to log security audits Disabled
    DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax Not Defined
    DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax Not Defined
    Devices: Allow undock without having to log on Enabled
    Devices: Allowed to format and eject removable media Not Defined
    Devices: Prevent users from installing printer drivers Disabled
    Devices: Restrict CD-ROM access to locally logged-on user only Not Defined
    Devices: Restrict floppy access to locally logged-on user only Not Defined
    Domain controller: Allow server operators to schedule tasks Not Defined
    Domain controller: LDAP server signing requirements Not Defined
    Domain controller: Refuse machine account password changes Not Defined
    Domain member: Digitally encrypt or sign secure channel data (always) Enabled
    Domain member: Digitally encrypt secure channel data (when possible) Enabled
    Domain member: Digitally sign secure channel data (when possible) Enabled
    Domain member: Disable machine account password changes Disabled
    Domain member: Maximum machine account password age 30 days
    Domain member: Require strong (Windows 2000 or later) session key Disabled
    Interactive logon: Do not display last user name Disabled
    Interactive logon: Do not require CTRL+ALT+DEL Not Defined
    Interactive logon: Message text for users attempting to log on Not Defined
    Interactive logon: Message title for users attempting to log on
    Interactive logon: Number of previous logons to cache (in case domain controller is not available) 10 logons
    Interactive logon: Prompt user to change password before expiration 14 days
    Interactive logon: Require Domain Controller authentication to unlock workstation Disabled
    Interactive logon: Require smart card Disabled
    Interactive logon: Smart card removal behavior No Action
    Microsoft network client: Digitally sign communications (always) Disabled
    Microsoft network client: Digitally sign communications (if server agrees) Enabled
    Microsoft network client: Send unencrypted password to third-party SMB servers Disabled
    Microsoft network server: Amount of idle time required before suspending session 15 minutes
    Microsoft network server: Digitally sign communications (always) Disabled
    Microsoft network server: Digitally sign communications (if client agrees) Disabled
    Microsoft network server: Disconnect clients when logon hours expire Enabled
    Network access: Allow anonymous SID/Name translation Disabled
    Network access: Do not allow anonymous enumeration of SAM accounts Enabled
    Network access: Do not allow anonymous enumeration of SAM accounts and shares Disabled
    Network access: Do not allow storage of credentials or .NET Passports for network authentication Disabled
    Network access: Let Everyone permissions apply to anonymous users Disabled
    Network access: Named Pipes that can be accessed anonymously netlogon,lsarpc,samr,browser
    Network access: Remotely accessible registry paths System\CurrentControlSet\Control\ProductOptions,System\CurrentControlSet\Control\Server Applications,Software\Microsoft\Windows NT\CurrentVersion
    Network access: Remotely accessible registry paths and sub-paths System\CurrentControlSet\Control\Print\Printers,System\CurrentControlSet\Services\Eventlog,Software\Microsoft\OLAP Server,Software\Microsoft\Windows NT\CurrentVersion\Print,Software\Microsoft\Windows NT\CurrentVersion\Windows,System\CurrentControlSet\Control\ContentIndex,System\CurrentControlSet\Control\Terminal Server,System\CurrentControlSet\Control\Terminal Server\UserConfig,System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration,Software\Microsoft\Windows NT\CurrentVersion\Perflib,System\CurrentControlSet\Services\SysmonLog
    Network access: Restrict anonymous access to Named Pipes and Shares Enabled
    Network access: Shares that can be accessed anonymously Not Defined
    Network access: Sharing and security model for local accounts Classic - local users authenticate as themselves
    Network security: Do not store LAN Manager hash value on next password change Enabled
    Network security: Force logoff when logon hours expire Disabled
    Network security: LAN Manager authentication level Send NTLMv2 response only
    Network security: LDAP client signing requirements Negotiate signing
    Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
    Network security: Minimum session security for NTLM SSP based (including secure RPC) servers
    Recovery console: Allow automatic administrative logon Disabled
    Recovery console: Allow floppy copy and access to all drives and all folders Disabled
    Shutdown: Allow system to be shut down without having to log on Enabled
    Shutdown: Clear virtual memory pagefile Disabled
    System cryptography: Force strong key protection for user keys stored on the computer Not Defined
    System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing Disabled
    System objects: Require case insensitivity for non-Windows subsystems Not Defined
    System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) Enabled
    System settings: Optional subsystems Posix
    System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies Disabled
    User Account Control: Admin Approval Mode for the Built-in Administrator account Disabled
    User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop Disabled
    User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode Prompt for consent
    User Account Control: Behavior of the elevation prompt for standard users Prompt for credentials
    User Account Control: Detect application installations and prompt for elevation Enabled
    User Account Control: Only elevate executables that are signed and validated Disabled
    User Account Control: Only elevate UIAccess applications that are installed in secure locations Enabled
    User Account Control: Run all administrators in Admin Approval Mode Disabled
    User Account Control: Switch to the secure desktop when prompting for elevation Enabled
