Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

This ought to be good. System Security AND sptd.sys problem


  • Please log in to reply
30 replies to this topic

#1 msgsu

msgsu

  • Members
  • 47 posts
  • OFFLINE
  •  
  • Local time:01:43 PM

Posted 02 July 2009 - 10:08 PM

Looks like I opened something I should not have because I now have that stupid System Security program that fakes a security issue, which I guess is an issue within itself. The point is that I have it and it's crippled one of my computers. I went to this site ( http://www.spywarevoid.com/remove-system-s...09-removal.html ) to work on removal, but I have a strange kink.

The site says to run their security program, Spyware Doctor, but I cannot because System Security has locked everything down (installs, uninstalls, executables, etc...). The site suggests booting up in Safe Mode so I can have the functionality I need. But I have run into a second unrelated problem that is preventing me from getting to safe mode.

Apparently there is a problem with Daemon Tools that prevents booting into safe mode. When I try booting into Safe Mode I get a note at the bottom of the list of loading files that asks me to press Esc if I don't want to load sptd.sys. If I do or don't press Esc, it reboots.

I can't uninstall Daemon Tools because System Security won't let me and I can't get into Safe Mode to clean System Security because of Daemon Tools...HELP! Please!

BC AdBot (Login to Remove)

 


m

#2 msgsu

msgsu
  • Topic Starter

  • Members
  • 47 posts
  • OFFLINE
  •  
  • Local time:01:43 PM

Posted 02 July 2009 - 10:10 PM

I forgot to add, I tried renaming sptd.sys so the boot sequence would not find it and hopefully just go on without it. Nope, it just rebooted.

Details I forgot: Win XP Sp 2, SAV 10.1, AMD athlon 2600+ xp, anything else?

Edited by msgsu, 02 July 2009 - 10:26 PM.


#3 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:04:43 PM

Posted 02 July 2009 - 10:27 PM

I uninstalled Daemon tools long ago and used to get that same message until I finished removing the pest.

I doubt that's your problem.

http://www.malwarebytes.org/forums/index.php?showtopic=17583

Read this guide exactly, it's fairly simple

Please download Malwarebytes Anti-Malware (v1.36) and save it to your desktop.
alternate download link 1
alternate download link 2
If you have a previous version of MBAM, remove it via Add/Remove Programs and download a fresh copy.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install. Alternatively, you can update through MBAM's interface from a clean computer, copy the definitions (rules.ref) located in C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware from that system to a usb stick or CD and then copy it to the infected machine.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you after scanning with MBAM. Please temporarily disable such programs or permit them to allow the changes.

http://www.bleepingcomputer.com/forums/t/114351/how-to-temporarily-disable-your-anti-virus-firewall-and-anti-malware-programs/
Chewy

No. Try not. Do... or do not. There is no try.

#4 msgsu

msgsu
  • Topic Starter

  • Members
  • 47 posts
  • OFFLINE
  •  
  • Local time:01:43 PM

Posted 04 July 2009 - 02:52 AM

Thank you, thank you for your assisstance! I hope I did this right! It seems to be running more smoothly already!

Malwarebytes' Anti-Malware 1.38
Database version: 2371
Windows 5.1.2600 Service Pack 2

7/4/2009 1:20:34 AM
mbam-log-2009-07-04 (01-20-34).txt

Scan type: Quick Scan
Objects scanned: 92082
Time elapsed: 6 minute(s), 52 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 5
Registry Values Infected: 15
Registry Data Items Infected: 3
Folders Infected: 0
Files Infected: 47

