Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.



  • Please log in to reply
No replies to this topic

#1 umsasu


  • Members
  • 2 posts
  • Local time:09:54 AM

Posted 24 August 2010 - 04:22 PM

My computer is very slow since last month after my kids play NickJr game. And I did run the following tool.

1 - Advance system care

2 - Malaware Bytes

3 - CCleaner

4 - Supper Antivirus

5 - AVG

But my system is very slow. Please help.

Log file.

RkU Version: 3.8.388.590, Type LE (SR2)
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #1
ntoskrnl.exe-->NtAlertResumeThread, Type: Address change 0x8062FCF4-->899ABC28 [Unknown module filename]
ntoskrnl.exe-->NtAlertThread, Type: Address change 0x8057ADAD-->899AB500 [Unknown module filename]
ntoskrnl.exe-->NtAllocateVirtualMemory, Type: Address change 0x80568FCA-->8998F0D0 [Unknown module filename]
ntoskrnl.exe-->NtConnectPort, Type: Address change 0x8058C63A-->89A36D98 [Unknown module filename]
ntoskrnl.exe-->NtCreateMutant, Type: Address change 0x80578217-->899AB008 [Unknown module filename]
ntoskrnl.exe-->NtCreateThread, Type: Address change 0x80587A3C-->89A43410 [Unknown module filename]
ntoskrnl.exe-->NtDeleteValueKey, Type: Address change 0x80592D64-->B0EB1350 [C:\Program Files\Symantec\SYMEVENT.SYS]
ntoskrnl.exe-->NtFreeVirtualMemory, Type: Address change 0x805698F5-->899AEFD0 [Unknown module filename]
ntoskrnl.exe-->NtImpersonateAnonymousToken, Type: Address change 0x8059762D-->899ABF30 [Unknown module filename]
ntoskrnl.exe-->NtImpersonateThread, Type: Address change 0x8057E821-->899ABDB8 [Unknown module filename]
ntoskrnl.exe-->NtMapViewOfSection, Type: Address change 0x80573D41-->899C90C0 [Unknown module filename]
ntoskrnl.exe-->NtOpenEvent, Type: Address change 0x8057DEC7-->899AC2A0 [Unknown module filename]
ntoskrnl.exe-->NtOpenProcessToken, Type: Address change 0x8056E0CD-->899AF160 [Unknown module filename]
ntoskrnl.exe-->NtOpenThreadToken, Type: Address change 0x8056DB6A-->899AE928 [Unknown module filename]
ntoskrnl.exe-->NtQueryValueKey, Type: Address change 0x8056A1F9-->897586F8 [Unknown module filename]
ntoskrnl.exe-->NtResumeThread, Type: Address change 0x805880AF-->899AFA28 [Unknown module filename]
ntoskrnl.exe-->NtSetContextThread, Type: Address change 0x8062E057-->899AE790 [Unknown module filename]
ntoskrnl.exe-->NtSetInformationProcess, Type: Address change 0x8056DDD9-->899AEAB0 [Unknown module filename]
ntoskrnl.exe-->NtSetInformationThread, Type: Address change 0x80575756-->899A6468 [Unknown module filename]
ntoskrnl.exe-->NtSetValueKey, Type: Address change 0x80572A6E-->B0EB1580 [C:\Program Files\Symantec\SYMEVENT.SYS]
ntoskrnl.exe-->NtSuspendProcess, Type: Address change 0x8062FC39-->899AC528 [Unknown module filename]
ntoskrnl.exe-->NtSuspendThread, Type: Address change 0x805E053E-->899A67F8 [Unknown module filename]
ntoskrnl.exe-->NtTerminateProcess, Type: Address change 0x805824CC-->899AF2D8 [Unknown module filename]
ntoskrnl.exe-->NtTerminateThread, Type: Address change 0x8057BA6F-->899A6680 [Unknown module filename]
ntoskrnl.exe-->NtUnmapViewOfSection, Type: Address change 0x805738C6-->899AEC58 [Unknown module filename]
ntoskrnl.exe-->NtWriteVirtualMemory, Type: Address change 0x8057E60A-->89A2A2A0 [Unknown module filename]

Edited by umsasu, 25 August 2010 - 12:29 PM.
Move to AII as no logs posted and prep. guide not followed. ~ OB

BC AdBot (Login to Remove)


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users