Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

No Audio Output Device is Installed


  • Please log in to reply
5 replies to this topic

#1 leachim

leachim

  • Members
  • 125 posts
  • OFFLINE
  •  
  • Local time:12:50 PM

Posted 21 April 2014 - 10:47 AM

Hi

I have a Eec PC Seashell Netbook which has a red cross on the speaker item bottom right

Tried all I know - uninstalling drivers - checking bios 

There is a service called Realtek audio service that won't start - error 1067

Full spec here http://speccy.piriform.com/results/x...86ThzVBYZBn17g

Thanks
 


BC AdBot (Login to Remove)

 


#2 dc3

dc3

    Bleeping Treehugger


  • Members
  • 30,608 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Sierra Foothills of Northern Ca.
  • Local time:04:50 AM

Posted 21 April 2014 - 01:57 PM

Your Speccy report link does not work.

 

What operating system are you running?

 

What is the model of this computer.

 

Open the Device Manager and scroll down to Sound, video and game controller and double click on it.

 

Double click on Realtec high definition audio to open it, then click on Driver.  When that opens click on Update Driver.  If this doesn't resolve the issue you will need to uninstall the driver and go to the EEC support website and download new drivers from there.


Family and loved ones will always be a priority in my daily life.  You never know when one will leave you.

 

 

 

 