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\Documents and Settings\Mokus\Local Settings\Temp\581603781255mxx.dll (Spyware.OnlineGames) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\Typelib\{f3d0c92a-2063-2a0d-9256-05e3846d38b0} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{d76ab2a1-00f3-42bd-f434-00bbc39c8953} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{d76ab2a1-00f3-42bd-f434-00bbc39c8953} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\ColdWare (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hsf7husjnfg98gi498aejhiugjkdg4 (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows System Recover! (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\idstrf (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\WINID (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\BuildW (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\FirstInstallFlag (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\guid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\i (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\mms (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\mso (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\udso (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\uid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Ulrn (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Update (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\UpdateNew (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools (Hijack.Regedit) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions (Hijack.FolderOptions) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{7998DC37-D3FE-487C-A60A-7701FCC70CC6}\InprocServer32\(default) (Hijack.Repdrvfs) -> Bad: (\\?\globalroot\systemroot\installer\22a9750a.msi) Good: (repdrvfs.dll) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Documents and Settings\Mokus\Local Settings\Temp\581603781255mxx.dll (Spyware.OnlineGames) -> Delete on reboot.
c:\WINDOWS\system32\AVR09.exe (Rogue.AdvancedVirusRemover) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\sopidkc.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\wiwow64.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\msncache.dll (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\wbem\proquota.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\1433786450.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\153575686.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\1890308954.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\Mokus\local settings\Temp\c.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\mdm.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\Mokus\local settings\Temp\db.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\login.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\606816940.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\Mokus\local settings\Temp\a.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\svchost.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\smss.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\zjhufhdfe.exe (Trojan.Ertfor) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\winamp.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\services.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\install.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\Mokus\local settings\Temp\installb[1].exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\vcru_1246557153.exe (Worm.Koobface) -> Quarantined and deleted successfully.
c:\documents and settings\Mokus\local settings\Temp\sjhsreyhu5ershaehtnvnjtafa44.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\2716497214.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\3167707218.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\3318561124.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\mokus\local settings\temp\3996707978.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\Mokus\local settings\Temp\~TM107A.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\WINDOWS\Temp\txpxr_499905830274.b1k (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\Mokus\Local Settings\Temp\lsass.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\comsa32.sys (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\Mokus\Local Settings\Temp\winlogon.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\FInstall.sys (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tpsaxyd.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\Tasks\{783AF354-B514-42d6-970E-3E8BF0A5279C}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\Mokus\Application Data\wiaserva.log (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Mokus\Local Settings\Temp\win.exe (Trojan.Downloader) -> Delete on reboot.
c:\documents and settings\Mokus\Application Data\wiaservg.log (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\010112010146118114.dat (Worm.KoobFace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\critical_warning.html (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\0101120101465749.dat (Worm.KoobFace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wiawow32.sys (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\nooakkv.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\gklrwl.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\drv\drv.sys (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\Mokus\Local Settings\Temp\drv.bat (Malware.Trace) -> Quarantined and deleted successfully.

I did another scan after rebooting and returned zero results.

#5 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:04:43 PM

Posted 04 July 2009 - 09:34 AM

http://rootrepeal.googlepages.com/

http://rootrepeal.googlepages.com/RootRepeal.zip

Just use the file tab at the bottom, scan and paste the report into a reply here please

Does safe mode work now?
Chewy

No. Try not. Do... or do not. There is no try.

#6 msgsu

msgsu
  • Topic Starter

  • Members
  • 47 posts
  • OFFLINE
  •  
  • Local time:01:43 PM

Posted 04 July 2009 - 01:20 PM

ROOTREPEAL AD, 2007-2009
==================================================
Scan Time: 2009/07/04 12:01
Program Version: Version 1.3.0.0
Windows Version: Windows XP SP2
==================================================

Hidden/Locked Files
-------------------
Path: C:\WINDOWS\$hf_mig$\{29F8DDC1-9487-49b8-B27E-3E0C3C1298FF}
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\drivers\4054afee.sys
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Mokus\Local Settings\Temp\lucene-da02c5d7f7ae376ef90b8d05abdb14c7-write.lock
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Mokus\Local Settings\Temp\Temporary Directory 3 for Death_Cab_For_Cutie_-_Live_at_the_Brixton_Academy_-_July_17,_2008_-_London,_England_[2008_MP3_V0(VBR)].zip\Death_Cab_For_Cutie-Live_at_the_Brixton_Academy_-_July_17,_2008_-_London,_England
Status: Locked to the Windows API!