    User Account Control: Virtualize file and registry write failures to per-user locations Enabled
    Services
    Running Adobe Acrobat Update Service
    Running AMD External Events Utility
    Running Andrea ADI Filters Service
    Running Apple Mobile Device
    Running Application Experience
    Running ASUS System Control Service
    Running Base Filtering Engine
    Running Bonjour Service
    Running COM+ Event System
    Running Computer Browser
    Running Cryptographic Services
    Running DCOM Server Process Launcher
    Running Desktop Window Manager Session Manager
    Running DHCP Client
    Running Diagnostic Policy Service
    Running Diagnostic System Host
    Running Distributed Link Tracking Client
    Running DNS Client
    Running DVM Meta Data Export Service
    Running Function Discovery Provider Host
    Running Function Discovery Resource Publication
    Running Group Policy Client
    Running Human Interface Device Access
    Running IKE and AuthIP IPsec Keying Modules
    Running IP Helper
    Running IPsec Policy Agent
    Running KtmRm for Distributed Transaction Coordinator
    Running LightScribeService Direct Disc Labeling Service
    Running Multimedia Class Scheduler
    Running Nero BackItUp Scheduler 4.0
    Running Network Connections
    Running Network List Service
    Running Network Location Awareness
    Running Network Store Interface Service
    Running Offline Files
    Running Peer Name Resolution Protocol
    Running Peer Networking Identity Manager
    Running Plug and Play
    Running Portable Device Enumerator Service
    Running Print Spooler
    Running Program Compatibility Assistant Service
    Running ReadyBoost
    Running Remote Access Connection Manager
    Running Remote Procedure Call (RPC)
    Running SBSD Security Center Service
    Running Secondary Logon
    Running Secure Socket Tunneling Protocol Service
    Running Security Accounts Manager
    Running Security Center
    Running Server
    Running Shell Hardware Detection
    Running Software Licensing
    Running SSDP Discovery
    Running Superfetch
    Running System Event Notification Service
    Running Tablet PC Input Service
    Running Task Scheduler
    Running TCP/IP NetBIOS Helper
    Running Telephony
    Running Terminal Services
    Running Themes
    Running UPnP Device Host
    Running User Profile Service
    Running WebClient
    Running Windows Audio
    Running Windows Audio Endpoint Builder
    Running Windows Driver Foundation - User-mode Driver Framework
    Running Windows Error Reporting Service
    Running Windows Event Log
    Running Windows Firewall
    Running Windows Font Cache Service
    Running Windows Image Acquisition (WIA)
    Running Windows Management Instrumentation
    Running Windows Media Player Network Sharing Service
    Running Windows Search
    Running Windows Time
    Running Windows Update
    Running Workstation
    Stopped Adobe Flash Player Update Service
    Stopped Application Information
    Stopped Application Layer Gateway Service
    Stopped Application Management
    Stopped Block Level Backup Engine Service
    Stopped Certificate Propagation
    Stopped CNG Key Isolation
    Stopped COM+ System Application
    Stopped DFS Replication
    Stopped Diagnostic Service Host
    Stopped Distributed Transaction Coordinator
    Stopped Extensible Authentication Protocol
    Stopped Fax
    Stopped Google Update Service (gupdate)
    Stopped Google Update Service (gupdatem)
    Stopped GoToAssist
    Stopped Health Key and Certificate Management
    Stopped Interactive Services Detection
    Stopped Internet Connection Sharing (ICS)
    Stopped iPod Service
    Stopped Link-Layer Topology Discovery Mapper
    Stopped Microsoft .NET Framework NGEN v2.0.50727_X64
    Stopped Microsoft .NET Framework NGEN v2.0.50727_X86
    Stopped Microsoft .NET Framework NGEN v4.0.30319_X64
    Stopped Microsoft .NET Framework NGEN v4.0.30319_X86
    Stopped Microsoft iSCSI Initiator Service
    Stopped Microsoft Office Diagnostics Service
    Stopped Microsoft Office Groove Audit Service
    Stopped Microsoft Software Shadow Copy Provider
    Stopped Mozilla Maintenance Service
    Stopped Net Driver HPZ12
    Stopped Net.Tcp Port Sharing Service
    Stopped Netlogon
    Stopped Network Access Protection Agent
    Stopped Norton Internet Security
    Stopped Office Source Engine
    Stopped Parental Controls
    Stopped Peer Networking Grouping
    Stopped Performance Counter DLL Host
    Stopped Performance Logs & Alerts
    Stopped Pml Driver HPZ12
    Stopped PnP-X IP Bus Enumerator
    Stopped PNRP Machine Name Publication Service
    Stopped Problem Reports and Solutions Control Panel Support
    Stopped Protected Storage
    Stopped Quality Windows Audio Video Experience
    Stopped Remote Access Auto Connection Manager
    Stopped Remote Procedure Call (RPC) Locator
    Stopped Remote Registry
    Stopped Removable Storage
    Stopped Routing and Remote Access
    Stopped SL UI Notification Service
    Stopped Smart Card
    Stopped Smart Card Removal Policy
    Stopped SNMP Trap
    Stopped Terminal Services Configuration
    Stopped Terminal Services UserMode Port Redirector
    Stopped Thread Ordering Server
    Stopped TPM Base Services
    Stopped Virtual Disk
    Stopped Volume Shadow Copy
    Stopped Windows Backup
    Stopped Windows CardSpace
    Stopped Windows Color System
    Stopped Windows Connect Now - Config Registrar
    Stopped Windows Defender
    Stopped Windows Event Collector
    Stopped Windows Installer
    Stopped Windows Media Center Extender Service
    Stopped Windows Media Center Receiver Service
    Stopped Windows Media Center Scheduler Service
    Stopped Windows Media Center Service Launcher
    Stopped Windows Modules Installer
    Stopped Windows Presentation Foundation Font Cache 3.0.0.0
    Stopped Windows Presentation Foundation Font Cache 4.0.0.0
    Stopped Windows Remote Management (WS-Management)
    Stopped WinHTTP Web Proxy Auto-Discovery Service
    Stopped Wired AutoConfig
    Stopped WLAN AutoConfig
    Stopped WMI Performance Adapter
  15. Grampz719