#3 leachim

leachim
  • Topic Starter

  • Members
  • 125 posts
  • OFFLINE
  •  
  • Local time:12:50 PM

Posted 23 April 2014 - 03:42 AM

Here s the spec again

==============

Summary
Operating System
Microsoft Windows 7 Starter 32-bit SP1
CPU
AMD C-60
40nm Technology
RAM
1.00 GB DDR3 @ 538MHz (7-7-7-20)
Motherboard
ASUSTeK Computer INC. 1015BXO (CPU 1) 59 °C
Graphics
Generic PnP Monitor (1024x600@60Hz)
AMD Radeon HD 6290 Graphics
Hard Drives
298GB Seagate ST932032 5AS SATA Disk Device (SATA) 35 °C
Optical Drives
No optical disk drives detected
Audio
No audio card detected
Operating System
Microsoft Windows 7 Starter 32-bit SP1
Computer type: Notebook
Installation Date: 04 July 2013, 20:06
Serial Number: 6K6WB-X73TD-KG794-FJYHG-YCJVG
Windows Security Center
User Account Control (UAC) Enabled
Notify level 2 - Default
Firewall Enabled
Windows Update
AutoUpdate Download Automatically and Install at Set Scheduled time
Schedule Frequency Every Day
Schedule Time 03:00
Windows Defender
Windows Defender Enabled
.NET Frameworks installed
v4.5 Full
v4.5 Client
v3.5 SP1
v3.0 SP2
v2.0 SP2
Environment Variables
USERPROFILE C:\Users\Catherine
SystemRoot C:\windows
User Variables
TEMP C:\Users\Catherine\AppData\Local\Temp
TMP C:\Users\Catherine\AppData\Local\Temp
Machine Variables
ComSpec C:\windows\system32\cmd.exe
FP_NO_HOST_CHECK NO
OS Windows_NT
Path C:\windows\system32
C:\windows
C:\windows\system32\wbem
C:\Program Files\Common Files\Microsoft Shared\Windows Live
C:\Program Files\AMD APP\bin\x86
%SYSTEMROOT%\System32\WindowsPowerShell\v1.0
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static
C:\Program Files\Windows Live\Shared
PATHEXT .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;. MSC
PROCESSOR_ARCHITECTURE x86
TEMP C:\windows\TEMP
TMP C:\windows\TEMP
USERNAME SYSTEM
windir C:\windows
PSModulePath C:\windows\system32\WindowsPowerShell\v1.0\Modules \
NUMBER_OF_PROCESSORS 2
PROCESSOR_LEVEL 20
PROCESSOR_IDENTIFIER x86 Family 20 Model 2 Stepping 0, AuthenticAMD
PROCESSOR_REVISION 0200
configsetroot C:\windows\ConfigSetRoot
AMDAPPSDKROOT C:\Program Files\AMD APP\
Battery
AC line Offline
Battery full time Unknown
Battery Charge % 76 %
Battery State High
Amount of time remaining (sec) 4 : 33
Power Profile
Active power scheme High Performance
Hibernation Enabled
Power Shutdown Enabled
Power Suspend Enabled
Turn Off Monitor after: (On AC Power) 20 min
Turn Off Monitor after: (On Battery Power) 5 min
Turn Off Hard Disk after: (On AC Power) Never
Turn Off Hard Disk after: (On Battery Power) 10 min
Suspend after: (On AC Power) Never
Suspend after: (On Battery Power) 5 min
Screen saver Enabled
Uptime
Current Session
Current Time 22/04/2014 20:13:29
Current Uptime 1912 sec (0 d, 00 h, 31 m, 52 s)
Last Boot Time 22/04/2014 19:41:37
TimeZone
TimeZone GMT
Language English (United Kingdom)
Location United Kingdom
Format English (United Kingdom)
Currency £
Date Format dd/MM/yyyy
Time Format HH:mm:ss
Process List
afwserv.exe
Process ID 1632
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\AVAST Software\Avast\afwServ.exe
Memory Usage 2.98 MB
Peak Memory Usage 11 MB
armsvc.exe
Process ID 1716
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
Memory Usage 2.89 MB
Peak Memory Usage 2.92 MB
asusservice.exe
Process ID 1808
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\AsusService.exe
Memory Usage 3.00 MB
Peak Memory Usage 3.26 MB
atieclxx.exe
Process ID 1200
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\atieclxx.exe
Memory Usage 5.93 MB
Peak Memory Usage 5.96 MB
atiesrxx.exe
Process ID 832
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\atiesrxx.exe
Memory Usage 2.98 MB
Peak Memory Usage 3.01 MB
avastsvc.exe
Process ID 1396
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\AVAST Software\Avast\AvastSvc.exe
Memory Usage 8.10 MB
Peak Memory Usage 68 MB
avastui.exe
Process ID 2008
User Catherine
Domain Catherine1949PC
Path C:\Program Files\AVAST Software\Avast\AvastUI.exe