Path: C:\Program Files\Common Files\Symantec Shared\VirusDefs\20090703.004\EraserUtilRebootDrv.sys
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Mokus\Local Settings\Temp\Temporary Directory 3 for Death_Cab_For_Cutie_-_Live_at_the_Brixton_Academy_-_July_17,_2008_-_London,_England_[2008_MP3_V0(VBR)].zip\Death_Cab_For_Cutie-Live_at_the_Brixton_Academy_-_July_17,_2008_-_London,_England\Death_Cab_Fo
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Mokus\Local Settings\Temp\Temporary Directory 3 for Microsoft_Office_2003_Professional_Enterprise_Edition(no_serial_needed).zip\Microsoft_Office_2003_Professional_Enterprise_Edition(no_serial_needed)-\Microsoft_Office_2003_Professional_Enterprise_Editio
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Mokus\Local Settings\Temp\Temporary Directory 4 for Death_From_Above_1979_-_Romance_Bloody_Romance_-_Remixes_&_B-Sides_[2005_MP3_V0].zip\Death_From_Above_1979-Romance_Bloody_Romance_-_Remixes_&_B-Sides\Death_From_Above_1979-Romance_Bloody_Romance_-_Remi
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Mokus\Local Settings\Temp\Temporary Directory 6 for I_Love_Math_-_Getting_To_the_Point_Is_Beside_It_(Advance)_[2008_MP3_V2(VBR)_Log].zip\I_Love_Math-Getting_To_the_Point_Is_Beside_It_(Advance)\I_Love_Math-Getting_To_the_Point_Is_Beside_It_(Advance).torr
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Mokus\Local Settings\Temp\Temporary Directory 8 for Atmosphere_-_When_Life_Gives_You_Lemons,_You_Paint_That_bleep_Gold_[2008_MP3_192_Log].zip\Atmosphere-When_Life_Gives_You_Lemons,_You_Paint_That_bleep_Gold\Atmosphere-When_Life_Gives_You_Lemons,_You_Paint
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Mokus\Local Settings\Temp\Temporary Directory 1 for Death_From_Above_1979_-_Romance_Bloody_Romance_-_Remixes_&_B-Sides_[2005_MP3_V0].zip\Death_From_Above_1979-Romance_Bloody_Romance_-_Remixes_&_B-Sides\Death_From_Above_1979-Romance_Bloody_Romance_-_Remi
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Mokus\Local Settings\Temp\Temporary Directory 2 for Death_From_Above_1979_-_Romance_Bloody_Romance_-_Remixes_&_B-Sides_[2005_MP3_V0].zip\Death_From_Above_1979-Romance_Bloody_Romance_-_Remixes_&_B-Sides\Death_From_Above_1979-Romance_Bloody_Romance_-_Remi
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Mokus\Local Settings\Apps\2.0\2OV0A8BW.ZBX\15QCJ626.95K\manifests\GraboidClient.exe.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Mokus\Local Settings\Apps\2.0\2OV0A8BW.ZBX\15QCJ626.95K\manifests\GraboidClient.exe.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Mokus\Local Settings\Apps\2.0\2OV0A8BW.ZBX\15QCJ626.95K\manifests\Microsoft.mshtml.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Mokus\Local Settings\Apps\2.0\2OV0A8BW.ZBX\15QCJ626.95K\manifests\Microsoft.mshtml.manifest
Status: Locked to the Windows API!


The first scan caused a reboot. This is from the second scan.
Attempting to boot into safe mode still causes a reboot.
And it seems to be choking out my net connection. When the infected computer is on, net is almost unusable, but when off all is good.
Thanks.

Edited by msgsu, 04 July 2009 - 01:27 PM.


#7 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:04:43 PM

Posted 04 July 2009 - 01:27 PM

Please download and run Processexplorer


http://technet.microsoft.com/en-us/sysinte...s/bb896653.aspx

Under file and save as, create a log and post here

copy and paste into a reply
Chewy

No. Try not. Do... or do not. There is no try.

