Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

'Cleaned' PC still locks up.


  • This topic is locked This topic is locked
22 replies to this topic

#1 gsander

gsander

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 13 July 2011 - 09:53 PM

Malwarebytes and SuperAntiSpyware have both reported and cleaned malware (trojans mostly) off this PC. They both run clean now. I have used the Dell Utility partition to test the hardware and found nothing. The PC still locks up requiring a manual reboot. There are no crash dumps to analyze. Short of rebuilding - I would like to confirm that the malware is all gone and not the reason for the locking up. I would appreciate any other things to check for.

Thanks

BC AdBot (Login to Remove)

 


#2 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:12:58 PM

Posted 13 July 2011 - 09:56 PM

Have you gotten the all clean from a Malware Removal Expert.

#3 gsander

gsander
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 13 July 2011 - 10:05 PM

No I have not. All I know is that Malwarebytes and SuperAntiSpyware now run clean. Is the Malware Removal Expert in a different forum?

#4 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:12:58 PM

Posted 13 July 2011 - 10:19 PM

Please have this topic http://www.bleepingcomputer.com/forums/topic407224.html reopened.

#5 gsander

gsander
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 13 July 2011 - 10:31 PM

That topic is not related to this issue or computer.

#6 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:12:58 PM

Posted 13 July 2011 - 10:33 PM

so its a totally different computer?

#7 gsander

gsander
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 13 July 2011 - 10:39 PM

Yes

#8 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:12:58 PM

Posted 13 July 2011 - 10:42 PM

Can you post the logs then from Malwarebytes and Super Anti-Spyware?

#9 gsander

gsander
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 13 July 2011 - 10:56 PM

Malwarebytes' Anti-Malware 1.51.0.1200
www.malwarebytes.org

Database version: 7079

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

7/11/2011 4:24:42 PM
mbam-log-2011-07-11 (16-24-42).txt

Scan type: Quick scan
Objects scanned: 153709
Time elapsed: 19 minute(s), 12 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\syscheck.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\SYSTEM32\ieupdates.exe.tmp (Trojan.Agent) -> Quarantined and deleted successfully.





Malwarebytes' Anti-Malware 1.51.0.1200
www.malwarebytes.org

Database version: 7082

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

7/11/2011 6:48:18 PM
mbam-log-2011-07-11 (18-48-17).txt

Scan type: Full scan (C:\|)
Objects scanned: 194844
Time elapsed: 57 minute(s), 8 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)



SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/11/2011 at 08:43 PM

Application Version : 4.55.1000

Core Rules Database Version : 7397
Trace Rules Database Version: 5209

Scan type : Complete Scan
Total Scan Time : 00:43:45

Memory items scanned : 494
Memory threats detected : 0
Registry items scanned : 5549
Registry threats detected : 22
File items scanned : 22179
File threats detected : 20

Adware.Tracking Cookie
C:\Documents and Settings\Administrator\Cookies\administrator@ad.wsod[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@doubleclick[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt
C:\Documents and Settings\Administrator\Local Settings\Temp\Cookies\administrator@partner2profit[2].txt
C:\Documents and Settings\Administrator\Local Settings\Temp\Cookies\administrator@doubleclick.hertz[1].txt
C:\Documents and Settings\Administrator\Local Settings\Temp\Cookies\administrator@stat.onestat[2].txt
C:\Documents and Settings\Administrator\Local Settings\Temp\Cookies\administrator@bannerspace[2].txt
C:\Documents and Settings\Administrator\Local Settings\Temp\Cookies\administrator@icc.intellisrv[2].txt
C:\Documents and Settings\Administrator\Local Settings\Temp\Cookies\administrator@revsci[1].txt
C:\Documents and Settings\Administrator\Local Settings\Temp\Cookies\administrator@sales.liveperson[2].txt
C:\Documents and Settings\Administrator\Local Settings\Temp\Cookies\administrator@server2.bkvtrack[2].txt
C:\Documents and Settings\Administrator\Local Settings\Temp\Cookies\administrator@kanoodle[1].txt
C:\Documents and Settings\Administrator\Local Settings\Temp\Cookies\administrator@statse.webtrendslive[2].txt
C:\Documents and Settings\Administrator\Local Settings\Temp\Cookies\administrator@www.myaccount.cingular[1].txt
C:\Documents and Settings\Administrator\Local Settings\Temp\Cookies\administrator@citi.bridgetrack[1].txt
C:\Documents and Settings\Administrator\Local Settings\Temp\Cookies\administrator@www.burstbeacon[2].txt
C:\Documents and Settings\Administrator\Local Settings\Temp\Cookies\administrator@qnsr[2].txt

Rogue.Component/Trace
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#Aff
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#AdvancedScanType
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#FirstRunUrl
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#AfterRegisterUrl
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#LabelUrl
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#TermsUrl
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#HelpURL
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#BillingURL
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#BillingUrlApproved
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#TransactionKey
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#BillingRegURL
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#BillingURL2
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#BillingUrlApproved2
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#LastRun
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#InstallDate
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#pPath
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#pName
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#SecurityVector
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#Scans
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675\Options#LastScan
HKU\S-1-5-21-2764716282-1794709089-1939604533-500\Software\49686219229676906580678814320675

Trojan.Agent/Gen-Goo
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\TEMP\ICAINSTALL.EXE
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\TEMP\PHASE1.EXE

Trojan.Agent/Gen-Nullo[Short]
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP2078\A0122433.EXE


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/11/2011 at 09:41 PM

Application Version : 4.55.1000

Core Rules Database Version : 7397
Trace Rules Database Version: 5209

Scan type : Complete Scan
Total Scan Time : 00:49:06

Memory items scanned : 462
Memory threats detected : 0
Registry items scanned : 5551
Registry threats detected : 0
File items scanned : 22166
File threats detected : 0


Thanks

#10 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:12:58 PM

Posted 13 July 2011 - 11:04 PM

Please run GMER

GMER does not work in 64bit Mode!!!!!!