Memory Usage 15 MB
Peak Memory Usage 23 MB
capshook.exe
Process ID 960
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\ASUS\CapsHook\CapsHook.exe
Memory Usage 4.08 MB
Peak Memory Usage 4.14 MB
ccc.exe
Process ID 3768
User Catherine
Domain Catherine1949PC
Path C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
Memory Usage 6.62 MB
Peak Memory Usage 57 MB
conhost.exe
Process ID 5316
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\conhost.exe
Memory Usage 3.54 MB
Peak Memory Usage 3.55 MB
csrss.exe
Process ID 404
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\csrss.exe
Memory Usage 3.35 MB
Peak Memory Usage 3.35 MB
csrss.exe
Process ID 476
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\csrss.exe
Memory Usage 8.54 MB
Peak Memory Usage 11 MB
cvhsvc.exe
Process ID 2736
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\Common Files\Microsoft Shared\Virtualization Handler\CVHSVC.EXE
Memory Usage 13 MB
Peak Memory Usage 13 MB
dwm.exe
Process ID 2212
User Catherine
Domain Catherine1949PC
Path C:\windows\system32\Dwm.exe
Memory Usage 3.07 MB
Peak Memory Usage 3.09 MB
eeestoragecommander.exe
Process ID 5308
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\ASUS\LiveUpdate\EeeStorageCommander.exe
Memory Usage 17 MB
Peak Memory Usage 17 MB
etdctrl.exe
Process ID 776
User Catherine
Domain Catherine1949PC
Path C:\Program Files\Elantech\ETDCtrl.exe
Memory Usage 7.94 MB
Peak Memory Usage 8.27 MB
etdctrlhelper.exe
Process ID 3976
User Catherine
Domain Catherine1949PC
Path C:\Program Files\Elantech\ETDCtrlHelper.exe
Memory Usage 4.86 MB
Peak Memory Usage 4.99 MB
explorer.exe
Process ID 3120
User Catherine
Domain Catherine1949PC
Path C:\windows\Explorer.EXE
Memory Usage 49 MB
Peak Memory Usage 50 MB
fuel.service.exe
Process ID 1736
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe
Memory Usage 6.82 MB
Peak Memory Usage 6.91 MB
googleupdate.exe
Process ID 3512
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\Google\Update\GoogleUpdate.exe
Memory Usage 888 KB
Peak Memory Usage 5.10 MB
hotkeymon.exe
Process ID 1168
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\ASUS\HotkeyService\HotKeyMon.exe
Memory Usage 4.13 MB
Peak Memory Usage 4.16 MB
hotkeyservice.exe
Process ID 2776
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\ASUS\HotkeyService\HotkeyService.exe
Memory Usage 6.09 MB
Peak Memory Usage 6.20 MB
hpnetworkcommunicator.exe
Process ID 2316
User Catherine
Domain Catherine1949PC
Path C:\Program Files\HP\HP Deskjet 3070 B611 series\Bin\HPNetworkCommunicator.exe
Memory Usage 6.22 MB
Peak Memory Usage 6.22 MB
insonsrv.exe
Process ID 1764
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\Common Files\InstantOn\InsOnSrv.exe
Memory Usage 3.39 MB
Peak Memory Usage 3.43 MB
insonwmi.exe
Process ID 4024
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\Common Files\InstantOn\InsOnWMI.exe
Memory Usage 5.52 MB
Peak Memory Usage 5.56 MB
liveupdate.exe
Process ID 2340
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\Asus\LiveUpdate\LiveUpdate.exe
Memory Usage 13 MB
Peak Memory Usage 13 MB
lsass.exe
Process ID 588
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\lsass.exe
Memory Usage 7.84 MB
Peak Memory Usage 7.84 MB
lsm.exe
Process ID 596
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\lsm.exe
Memory Usage 3.06 MB
Peak Memory Usage 3.06 MB
mom.exe
Process ID 2484
User Catherine
Domain Catherine1949PC
Path C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
Memory Usage 3.48 MB
Peak Memory Usage 18 MB
presentationfontcache.exe
Process ID 4672
User LOCAL SERVICE
Domain NT AUTHORITY
Path C:\windows\Microsoft.Net\Framework\v3.0\WPF\Presen tationFontCache.exe
Memory Usage 9.59 MB
Peak Memory Usage 9.62 MB
scantopcactivationapp.exe
Process ID 1016
User Catherine
Domain Catherine1949PC
Path C:\Program Files\HP\HP Deskjet 3070 B611 series\Bin\ScanToPCActivationApp.exe
Memory Usage 7.61 MB