#8 msgsu

msgsu
  • Topic Starter

  • Members
  • 47 posts
  • OFFLINE
  •  
  • Local time:01:43 PM

Posted 04 July 2009 - 01:39 PM

Process PID CPU Description Company Name
System Idle Process 0 98.46
Interrupts n/a Hardware Interrupts
DPCs n/a Deferred Procedure Calls
System 4
smss.exe 668 Windows NT Session Manager Microsoft Corporation
csrss.exe 728 Client Server Runtime Process Microsoft Corporation
winlogon.exe 756 Windows NT Logon Application Microsoft Corporation
services.exe 800 Services and Controller app Microsoft Corporation
ati2evxx.exe 976 ATI External Event Utility EXE Module ATI Technologies Inc.
svchost.exe 996 Generic Host Process for Win32 Services Microsoft Corporation
wmiprvse.exe 3332 WMI Microsoft Corporation
NMIndexStoreSvr.exe 2564 Nero Home Nero AG
YAHOOM~1.EXE 2596 Yahoo! Messenger Yahoo! Inc.
COCIManager.exe 2392 Logitech Camera Control Interface Logitech Inc.
svchost.exe 1056 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 1120 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 1196 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 1360 Generic Host Process for Win32 Services Microsoft Corporation
ccSetMgr.exe 1460 Symantec Settings Manager Service Symantec Corporation
ccEvtMgr.exe 1484 Symantec Event Manager Service Symantec Corporation
spoolsv.exe 1608 Spooler SubSystem App Microsoft Corporation
LVPrcSrv.exe 1652 Logitech LVPrcSrv Module. Logitech Inc.
svchost.exe 1708 Generic Host Process for Win32 Services Microsoft Corporation
AppleMobileDeviceService.exe 1748 Apple Mobile Device Service Apple, Inc.
DefWatch.exe 1784 Virus Definition Daemon Symantec Corporation
LVComSer.exe 1900 Logitech Video COM Service Logitech Inc.
LVComSer.exe 3072 Logitech Video COM Service Logitech Inc.
SyncServices.exe 1964 Sync Windows Services Seagate Technology LLC
MDM.EXE 1992 Machine Debug Manager Microsoft Corporation
svchost.exe 352 Generic Host Process for Win32 Services Microsoft Corporation
Rtvscan.exe 416 Symantec AntiVirus Symantec Corporation
synergyc.exe 452
iPodService.exe 424 iPodService Module Apple Inc.
lsass.exe 812 LSA Shell (Export Version) Microsoft Corporation
ati2evxx.exe 1268 ATI External Event Utility EXE Module ATI Technologies Inc.
explorer.exe 3264 Windows Explorer Microsoft Corporation
jusched.exe 3508 Java™ Platform SE binary Sun Microsystems, Inc.
Communications_Helper.exe 3624 Logitech Communications Manager Logitech Inc.
QuickCam10.exe 3668 Camera Software Logitech Inc.
iTunesHelper.exe 3824 iTunesHelper Module Apple Inc.
StatusClient.exe 3852 Hewlett-Packard T-TR Status Client Hewlett-Packard
rundll32.exe 3932 Run a DLL as an App Microsoft Corporation
LOGI_MWX.EXE 3984 Logitech Launcher Application Logitech Inc.
reader_sl.exe 4084 Adobe Acrobat SpeedLauncher Adobe Systems Incorporated
MaxMenuMgr.exe 208 Maxtor Status Icon Maxtor Corporation
LVComSX.exe 240 LVCom Server Logitech Inc.
ccApp.exe 216 Symantec User Session Symantec Corporation
VPTray.exe 276 Symantec AntiVirus Symantec Corporation
NMBgMonitor.exe 312 Nero Home Nero AG
ctfmon.exe 484 CTF Loader Microsoft Corporation
Rambooster.exe 2084 RamBooster J.Pajula
RegMech.exe 2816 Registry Mechanic 8.0 PC Tools
procexp.exe 2960 1.54 Sysinternals Process Explorer Sysinternals - www.sysinternals.com
iexplore.exe 2120 Internet Explorer Microsoft Corporation
javaw.exe 2140

#9 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:04:43 PM

Posted 04 July 2009 - 01:46 PM

http://www.bleepingcomputer.com/startups/javaw.exe-5329.html

Are you using swapnut?