    Grampz719 Newcomer, in training Topic Starter Posts: 26

    4 of 4
    Device Tree
    ACPI x64-based PC
    Microsoft ACPI-Compliant System
    Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
    Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
    Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
    Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
    Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
    Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
    Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
    Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
    System board
    ACPI Power Button
    ACPI Fixed Feature Button
    PCI bus
    Intel(R) 5520/5500/X58 I/O Hub to ESI Port - 3405
    Intel(R) 5520/5500/X58 I/O Hub PCI Express Root Port 1 - 3408
    Intel(R) 5520/5500/X58 I/O Hub PCI Express Root Port 7 - 340E
    Intel(R) 5520/5500/X58 I/O Hub System Management Registers - 342E
    Intel(R) 5520/5500/X58 I/O Hub GPIO and Scratch Pad Registers - 3422
    Intel(R) 5520/5500/X58 I/O Hub Control Status and RAS Registers - 3423
    Intel(R) 5520/5500/X58 I/O Hub Throttle Registers - 3438
    Intel(R) ICH10 Family PCI Express Root Port 1 - 3A40
    Intel(R) ICH10 Family SMBus Controller - 3A30
    System board
    Motherboard resources
    Microsoft Windows Management Interface for ACPI
    Intel(R) 5520/5500/X58 I/O Hub PCI Express Root Port 3 - 340A
    ATI Radeon HD 4800 Series
    HP w2007 Wide LCD Monitor
    Dell D1025TM
    High Definition Audio Controller
    AMD High Definition Audio Device
    Intel(R) ICH10 Family USB Universal Host Controller - 3A37
    USB Root Hub
    Intel(R) ICH10 Family USB Universal Host Controller - 3A38
    USB Root Hub
    Intel(R) ICH10 Family USB Universal Host Controller - 3A39
    USB Root Hub
    Intel(R) ICH10 Family USB Enhanced Host Controller - 3A3C
    USB Root Hub
    Apple Mobile Device USB Driver
    USB Mass Storage Device
    Apple iPod USB Device
    Generic USB Hub
    USB Mass Storage Device
    Generic USB SD Reader USB Device
    Generic USB CF Reader USB Device
    Generic USB xD/SM Reader USB Device
    Generic USB MS Reader USB Device
    USB Mass Storage Device
    SWISSBIT Victorinox 2.0 USB Device
    High Definition Audio Controller
    SoundMAX Integrated Digital HD Audio
    Intel(R) ICH10 Family PCI Express Root Port 3 - 3A44
    Marvell Yukon 88E8056 PCI-E Gigabit Ethernet Controller
    Intel(R) ICH10 Family PCI Express Root Port 5 - 3A48
    Marvell 61xx RAID Controller
    Marvell Virtual Device
    Intel(R) ICH10 Family PCI Express Root Port 6 - 3A4A
    Marvell Yukon 88E8056 PCI-E Gigabit Ethernet Controller #2
    Intel(R) ICH10 Family USB Universal Host Controller - 3A34
    USB Root Hub
    Generic USB Hub
    USB Composite Device
    USB Human Interface Device
    HID Keyboard Device
    USB Human Interface Device
    HID-compliant consumer control device
    Microsoft USB IntelliMouse Optical
    Microsoft USB IntelliMouse Optical
    Intel(R) ICH10 Family USB Universal Host Controller - 3A35
    USB Root Hub
    Intel(R) ICH10 Family USB Universal Host Controller - 3A36
    USB Root Hub
    Intel(R) ICH10 Family USB Enhanced Host Controller - 3A3A
    USB Root Hub
    Intel(R) 82801 PCI Bridge - 244E
    VIA OHCI Compliant IEEE 1394 Host Controller
    Intel(R) ICH10R LPC Interface Controller - 3A16
    Programmable interrupt controller
    Direct memory access controller
    System timer
    System CMOS/real time clock
    System speaker
    Numeric data processor
    Motherboard resources
    Motherboard resources
    ATK0110 ACPI UTILITY
    High precision event timer
    Intel(R) 82802 Firmware Hub Device
    Motherboard resources
    Motherboard resources
    Intel(R) ICH10 Family 4 port Serial ATA Storage Controller 1 - 3A20
    IDE Channel
    PLEXTOR DVDR PX-880SA ATA Device
    IDE Channel
    ST31500341AS ATA Device
    Intel(R) ICH10 Family 2 port Serial ATA Storage Controller 2 - 3A26
    IDE Channel
    IDE Channel
    CPU
    Intel Core i7 920
    Cores 4
    Threads 8
    Name Intel Core i7 920
    Code Name Bloomfield
    Package Socket 1366 LGA
    Technology 45nm
    Specification Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz
    Family 6