Peak Memory Usage 7.62 MB
searchfilterhost.exe
Process ID 4812
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\SearchFilterHost.exe
Memory Usage 3.43 MB
Peak Memory Usage 3.43 MB
searchindexer.exe
Process ID 1892
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\SearchIndexer.exe
Memory Usage 12 MB
Peak Memory Usage 12 MB
searchprotocolhost.exe
Process ID 4900
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\SearchProtocolHost.exe
Memory Usage 6.23 MB
Peak Memory Usage 6.47 MB
services.exe
Process ID 580
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\services.exe
Memory Usage 6.61 MB
Peak Memory Usage 8.87 MB
sftlist.exe
Process ID 2064
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\Microsoft Application Virtualization Client\sftlist.exe
Memory Usage 12 MB
Peak Memory Usage 12 MB
sftvsa.exe
Process ID 368
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\Microsoft Application Virtualization Client\sftvsa.exe
Memory Usage 3.77 MB
Peak Memory Usage 3.83 MB
sidebar.exe
Process ID 2604
User Catherine
Domain Catherine1949PC
Path C:\Program Files\Windows Sidebar\sidebar.exe
Memory Usage 31 MB
Peak Memory Usage 31 MB
smss.exe
Process ID 308
User SYSTEM
Domain NT AUTHORITY
Path \SystemRoot\System32\smss.exe
Memory Usage 824 KB
Peak Memory Usage 836 KB
speccy.exe
Process ID 3356
User Catherine
Domain Catherine1949PC
Path C:\Program Files\Speccy\Speccy.exe
Memory Usage 17 MB
Peak Memory Usage 17 MB
spoolsv.exe
Process ID 1520
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\System32\spoolsv.exe
Memory Usage 9.82 MB
Peak Memory Usage 9.83 MB
superhybridengine.exe
Process ID 2480
User SYSTEM
Domain NT AUTHORITY
Path C:\Program Files\ASUS\SHE\SuperHybridEngine.exe
Memory Usage 5.16 MB
Peak Memory Usage 5.21 MB
svchost.exe
Process ID 1316
User NETWORK SERVICE
Domain NT AUTHORITY
Path C:\windows\system32\svchost.exe
Memory Usage 12 MB
Peak Memory Usage 12 MB
svchost.exe
Process ID 1584
User LOCAL SERVICE
Domain NT AUTHORITY
Path C:\windows\system32\svchost.exe
Memory Usage 9.18 MB
Peak Memory Usage 26 MB
svchost.exe
Process ID 1848
User LOCAL SERVICE
Domain NT AUTHORITY
Path C:\windows\system32\svchost.exe
Memory Usage 7.44 MB
Peak Memory Usage 7.45 MB
svchost.exe
Process ID 352
User LOCAL SERVICE
Domain NT AUTHORITY
Path C:\windows\system32\svchost.exe
Memory Usage 7.05 MB
Peak Memory Usage 7.29 MB
svchost.exe
Process ID 1024
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\svchost.exe
Memory Usage 28 MB
Peak Memory Usage 28 MB
svchost.exe
Process ID 3036
User NETWORK SERVICE
Domain NT AUTHORITY
Path C:\windows\system32\svchost.exe
Memory Usage 4.09 MB
Peak Memory Usage 4.16 MB
svchost.exe
Process ID 3648
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\System32\svchost.exe
Memory Usage 29 MB
Peak Memory Usage 48 MB
svchost.exe
Process ID 692
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\svchost.exe
Memory Usage 6.57 MB
Peak Memory Usage 6.75 MB
svchost.exe
Process ID 784
User NETWORK SERVICE
Domain NT AUTHORITY
Path C:\windows\system32\svchost.exe
Memory Usage 5.41 MB
Peak Memory Usage 5.41 MB
svchost.exe
Process ID 5856
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\svchost.exe
Memory Usage 3.15 MB
Peak Memory Usage 3.41 MB
svchost.exe
Process ID 924
User LOCAL SERVICE
Domain NT AUTHORITY
Path C:\windows\System32\svchost.exe
Memory Usage 14 MB
Peak Memory Usage 15 MB
svchost.exe
Process ID 964
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\System32\svchost.exe
Memory Usage 33 MB
Peak Memory Usage 44 MB
svchost.exe
Process ID 988
User LOCAL SERVICE
Domain NT AUTHORITY
Path C:\windows\system32\svchost.exe
Memory Usage 7.85 MB
Peak Memory Usage 8.02 MB
svchost.exe
Process ID 1112
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\svchost.exe
Memory Usage 3.97 MB
Peak Memory Usage 3.97 MB
svchost.exe
Process ID 3820
User LOCAL SERVICE
Domain NT AUTHORITY
Path C:\windows\System32\svchost.exe
Memory Usage 4.62 MB