We Need to Repair Safe Mode
  • Please download Safe Boot Key Repair and save it to your desktop.
  • Open Posted Image on your desktop.
  • Copy and paste the resultant log here in your next reply.

Test
Chewy

No. Try not. Do... or do not. There is no try.

#10 msgsu

msgsu
  • Topic Starter

  • Members
  • 47 posts
  • OFFLINE
  •  
  • Local time:01:43 PM

Posted 04 July 2009 - 01:57 PM

Is it bad if I have never heard of swapnut? The first scan didn't yield a log. Here is from the second:

Reg export of SafeBoot key after repair:
========================

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot]
"AlternateShell"="cmd.exe"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\appmgmt]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\base]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\boot bus extender]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\boot file system]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\cryptsvc]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\dcomlaunch]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\dmadmin]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\dmboot.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\dmio.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\dmload.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\dmserver]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\eventlog]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\file system]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\filter]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\helpsvc]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\netlogon]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\pci configuration]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\plugplay]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\pnp filter]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\primary disk]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\rpcss]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\scsi class]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\sdauxservice]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\sdcoreservice]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\sermouse.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\sr.sys]
@="FSFilter System Recovery"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\srservice]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\system bus extender]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\vds]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\vga.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\vgasave.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\winmgmt]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\{36fc9e60-c465-11cf-8056-444553540000}]
@="Universal Serial Bus controllers"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\{4d36e965-e325-11ce-bfc1-08002be10318}]
@="CD-ROM Drive"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\{4d36e967-e325-11ce-bfc1-08002be10318}]
@="DiskDrive"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\{4d36e969-e325-11ce-bfc1-08002be10318}]
@="Standard floppy disk controller"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\{4d36e96a-e325-11ce-bfc1-08002be10318}]
@="Hdc"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\{4d36e96b-e325-11ce-bfc1-08002be10318}]
@="Keyboard"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\{4d36e96f-e325-11ce-bfc1-08002be10318}]
@="Mouse"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\{4d36e977-e325-11ce-bfc1-08002be10318}]
@="PCMCIA Adapters"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\{4d36e97b-e325-11ce-bfc1-08002be10318}]
@="SCSIAdapter"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\{4d36e97d-e325-11ce-bfc1-08002be10318}]
@="System"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\{4d36e980-e325-11ce-bfc1-08002be10318}]
@="Floppy disk drive"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\{533c5b84-ec70-11d2-9505-00c04f79deaf}]
@="Volume shadow copy"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\{71a27cdd-812a-11d0-bec7-08002be2092f}]
@="Volume"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\{745a17a0-74d3-11d0-b6fe-00a0c90f57da}]
@="Human Interface Devices"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\afd]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\appmgmt]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\base]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\boot bus extender]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\boot file system]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\browser]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\cryptsvc]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\dcomlaunch]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\dhcp]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\dmadmin]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\dmboot.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\dmio.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\dmload.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\dmserver]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\dnscache]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\eventlog]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\file system]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\filter]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\helpsvc]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\ip6fw.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\ipnat.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\lanmanserver]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\lanmanworkstation]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\lmhosts]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\messenger]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\ndis]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\ndis wrapper]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\ndisuio]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\netbios]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\netbiosgroup]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\netbt]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\netddegroup]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\netlogon]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\netman]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\network]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\networkprovider]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\ntlmssp]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\pci configuration]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\plugplay]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\pnp filter]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\pnp_tdi]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\primary disk]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\rdpcdd.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\rdpdd.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\rdpwd.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\rdsessmgr]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\rpcss]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\scsi class]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\sdauxservice]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\sdcoreservice]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\sermouse.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\sharedaccess]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\sr.sys]
@="FSFilter System Recovery"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\srservice]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\streams drivers]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\system bus extender]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\tcpip]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\tdi]
@="Driver Group"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\tdpipe.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\tdtcp.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\termservice]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\uploadmgr]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\vga.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\vgasave.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\winmgmt]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\wzcsvc]
@="Service"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{1a3e09be-1e45-494b-9174-d7385b45bbf5}]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{36fc9e60-c465-11cf-8056-444553540000}]
@="Universal Serial Bus controllers"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{4d36e965-e325-11ce-bfc1-08002be10318}]
@="CD-ROM Drive"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{4d36e967-e325-11ce-bfc1-08002be10318}]
@="DiskDrive"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{4d36e969-e325-11ce-bfc1-08002be10318}]
@="Standard floppy disk controller"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{4d36e96a-e325-11ce-bfc1-08002be10318}]
@="Hdc"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{4d36e96b-e325-11ce-bfc1-08002be10318}]
@="Keyboard"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{4d36e96f-e325-11ce-bfc1-08002be10318}]
@="Mouse"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{4d36e972-e325-11ce-bfc1-08002be10318}]
@="Net"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{4d36e973-e325-11ce-bfc1-08002be10318}]
@="NetClient"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{4d36e974-e325-11ce-bfc1-08002be10318}]
@="NetService"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{4d36e975-e325-11ce-bfc1-08002be10318}]
@="NetTrans"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{4d36e977-e325-11ce-bfc1-08002be10318}]
@="PCMCIA Adapters"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{4d36e97b-e325-11ce-bfc1-08002be10318}]
@="SCSIAdapter"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{4d36e97d-e325-11ce-bfc1-08002be10318}]
@="System"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{4d36e980-e325-11ce-bfc1-08002be10318}]
@="Floppy disk drive"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{71a27cdd-812a-11d0-bec7-08002be2092f}]
@="Volume"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\network\{745a17a0-74d3-11d0-b6fe-00a0c90f57da}]
@="Human Interface Devices"