    Extended Family 6
    Model A
    Extended Model 1A
    Stepping 4
    Revision C0/C1
    Instructions MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, Intel 64
    Virtualization Supported, Enabled
    Hyperthreading Supported, Enabled
    Fan Speed 1534 RPM
    Bus Speed 133.6 MHz
    Rated Bus Speed 2405.4 MHz
    Stock Core Speed 2666 MHz
    Stock Bus Speed 133 MHz
    Average Temperature 33 °C
    Caches
    L1 Data Cache Size 4 x 32 KBytes
    L1 Instructions Cache Size 4 x 32 KBytes
    L2 Unified Cache Size 4 x 256 KBytes
    L3 Unified Cache Size 8192 KBytes
    Core 0
    Core Speed 1603.6 MHz
    Multiplier x 12.0
    Bus Speed 133.6 MHz
    Rated Bus Speed 2405.4 MHz
    Temperature 34 °C
    Thread 1
    APIC ID 0
    Thread 2
    APIC ID 1
    Core 1
    Core Speed 1603.6 MHz
    Multiplier x 12.0
    Bus Speed 133.6 MHz
    Rated Bus Speed 2405.4 MHz
    Temperature 30 °C
    Thread 1
    APIC ID 2
    Thread 2
    APIC ID 3
    Core 2
    Core Speed 1603.6 MHz
    Multiplier x 12.0
    Bus Speed 133.6 MHz
    Rated Bus Speed 2405.4 MHz
    Temperature 36 °C
    Thread 1
    APIC ID 4
    Thread 2
    APIC ID 5
    Core 3
    Core Speed 1603.6 MHz
    Multiplier x 12.0
    Bus Speed 133.6 MHz
    Rated Bus Speed 2405.4 MHz
    Temperature 31 °C
    Thread 1
    APIC ID 6
    Thread 2
    APIC ID 7
    RAM
    Memory slots
    Total memory slots 6
    Used memory slots 3
    Free memory slots 3
    Memory
    Type DDR3
    Size 6144 MBytes
    Channels # Triple
    DRAM Frequency 534.5 MHz
    CAS# Latency (CL) 8 clocks
    RAS# to CAS# Delay (tRCD) 8 clocks
    RAS# Precharge (tRP) 8 clocks
    Cycle Time (tRAS) 20 clocks
    Command Rate (CR) 1T
    Physical Memory
    Memory Usage 33 %
    Total Physical 5.99 GB
    Available Physical 4.00 GB
    Total Virtual 12 GB
    Available Virtual 10 GB
    SPD
    Number Of SPD Modules 3
    Slot #1
    Type DDR3
    Size 2048 MBytes
    Manufacturer Corsair
    Max Bandwidth PC3-10700H (667 MHz)
    Part Number CM3X2G1600C8
    Week/year 12 / 09
    SPD Ext. EPP
    XMP--2
    Frequency
    JEDEC #3
    Frequency 666.7 MHz
    CAS# Latency 9.0
    RAS# To CAS# 9
    RAS# Precharge 9
    tRAS 24
    tRC 34
    Voltage 1.500 V
    JEDEC #2
    Frequency 592.6 MHz
    CAS# Latency 8.0
    RAS# To CAS# 8
    RAS# Precharge 8
    tRAS 22
    tRC 30
    Voltage 1.500 V
    JEDEC #1
    Frequency 444.4 MHz
    CAS# Latency 6.0
    RAS# To CAS# 6
    RAS# Precharge 6
    tRAS 16
    tRC 23
    Voltage 1.500 V
    Slot #2
    Type DDR3
    Size 2048 MBytes
    Manufacturer Corsair
    Max Bandwidth PC3-10700H (667 MHz)
    Part Number CM3X2G1600C8
    Week/year 12 / 09
    SPD Ext. EPP
    XMP--2
    Frequency
    JEDEC #3
    Frequency 666.7 MHz
    CAS# Latency 9.0
    RAS# To CAS# 9
    RAS# Precharge 9
    tRAS 24
    tRC 34
    Voltage 1.500 V
    JEDEC #2
    Frequency 592.6 MHz
    CAS# Latency 8.0
    RAS# To CAS# 8
    RAS# Precharge 8
    tRAS 22
    tRC 30
    Voltage 1.500 V
    JEDEC #1
    Frequency 444.4 MHz
    CAS# Latency 6.0
    RAS# To CAS# 6
    RAS# Precharge 6
    tRAS 16
    tRC 23
    Voltage 1.500 V
    Slot #3
    Type DDR3
    Size 2048 MBytes
    Manufacturer Corsair
    Max Bandwidth PC3-10700H (667 MHz)
    Part Number CM3X2G1600C8
    Week/year 12 / 09
    SPD Ext. EPP
    XMP--2
    Frequency
    JEDEC #3
    Frequency 666.7 MHz
    CAS# Latency 9.0
    RAS# To CAS# 9
    RAS# Precharge 9
    tRAS 24
    tRC 34
    Voltage 1.500 V
    JEDEC #2
    Frequency 592.6 MHz
    CAS# Latency 8.0
    RAS# To CAS# 8
    RAS# Precharge 8
    tRAS 22
    tRC 30
    Voltage 1.500 V
    JEDEC #1
    Frequency 444.4 MHz
    CAS# Latency 6.0
    RAS# To CAS# 6
    RAS# Precharge 6
    tRAS 16
    tRC 23
    Voltage 1.500 V
    Motherboard
    Manufacturer ASUSTeK Computer INC.
    Model P6TD DELUXE (LGA1366)
    Version System Version
    Chipset Vendor Intel
    Chipset Model X58
    Chipset Revision 13
    Southbridge Vendor Intel
    Southbridge Model 82801JR (ICH10R)
    Southbridge Revision 00
    System Temperature 42 °C
    BIOS
    Brand American Megatrends Inc.
    Version 0106
    Date 07/15/2009
    Voltage
    CPU CORE 1.040 V
    MEMORY CONTROLLER 1.720 V
    +3.3V 3.280 V
    +5V 4.872 V
    +12V 11.821 V
    VIN6 1.920 V