Peak Memory Usage 4.62 MB
system
Process ID 4
system idle process
Process ID 0
taskeng.exe
Process ID 4412
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\taskeng.exe
Memory Usage 3.48 MB
Peak Memory Usage 3.59 MB
taskhost.exe
Process ID 4040
User Catherine
Domain Catherine1949PC
Path C:\windows\system32\taskhost.exe
Memory Usage 8.32 MB
Peak Memory Usage 8.32 MB
wininit.exe
Process ID 484
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\wininit.exe
Memory Usage 3.19 MB
Peak Memory Usage 3.28 MB
winlogon.exe
Process ID 532
User SYSTEM
Domain NT AUTHORITY
Path C:\windows\system32\winlogon.exe
Memory Usage 5.17 MB
Peak Memory Usage 6.59 MB
wmiprvse.exe
Process ID 2284
User SYSTEM
Domain NT AUTHORITY
Path C:\Windows\System32\wbem\WmiPrvSE.exe
Memory Usage 5.24 MB
Peak Memory Usage 5.56 MB
wmiprvse.exe
Process ID 5788
User NETWORK SERVICE
Domain NT AUTHORITY
Path C:\Windows\System32\wbem\WmiPrvSE.exe
Memory Usage 7.55 MB
Peak Memory Usage 7.56 MB
wudfhost.exe
Process ID 6048
User LOCAL SERVICE
Domain NT AUTHORITY
Path C:\windows\System32\WUDFHost.exe
Memory Usage 4.73 MB
Peak Memory Usage 4.75 MB
Scheduler
22/04/2014 20:01; HP Photo Creations Messager
22/04/2014 20:05; Adobe Flash Player Updater
22/04/2014 20:35; HPCustParticipation HP Deskjet 3070 B611 series
22/04/2014 20:55; GoogleUpdateTaskMachineUA
23/04/2014 16:32; ProgramRefresh-ATFST
23/04/2014 16:40; ProgramUpdateCheck
23/04/2014 18:55; GoogleUpdateTaskMachineCore
23/04/2014 19:48; FreeFileViewerUpdateChecker
ASC7_SkipUac_Catherine
CreateChoiceProcessTask
HpWebReg.exe
SidebarExecute
Hotfixes
22/04/2014 Definition Update for Windows Defender - KB915597 (Definition 1.173.291.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
20/04/2014 Cumulative Security Update for Internet Explorer 11 for Windows 7 (KB2929437)
A security issue has been identified in a Microsoft software
product that could affect your system. You can help protect your
system by installing this update from Microsoft. For a complete
listing of the issues that are included in this update, see the
associated Microsoft Knowledge Base article. After you install
this update, you may have to restart your system.
18/04/2014 Definition Update for Windows Defender - KB915597 (Definition 1.173.27.0)
Install this update to revise the definition files used to detect
spyware and other potentially unwanted software. Once you have
installed this item, it cannot be removed.
System Folders
Path for burning CD C:\Users\Catherine\AppData\Local\Microsoft\Windows \Burn\Burn
Application Data C:\ProgramData
Public Desktop C:\Users\Public\Desktop
Documents C:\Users\Public\Documents
Global Favorites C:\Users\Catherine\Favorites
Music C:\Users\Public\Music
Pictures C:\Users\Public\Pictures
Start Menu Programs C:\ProgramData\Microsoft\Windows\Start Menu\Programs
Start Menu C:\ProgramData\Microsoft\Windows\Start Menu
Startup C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup
Templates C:\ProgramData\Microsoft\Windows\Templates
Videos C:\Users\Public\Videos
Cookies C:\Users\Catherine\AppData\Roaming\Microsoft\Windo ws\Cookies
Desktop C:\Users\Catherine\Desktop
Physical Desktop C:\Users\Catherine\Desktop
User Favorites C:\Users\Catherine\Favorites
Fonts C:\windows\Fonts
Internet History C:\Users\Catherine\AppData\Local\Microsoft\Windows \History
Temporary Internet Files C:\Users\Catherine\AppData\Local\Microsoft\Windows \Temporary Internet Files
Local Application Data C:\Users\Catherine\AppData\Local
Windows Directory C:\windows
Windows/System C:\windows\system32
Program Files C:\Program Files
Services
Running Adobe Acrobat Update Service
Running AMD External Events Utility
Running AMD FUEL Service
Running Application Information
Running Application Virtualization Client
Running Application Virtualization Service Agent
Running ASUS InstantOn Service
Running Asus Launcher Service
Running avast! Antivirus
Running avast! Firewall
Running Background Intelligent Transfer Service