========================

HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\sdauxservice
HKEY_LOCAL_MACHINE\system\currentcontrolset\control\safeboot\minimal\sdcoreservice

#11 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:04:43 PM

Posted 04 July 2009 - 02:13 PM

Test if safe mode works?

Also

Show Hidden Folders/Files
  • Open My Computer.
  • Go to Tools > Folder Options.
  • Select the View tab.
  • Scroll down to Hidden files and folders.
  • Select Show hidden files and folders.
  • Uncheck (untick) Hide extensions of known file types.
  • Uncheck (untick) Hide protected operating system files (Recommended).
  • Click Yes when prompted.
  • Click OK.
  • Close My Computer.

See if you can search for javaw.exe

Note it's location
Chewy

No. Try not. Do... or do not. There is no try.

#12 msgsu

msgsu
  • Topic Starter

  • Members
  • 47 posts
  • OFFLINE
  •  
  • Local time:01:43 PM

Posted 04 July 2009 - 02:34 PM

SAFE MODE WORKS NOW THANK YOU!!!!!!!!!!!!!!!!

javaw.exe is in multiple places. editing below...done.

c:\documents and settings\Mokus\My Documents\grpwise\software\common\java\bin
c:\WINDOWS\system32
c:\program files\Java\jre1.6.0_02\bin
c:\program files\Java\jre1.6.0_03\bin
c:\program files\Java\jre1.6.0_05\bin
c:\program files\Hewlett-Packard\Toolbox2.0\Javasoft\JRE\1.3.1\bin
bin

wait, i forgot to Uncheck (untick) Hide protected operating system files (Recommended). Re-searching...

Done with re-search. Results above are it, unless you also need to know files found named similarly but not exactly the same.

Edited by msgsu, 04 July 2009 - 02:41 PM.


#13 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:04:43 PM

Posted 04 July 2009 - 03:18 PM

We have some very old and likely corrupted(and/or infected) java.

Use add/remove to remove them all

After rebooting

http://www.java.com/en/download/manual.jsp

I prefer the offline installer
Chewy

No. Try not. Do... or do not. There is no try.

#14 msgsu

msgsu
  • Topic Starter

  • Members
  • 47 posts
  • OFFLINE
  •  
  • Local time:01:43 PM

Posted 04 July 2009 - 04:05 PM

3 Instances of Java in Add/Removed removed. Reinstalled from link above. Anything else I should do?

#15 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:04:43 PM

Posted 04 July 2009 - 06:08 PM

Let's do a full scan with MBAM please
Chewy

No. Try not. Do... or do not. There is no try.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users