    PCI Data
    Slot PCI-E
    Slot Type PCI-E
    Slot Usage Available
    Bus Width 32 bit
    Slot Designation PCIEX4_1
    Slot Number 0
    Slot PCI-E
    Slot Type PCI-E
    Slot Usage In Use
    Bus Width 32 bit
    Slot Designation PCIEX16_1
    Slot Number 1
    Slot PCI
    Slot Type PCI
    Slot Usage Available
    Bus Width 32 bit
    Slot Designation PCI1
    Slot Number 2
    Slot PCI
    Slot Type PCI
    Slot Usage Available
    Bus Width 32 bit
    Slot Designation PCI2
    Slot Number 3
    Slot PCI-E
    Slot Type PCI-E
    Slot Usage Available
    Bus Width 32 bit
    Slot Designation PCIEX16_2
    Slot Number 4
    Slot PCI-E
    Slot Type PCI-E
    Slot Usage Available
    Bus Width 32 bit
    Slot Designation PCIEX16_3
    Slot Number 5
    Graphics
    Monitor
    Name DELL D1025TM on ATI Radeon HD 4800 Series
    Current Resolution 1600x1200 pixels
    Work Resolution 1600x1200 pixels
    State enabled, primary, output devices support
    Monitor Width 1600
    Monitor Height 1200
    Monitor BPP 32 bits per pixel
    Monitor Frequency 65 Hz
    Device \\.\DISPLAY1\Monitor0
    Name HP w2007 on ATI Radeon HD 4800 Series
    Current Resolution 1050x1680 pixels
    Work Resolution 1050x1650 pixels
    State enabled
    Monitor Width 1050
    Monitor Height 1680
    Monitor BPP 32 bits per pixel
    Monitor Frequency 60 Hz
    Device \\.\DISPLAY2\Monitor0
    ATI Radeon HD 4800 Series
    GPU RV770
    Device ID 1002-9440
    Subvendor VISIONTEK (1545)
    Current Performance Level Level 1
    Voltage 1.263 V
    Technology 56 nm
    Die Size 256 nm?
    Transistors 956 M
    Release Date Jun 25, 2008
    DirectX Support 10.1
    DirectX Shader Model 4.1
    OpenGL Support 3.0
    Bios Core Clock 750.00
    Bios Mem Clock 900.00
    Temperature 60 °C
    Core Voltage 1.263 V
    BIOS Version 113-AA48709075.24V
    ROPs 16
    Shaders 800 unified
    Memory Type GDDR5
    Bus Width 32x8 (256 bit)
    Pixel Fillrate 12.0 GPixels/s
    Texture Fillrate 30.0 GTexels/s
    Bandwidth 57.6 GB/s
    Noise Level Moderate
    Max Power Draw 150 Watts
    Count of performance levels : 1
    Level 1
    OpenGL
    Version 3.3.10750 Compatibility Profile Context
    Vendor ATI Technologies Inc.
    Renderer ATI Radeon HD 4800 Series
    GLU Version 1.2.2.0 Microsoft Corporation
    Values
    GL_MAX_LIGHTS 8
    GL_MAX_TEXTURE_SIZE 8192
    GL_MAX_TEXTURE_STACK_DEPTH 10
    GL Extensions
    GL_AMDX_debug_output
    GL_AMDX_vertex_shader_tessellator
    GL_AMD_conservative_depth
    GL_AMD_debug_output
    GL_AMD_depth_clamp_separate
    GL_AMD_draw_buffers_blend
    GL_AMD_name_gen_delete
    GL_AMD_performance_monitor
    GL_AMD_sample_positions
    GL_AMD_seamless_cubemap_per_texture
    GL_AMD_shader_stencil_export
    GL_AMD_texture_cube_map_array
    GL_AMD_texture_texture4
    GL_AMD_vertex_shader_tessellator
    GL_ARB_ES2_compatibility
    GL_ARB_blend_func_extended
    GL_ARB_color_buffer_float
    GL_ARB_copy_buffer
    GL_ARB_depth_buffer_float
    GL_ARB_depth_clamp
    GL_ARB_depth_texture
    GL_ARB_draw_buffers
    GL_ARB_draw_buffers_blend
    GL_ARB_draw_elements_base_vertex
    GL_ARB_draw_instanced
    GL_ARB_explicit_attrib_location
    GL_ARB_fragment_coord_conventions
    GL_ARB_fragment_program
    GL_ARB_fragment_program_shadow
    GL_ARB_fragment_shader
    GL_ARB_framebuffer_object
    GL_ARB_framebuffer_sRGB
    GL_ARB_geometry_shader4
    GL_ARB_get_program_binary
    GL_ARB_half_float_pixel
    GL_ARB_half_float_vertex
    GL_ARB_imaging
    GL_ARB_instanced_arrays
    GL_ARB_map_buffer_range
    GL_ARB_multisample
    GL_ARB_multitexture
    GL_ARB_occlusion_query
    GL_ARB_occlusion_query2
    GL_ARB_pixel_buffer_object
    GL_ARB_point_parameters
    GL_ARB_point_sprite
    GL_ARB_provoking_vertex
    GL_ARB_sample_shading
    GL_ARB_sampler_objects
    GL_ARB_seamless_cube_map
    GL_ARB_separate_shader_objects
    GL_ARB_shader_bit_encoding
    GL_ARB_shader_objects
    GL_ARB_shader_precision
    GL_ARB_shader_stencil_export
    GL_ARB_shader_texture_lod
    GL_ARB_shading_language_100
    GL_ARB_shadow
    GL_ARB_shadow_ambient
    GL_ARB_sync
    GL_ARB_texture_border_clamp
    GL_ARB_texture_buffer_object
    GL_ARB_texture_buffer_object_rgb32