Running Base Filtering Engine
Running Client Virtualization Handler
Running CNG Key Isolation
Running COM+ Event System
Running Computer Browser
Running Cryptographic Services
Running DCOM Server Process Launcher
Running Desktop Window Manager Session Manager
Running DHCP Client
Running Diagnostic Policy Service
Running Diagnostic Service Host
Running Diagnostic System Host
Running Distributed Link Tracking Client
Running DNS Client
Running Extensible Authentication Protocol
Running Function Discovery Resource Publication
Running Group Policy Client
Running IP Helper
Running IPsec Policy Agent
Running Network Connections
Running Network List Service
Running Network Location Awareness
Running Network Store Interface Service
Running Peer Name Resolution Protocol
Running Peer Networking Identity Manager
Running Plug and Play
Running Portable Device Enumerator Service
Running Power
Running Print Spooler
Running Program Compatibility Assistant Service
Running Remote Desktop Services
Running Remote Procedure Call (RPC)
Running RPC Endpoint Mapper
Running Security Accounts Manager
Running Security Center
Running Server
Running Shell Hardware Detection
Running SSDP Discovery
Running Superfetch
Running System Event Notification Service
Running Task Scheduler
Running TCP/IP NetBIOS Helper
Running Themes
Running UPnP Device Host
Running User Profile Service
Running Windows Audio
Running Windows Audio Endpoint Builder
Running Windows Backup
Running Windows Defender
Running Windows Driver Foundation - User-mode Driver Framework
Running Windows Event Log
Running Windows Firewall
Running Windows Font Cache Service
Running Windows Image Acquisition (WIA)
Running Windows Management Instrumentation
Running Windows Presentation Foundation Font Cache 3.0.0.0
Running Windows Search
Running Windows Update
Running WinHTTP Web Proxy Auto-Discovery Service
Running WLAN AutoConfig
Running Workstation
Stopped ActiveX Installer (AxInstSV)
Stopped Adobe Flash Player Update Service
Stopped Application Experience
Stopped Application Identity
Stopped Application Layer Gateway Service
Stopped ASP.NET State Service
Stopped BitLocker Drive Encryption Service
Stopped Block Level Backup Engine Service
Stopped Bluetooth Support Service
Stopped Certificate Propagation
Stopped COM+ System Application
Stopped Credential Manager
Stopped Disk Defragmenter
Stopped Distributed Transaction Coordinator
Stopped Encrypting File System (EFS)
Stopped Fax
Stopped Function Discovery Provider Host
Stopped Google Software Updater
Stopped Google Update Service (gupdate)
Stopped Google Update Service (gupdatem)
Stopped Health Key and Certificate Management
Stopped HomeGroup Listener
Stopped HomeGroup Provider
Stopped Human Interface Device Access
Stopped IKE and AuthIP IPsec Keying Modules
Stopped Interactive Services Detection
Stopped Internet Connection Sharing (ICS)
Stopped Internet Explorer ETW Collector Service
Stopped KtmRm for Distributed Transaction Coordinator
Stopped Link-Layer Topology Discovery Mapper
Stopped LiveUpdate
Stopped Microsoft .NET Framework NGEN v2.0.50727_X86
Stopped Microsoft .NET Framework NGEN v4.0.30319_X86
Stopped Microsoft iSCSI Initiator Service
Stopped Microsoft Software Shadow Copy Provider
Stopped Multimedia Class Scheduler
Stopped Net.Msmq Listener Adapter
Stopped Net.Pipe Listener Adapter
Stopped Net.Tcp Listener Adapter
Stopped Net.Tcp Port Sharing Service
Stopped Netlogon
Stopped Network Access Protection Agent
Stopped Office Source Engine
Stopped Office Software Protection Platform
Stopped Parental Controls
Stopped Peer Networking Grouping
Stopped Performance Logs & Alerts
Stopped PnP-X IP Bus Enumerator
Stopped PNRP Machine Name Publication Service
Stopped Problem Reports and Solutions Control Panel Support
Stopped Protected Storage
Stopped Quality Windows Audio Video Experience
Stopped Realtek Audio Service
Stopped Remote Access Auto Connection Manager