Please download GMER from one of the following locations and save it to your desktop:

  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic Full Scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.
-- If you encounter any problems, try running GMER in safe mode.
-- If GMER crashes or keeps resulting in a BSODs, uncheck Devices on the right side before scanning
.


Also why are you running under the true administrator account?

#11 gsander

gsander
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 14 July 2011 - 09:24 AM

GMER 1.0.15.15640 - http://www.gmer.net
Rootkit scan 2011-07-14 09:23:02
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 ST340014A rev.3.16
Running: ye3p2vvo.exe; Driver: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\kxtyapob.sys


---- Kernel code sections - GMER 1.0.15 ----

init C:\WINDOWS\System32\drivers\AsfAlrt.sys entry point in "init" section [0xF777F2A0]

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\Tcpip \Device\Ip NEOFLTR_650_15991.SYS (NetBIOS Redirector/Juniper Networks)
AttachedDevice \Driver\Tcpip \Device\Tcp NEOFLTR_650_15991.SYS (NetBIOS Redirector/Juniper Networks)
AttachedDevice \Driver\Tcpip \Device\Udp NEOFLTR_650_15991.SYS (NetBIOS Redirector/Juniper Networks)
AttachedDevice \Driver\Tcpip \Device\RawIp NEOFLTR_650_15991.SYS (NetBIOS Redirector/Juniper Networks)

Device \FileSystem\Fastfat \Fat B0942D20

---- EOF - GMER 1.0.15 ----


Administrator Account ? - This is XP. Might as well use the true admin account.

Thanks

#12 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:12:58 PM

Posted 14 July 2011 - 09:39 AM

No it is strongly discouraged from using the true administrator account. It would be very simple to perform tasks that a regular user with administrative rights cannot perform if your system does get hacked or if malware is allowed to run.

I would now ask you to perform a Free Online Scan with ESETand post the results.

#13 gsander

gsander
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 14 July 2011 - 01:57 PM

I re-ran the gmer scan and here is the log. The earlier one did not seem as big as the others I tried to run. They failed because the computer locked up before they finished.


GMER 1.0.15.15640 - http://www.gmer.net
Rootkit scan 2011-07-14 12:53:26
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 ST340014A rev.3.16
Running: ye3p2vvo.exe; Driver: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\kxtyapob.sys


---- Kernel code sections - GMER 1.0.15 ----

init C:\WINDOWS\System32\drivers\AsfAlrt.sys entry point in "init" section [0xF777F2A0]

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3820] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E2154C5 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3820] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB04 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3820] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E5329 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3820] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E525B C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3820] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E52C6 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3820] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E512C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3820] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E518E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3820] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E538C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3820] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E51F0 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3976] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E2154C5 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3976] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 3E2E9A91 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3976] USER32.dll!CallNextHookEx 7E42B3C6 5 Bytes JMP 3E2DD0CD C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3976] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB04 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3976] USER32.dll!UnhookWindowsHookEx 7E42D5F3 5 Bytes JMP 3E25466E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3976] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E5329 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3976] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E525B C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3976] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E52C6 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3976] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E512C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3976] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E518E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3976] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E538C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3976] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E51F0 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3976] ole32.dll!CoCreateInstance 774FF1AC 5 Bytes JMP 3E2EDB60 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[3976] ole32.dll!OleLoadFromStream 7752981B 5 Bytes JMP 3E3E5691 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:\Program Files\Internet Explorer\IEXPLORE.EXE[3976] @ C:\WINDOWS\system32\ole32.dll [KERNEL32.dll!LoadLibraryExW] [451F1ACB] C:\Program Files\Internet Explorer\xpshims.dll (Internet Explorer Compatibility Shims for XP/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\Tcpip \Device\Ip NEOFLTR_650_15991.SYS (NetBIOS Redirector/Juniper Networks)
AttachedDevice \Driver\Tcpip \Device\Tcp NEOFLTR_650_15991.SYS (NetBIOS Redirector/Juniper Networks)
AttachedDevice \Driver\Tcpip \Device\Udp NEOFLTR_650_15991.SYS (NetBIOS Redirector/Juniper Networks)
AttachedDevice \Driver\Tcpip \Device\RawIp NEOFLTR_650_15991.SYS (NetBIOS Redirector/Juniper Networks)

---- EOF - GMER 1.0.15 ----





The ESET scan found nothing.

Thanks

#14 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:12:58 PM

Posted 14 July 2011 - 01:59 PM

Please perform the following, so that we can get the exact specs of your computer. This will better assist us in helping you more.

Publish a Snapshot using Speccy

The below is for those who cannot get online

Please take caution when attaching a text file to your post if you cannot copy/paste the link to your post, you will need to edit it to make sure that your Windows Key is not present.

#15 gsander

gsander
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 14 July 2011 - 02:12 PM

http://speccy.piriform.com/results/pLLiXUm5CP0Pq2rMPYF5EWe

Thanks




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users