    GL_ARB_texture_compression
    GL_ARB_texture_compression_rgtc
    GL_ARB_texture_cube_map
    GL_ARB_texture_cube_map_array
    GL_ARB_texture_env_add
    GL_ARB_texture_env_combine
    GL_ARB_texture_env_crossbar
    GL_ARB_texture_env_dot3
    GL_ARB_texture_float
    GL_ARB_texture_gather
    GL_ARB_texture_mirrored_repeat
    GL_ARB_texture_multisample
    GL_ARB_texture_non_power_of_two
    GL_ARB_texture_query_lod
    GL_ARB_texture_rectangle
    GL_ARB_texture_rg
    GL_ARB_texture_rgb10_a2ui
    GL_ARB_texture_snorm
    GL_ARB_timer_query
    GL_ARB_transform_feedback2
    GL_ARB_transform_feedback3
    GL_ARB_transpose_matrix
    GL_ARB_uniform_buffer_object
    GL_ARB_vertex_array_bgra
    GL_ARB_vertex_array_object
    GL_ARB_vertex_buffer_object
    GL_ARB_vertex_program
    GL_ARB_vertex_shader
    GL_ARB_vertex_type_2_10_10_10_rev
    GL_ARB_viewport_array
    GL_ARB_window_pos
    GL_ATI_draw_buffers
    GL_ATI_envmap_bumpmap
    GL_ATI_fragment_shader
    GL_ATI_meminfo
    GL_ATI_separate_stencil
    GL_ATI_texture_compression_3dc
    GL_ATI_texture_env_combine3
    GL_ATI_texture_float
    GL_ATI_texture_mirror_once
    GL_EXT_abgr
    GL_EXT_bgra
    GL_EXT_bindable_uniform
    GL_EXT_blend_color
    GL_EXT_blend_equation_separate
    GL_EXT_blend_func_separate
    GL_EXT_blend_minmax
    GL_EXT_blend_subtract
    GL_EXT_compiled_vertex_array
    GL_EXT_copy_buffer
    GL_EXT_copy_texture
    GL_EXT_direct_state_access
    GL_EXT_draw_buffers2
    GL_EXT_draw_instanced
    GL_EXT_draw_range_elements
    GL_EXT_fog_coord
    GL_EXT_framebuffer_blit
    GL_EXT_framebuffer_multisample
    GL_EXT_framebuffer_object
    GL_EXT_framebuffer_sRGB
    GL_EXT_geometry_shader4
    GL_EXT_gpu_program_parameters
    GL_EXT_gpu_shader4
    GL_EXT_histogram
    GL_EXT_multi_draw_arrays
    GL_EXT_packed_depth_stencil
    GL_EXT_packed_float
    GL_EXT_packed_pixels
    GL_EXT_pixel_buffer_object
    GL_EXT_point_parameters
    GL_EXT_provoking_vertex
    GL_EXT_rescale_normal
    GL_EXT_secondary_color
    GL_EXT_separate_specular_color
    GL_EXT_shadow_funcs
    GL_EXT_stencil_wrap
    GL_EXT_subtexture
    GL_EXT_texgen_reflection
    GL_EXT_texture3D
    GL_EXT_texture_array
    GL_EXT_texture_buffer_object
    GL_EXT_texture_compression_latc
    GL_EXT_texture_compression_rgtc
    GL_EXT_texture_compression_s3tc
    GL_EXT_texture_cube_map
    GL_EXT_texture_edge_clamp
    GL_EXT_texture_env_add
    GL_EXT_texture_env_combine
    GL_EXT_texture_env_dot3
    GL_EXT_texture_filter_anisotropic
    GL_EXT_texture_integer
    GL_EXT_texture_lod
    GL_EXT_texture_lod_bias
    GL_EXT_texture_mirror_clamp
    GL_EXT_texture_object
    GL_EXT_texture_rectangle
    GL_EXT_texture_sRGB
    GL_EXT_texture_shared_exponent
    GL_EXT_texture_snorm
    GL_EXT_texture_swizzle
    GL_EXT_timer_query
    GL_EXT_transform_feedback
    GL_EXT_vertex_array
    GL_EXT_vertex_array_bgra
    GL_IBM_texture_mirrored_repeat
    GL_KTX_buffer_region
    GL_NV_blend_square
    GL_NV_conditional_render
    GL_NV_copy_depth_to_color
    GL_NV_explicit_multisample
    GL_NV_float_buffer
    GL_NV_half_float
    GL_NV_primitive_restart
    GL_NV_texgen_reflection
    GL_NV_texture_barrier
    GL_SGIS_generate_mipmap
    GL_SGIS_texture_edge_clamp
    GL_SGIS_texture_lod
    GL_SUN_multi_draw_arrays
    GL_WIN_swap_hint
    WGL_EXT_swap_control
    GL_EXT_bgra
    Hard Drives
    ST31500341AS ATA Device
    Manufacturer Seagate
    Form Factor 3.5"
    Heads 16
    Cylinders 16383
    SATA type SATA-II 3.0Gb/s
    Device type Fixed
    ATA Standard ATA8-ACS
    Serial Number 9VS2V662
    LBA Size 48-bit LBA
    Power On Count 462 times
    Power On Time 863.9 days
    Speed, Expressed in Revolutions Per Minute (rpm) 7200
    Features S.M.A.R.T., AAM, NCQ
    Transfer Mode SATA II
    Interface SATA
    Capacity 1397GB
    Real size 1,500,301,910,016 bytes
    RAID Type None
    S.M.A.R.T
    01 Read Error Rate 119 (099 worst) Data 000C58C66F
    03 Spin-Up Time 100 (093) Data 0000000000
    04 Start/Stop Count 100 (100) Data 00000001FA
    05 Reallocated Sectors Count 099 (099) Data 000000004B
    07 Seek Error Rate 086 (060) Data 00190B8875
    09 Power-On Hours (POH) 077 (077) Data 00000050FD