Stopped Remote Access Connection Manager
Stopped Remote Desktop Configuration
Stopped Remote Procedure Call (RPC) Locator
Stopped Remote Registry
Stopped Routing and Remote Access
Stopped Secondary Logon
Stopped Secure Socket Tunneling Protocol Service
Stopped Smart Card
Stopped Smart Card Removal Policy
Stopped SNMP Trap
Stopped Software Protection
Stopped SPP Notification Service
Stopped Tablet PC Input Service
Stopped Telephony
Stopped Thread Ordering Server
Stopped TPM Base Services
Stopped VideAceWindowsService
Stopped Virtual Disk
Stopped Volume Shadow Copy
Stopped WebClient
Stopped Windows Activation Technologies Service
Stopped Windows Biometric Service
Stopped Windows CardSpace
Stopped Windows Color System
Stopped Windows Connect Now - Config Registrar
Stopped Windows Error Reporting Service
Stopped Windows Event Collector
Stopped Windows Installer
Stopped Windows Live Family Safety Service
Stopped Windows Live ID Sign-in Assistant
Stopped Windows Media Player Network Sharing Service
Stopped Windows Modules Installer
Stopped Windows Remote Management (WS-Management)
Stopped Windows Time
Stopped Wired AutoConfig
Stopped WMI Performance Adapter
Stopped WWAN AutoConfig
Security Options
Accounts: Administrator account status Disabled
Accounts: Guest account status Disabled
Accounts: Limit local account use of blank passwords to console logon only Enabled
Accounts: Rename administrator account Administrator
Accounts: Rename guest account Guest
Audit: Audit the access of global system objects Disabled
Audit: Audit the use of Backup and Restore privilege Disabled
Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings Not Defined
Audit: Shut down system immediately if unable to log security audits Disabled
DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax Not Defined
DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax Not Defined
Devices: Allow undock without having to log on Enabled
Devices: Allowed to format and eject removable media Not Defined
Devices: Prevent users from installing printer drivers Disabled
Devices: Restrict CD-ROM access to locally logged-on user only Not Defined
Devices: Restrict floppy access to locally logged-on user only Not Defined
Domain controller: Allow server operators to schedule tasks Not Defined
Domain controller: LDAP server signing requirements Not Defined
Domain controller: Refuse machine account password changes Not Defined
Domain member: Digitally encrypt or sign secure channel data (always) Enabled
Domain member: Digitally encrypt secure channel data (when possible) Enabled
Domain member: Digitally sign secure channel data (when possible) Enabled
Domain member: Disable machine account password changes Disabled
Domain member: Maximum machine account password age 30 days
Domain member: Require strong (Windows 2000 or later) session key Enabled
Interactive logon: Display user information when the session is locked Not Defined
Interactive logon: Do not display last user name Disabled
Interactive logon: Do not require CTRL+ALT+DEL Not Defined
Interactive logon: Message text for users attempting to log on
Interactive logon: Message title for users attempting to log on
Interactive logon: Number of previous logons to cache (in case domain controller is not available) 10 logons
Interactive logon: Prompt user to change password before expiration 5 days
Interactive logon: Require Domain Controller authentication to unlock workstation Disabled
Interactive logon: Require smart card Disabled
Interactive logon: Smart card removal behavior No Action
Microsoft network client: Digitally sign communications (always) Disabled
Microsoft network client: Digitally sign communications (if server agrees) Enabled
Microsoft network client: Send unencrypted password to third-party SMB servers Disabled
Microsoft network server: Amount of idle time required before suspending session 15 minutes
Microsoft network server: Digitally sign communications (always) Disabled