    0A Spin Retry Count 100 (100) Data 0000000000
    0C Device Power Cycle Count 100 (100) Data 00000001CE
    B8 End-to-End error / IOEDC 100 (100) Data 0000000000
    BB Reported Uncorrectable Errors 100 (100) Data 0000000000
    BC Command Timeout 100 (099) Data 0000010021
    BD High Fly Writes (WDC) 001 (001) Data 0000000159
    BE Temperature Difference from 100 065 (052) Data 00271B0023
    C2 Temperature 035 (048) Data 0000000023
    C3 Hardware ECC Recovered 050 (036) Data 000C58C66F
    C5 Current Pending Sector Count 100 (100) Data 0000000000
    C6 Uncorrectable Sector Count 100 (100) Data 0000000000
    C7 UltraDMA CRC Error Count 200 (200) Data 0000000002
    F0 Head Flying Hours 100 (253) Data 00000050F7
    F1 Total LBAs Written 100 (253) Data 00C8691686
    F2 Total LBAs Read 100 (253) Data 008CF3F457
    Temperature 35 °C
    Temperature Range ok (less than 50 °C)
    Status Good
    Partition 0
    Partition ID Disk #0, Partition #0
    Disk Letter C:
    File System NTFS
    Volume Serial Number 9E7F1466
    Size 1397GB
    Used Space 435GB (32%)
    Free Space 962GB (68%)
    Optical Drives
    PLEXTOR DVDR PX-880SA ATA Device
    Media Type DVD Writer
    Name PLEXTOR DVDR PX-880SA ATA Device
    Availability Running/Full Power
    Capabilities Random Access, Supports Writing, Supports Removable Media
    Config Manager Error Code Device is working properly
    Config Manager User Config FALSE
    Drive I:
    DriveIntegrity TRUE
    Media Loaded TRUE
    SCSI Bus 0
    SCSI Logical Unit 0
    SCSI Port 0
    SCSI Target Id 1
    Size 3.66 GB
    Status OK
    Transfer Rate 7226 KB/S
    Volume Name FRMCXFRE_EN_DVD
    Volume Serial Number C5A8C992
    Audio
    Sound Cards
    AMD High Definition Audio Device
    SoundMAX Integrated Digital HD Audio
    Playback Devices
    SPDIF Interface (SoundMAX Integrated Digital HD Audio)
    Digital Output (SoundMAX Integrated Digital HD Audio)
    Speakers (SoundMAX Integrated Digital HD Audio) (default)
    Recording Devices
    Line In (SoundMAX Integrated Digital HD Audio)
    Microphone (SoundMAX Integrated Digital HD Audio) (default)
    Peripherals
    HID Keyboard Device
    Device Kind Keyboard
    Device Name HID Keyboard Device
    Vendor Unknown
    Location USB Human Interface Device
    Driver
    Date 6-21-2006
    Version 6.0.6002.18005
    File C:\Windows\system32\DRIVERS\kbdhid.sys
    File C:\Windows\system32\DRIVERS\kbdclass.sys
    Microsoft USB IntelliMouse Optical
    Device Kind Mouse
    Device Name Microsoft USB IntelliMouse Optical
    Vendor Microsoft
    Location Microsoft USB IntelliMouse Optical
    Driver
    Date 6-21-2006
    Version 6.0.6001.18000
    File C:\Windows\system32\DRIVERS\mouhid.sys
    File C:\Windows\system32\DRIVERS\mouclass.sys
    Disk drive
    Device Kind USB storage
    Device Name Disk drive
    Vendor APPLE
    Comment Apple iPod USB Device
    Location USB Mass Storage Device
    Driver
    Date 6-21-2006
    Version 6.0.6002.18005
    File C:\Windows\system32\DRIVERS\disk.sys
    Disk drive
    Device Kind USB storage
    Device Name Disk drive
    Vendor GENERIC
    Comment Generic USB CF Reader USB Device
    Location USB Mass Storage Device
    Driver
    Date 6-21-2006
    Version 6.0.6002.18005
    File C:\Windows\system32\DRIVERS\disk.sys
    Disk drive
    Device Kind USB storage
    Device Name Disk drive
    Vendor GENERIC
    Comment Generic USB MS Reader USB Device
    Location USB Mass Storage Device
    Driver
    Date 6-21-2006
    Version 6.0.6002.18005
    File C:\Windows\system32\DRIVERS\disk.sys
    Disk drive
    Device Kind USB storage
    Device Name Disk drive
    Vendor GENERIC
    Comment Generic USB SD Reader USB Device
    Location USB Mass Storage Device
    Driver
    Date 6-21-2006
    Version 6.0.6002.18005
    File C:\Windows\system32\DRIVERS\disk.sys
    Disk drive
    Device Kind USB storage
    Device Name Disk drive
    Vendor GENERIC
    Comment Generic USB xD/SM Reader USB Device
    Location USB Mass Storage Device
    Driver
    Date 6-21-2006
    Version 6.0.6002.18005
    File C:\Windows\system32\DRIVERS\disk.sys
    Disk drive
    Device Kind USB storage
    Device Name Disk drive
    Vendor SWISSBIT
    Comment SWISSBIT Victorinox 2.0 USB Device
    Location USB Mass Storage Device
    Driver
    Date 6-21-2006
    Version 6.0.6002.18005
    File C:\Windows\system32\DRIVERS\disk.sys
    Printers
    CutePDF Writer
    Printer Port CPW2:
    Print Processor WinPrint
    Availability Always
    Priority 1
    Duplex None
    Print Quality 600 * 600 dpi Color
    Status Unknown
    Driver
    Driver Name CutePDF Writer (v6.00)
    Driver Path C:\Windows\system32\spool\DRIVERS\x64\3\PSCRIPT5.DLL
    Fax
    Printer Port SHRFAX:
    Print Processor WinPrint
    Availability Always
    Priority 1
    Duplex None
    Print Quality 200 * 200 dpi Monochrome
    Status Unknown
    Driver
    Driver Name Microsoft Shared Fax Driver (v4.00)
    Driver Path C:\Windows\system32\spool\DRIVERS\x64\3\FXSDRV.DLL
    HP LaserJet 4600dtn PCL 5 (Default Printer)
    Share Name HP LaserJet 4600dtn PCL 5
    Printer Port 192.168.0.10_1
    Print Processor hpcpp109
    Availability Always
    Priority 1
    Duplex Long-edge binding
    Print Quality 600 * 600 dpi Color
    Status The printer is low on toner
    Driver
    Driver Name HP Universal Printing PCL 5 (v6.00)
    Driver Path C:\Windows\system32\spool\DRIVERS\x64\3\unidrv.dll
    Microsoft XPS Document Writer
    Printer Port XPSPort:
    Print Processor WinPrint
    Availability Always
    Priority 1
    Duplex None
    Print Quality 600 * 600 dpi Color
    Status Unknown
    Driver
    Driver Name Microsoft XPS Document Writer (v6.00)
    Driver Path C:\Windows\system32\spool\DRIVERS\x64\3\mxdwdrv.dll
    Network
    You are not connected to the internet
    Computer Name
    NetBIOS Name COREI7
    DNS Name Corei7
    Domain Name Corei7
    Remote Desktop
    Console
    State Active
    Domain Corei7
    WinInet Info
    LAN Connection
    Local system uses a local area network to connect to the Internet
    Local system has RAS to connect to the Internet
    Wi-Fi Info
    Wi-Fi not enabled
    WinHTTPInfo
    WinHTTPSessionProxyType No proxy
    Session Proxy
    Session Proxy Bypass
    Connect Retries 5
    Connect Timeout 60000
    HTTP Version HTTP 1.1
    Max Connects Per 1.0 Servers INFINITE
    Max Connects Per Servers INFINITE
    Max HTTP automatic redirects 10
    Max HTTP status continue 10
    Send Timeout 30000
    IEProxy Auto Detect No
    IEProxy Auto Config
    IEProxy
    IEProxy Bypass
    Default Proxy Config Access Type No proxy
    Default Config Proxy
    Default Config Proxy Bypass
    Sharing and Discovery
    Network Discovery Enabled
    File and Printer Sharing Disabled
    Simple File Sharing Enabled
    Administrative Shares Enabled
    Adapters List
    Marvell Yukon 88E8056 PCI-E Gigabit Ethernet Controller #2
    IP Address 0.0.0.0
    Subnet mask 0.0.0.0
    Gateway server 0.0.0.0
    Marvell Yukon 88E8056 PCI-E Gigabit Ethernet Controller
    IP Address 192.168.0.2
    Subnet mask 255.255.255.0
    Gateway server 192.168.0.1
    Network Shares
    HP LaserJet 4600dtn PCL 5 HP LaserJet 4600dtn PCL 5,LocalsplOnly
  16. Jay Pfoutz

    Jay Pfoutz Malware Helper Posts: 4,286   +49

  17. Grampz719

    Grampz719 Newcomer, in training Topic Starter Posts: 26

    It updated the driver, but now all of the displays are rotated 90 degrees. The "AMD Catalyst software" that installs with the driver has the same graphics issue as firefox, ie, et-all, so now I can't rotate the display back. I had to rotate the monitor 90 degrees (as in physically pick it up and turn it on its side) to be able to run the mouse.

    I have backed all my data, and am getting ready to do a boot-n-nuke and start over...
  18. Jay Pfoutz

    Jay Pfoutz Malware Helper Posts: 4,286   +49

    Your choice.

    Rollback the driver and try again or boot-n-nuke.
     
  19. Jay Pfoutz

    Jay Pfoutz Malware Helper Posts: 4,286   +49

    Hello. Are you still with us?

    Your thread has been marked as "Inactive" because of your lack of reply. Please let us know if you want to continue in this topic.

    Thanks.


Add New Comment

TechSpot Members
Login or sign up for free,
it takes about 30 seconds.
You may also...


Get complete access to the TechSpot community. Join thousands of technology enthusiasts that contribute and share knowledge in our forum. Get a private inbox, upload your own photo gallery and more.