Microsoft network server: Digitally sign communications (if client agrees) Disabled
Microsoft network server: Disconnect clients when logon hours expire Enabled
Microsoft network server: Server SPN target name validation level Not Defined
Network access: Allow anonymous SID/Name translation Disabled
Network access: Do not allow anonymous enumeration of SAM accounts Enabled
Network access: Do not allow anonymous enumeration of SAM accounts and shares Disabled
Network access: Do not allow storage of passwords and credentials for network authentication Disabled
Network access: Let Everyone permissions apply to anonymous users Disabled
Network access: Named Pipes that can be accessed anonymously
Network access: Remotely accessible registry paths System\CurrentControlSet\Control\ProductOptions,Sy stem\CurrentControlSet\Control\Server Applications,Software\Microsoft\Windows NT\CurrentVersion
Network access: Remotely accessible registry paths and sub-paths System\CurrentControlSet\Control\Print\Printers,Sy stem\CurrentControlSet\Services\Eventlog,Software\ Microsoft\OLAP Server,Software\Microsoft\Windows NT\CurrentVersion\Print,Software\Microsoft\Windows NT\CurrentVersion\Windows,System\CurrentControlSet \Control\ContentIndex,System\CurrentControlSet\Con trol\Terminal Server,System\CurrentControlSet\Control\Terminal Server\UserConfig,System\CurrentControlSet\Control \Terminal Server\DefaultUserConfiguration,Software\Microsoft \Windows NT\CurrentVersion\Perflib,System\CurrentControlSet \Services\SysmonLog
Network access: Restrict anonymous access to Named Pipes and Shares Enabled
Network access: Shares that can be accessed anonymously Not Defined
Network access: Sharing and security model for local accounts Classic - local users authenticate as themselves
Network security: Allow Local System to use computer identity for NTLM Not Defined
Network security: Allow LocalSystem NULL session fallback Not Defined
Network Security: Allow PKU2U authentication requests to this computer to use online identities Not Defined
Network security: Configure encryption types allowed for Kerberos Not Defined
Network security: Do not store LAN Manager hash value on next password change Enabled
Network security: Force logoff when logon hours expire Disabled
Network security: LAN Manager authentication level Not Defined
Network security: LDAP client signing requirements Negotiate signing
Network security: Minimum session security for NTLM SSP based (including secure RPC) clients Require 128-bit encryption
Network security: Minimum session security for NTLM SSP based (including secure RPC) servers Require 128-bit encryption
Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication Not Defined
Network security: Restrict NTLM: Add server exceptions in this domain Not Defined
Network security: Restrict NTLM: Audit Incoming NTLM Traffic Not Defined
Network security: Restrict NTLM: Audit NTLM authentication in this domain Not Defined
Network security: Restrict NTLM: Incoming NTLM traffic Not Defined
Network security: Restrict NTLM: NTLM authentication in this domain Not Defined
Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers Not Defined
Recovery console: Allow automatic administrative logon Disabled
Recovery console: Allow floppy copy and access to all drives and all folders Disabled
Shutdown: Allow system to be shut down without having to log on Enabled
Shutdown: Clear virtual memory pagefile Disabled
System cryptography: Force strong key protection for user keys stored on the computer Not Defined
System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing Disabled
System objects: Require case insensitivity for non-Windows subsystems Enabled
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) Enabled
System settings: Optional subsystems Posix
System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies Disabled
User Account Control: Admin Approval Mode for the Built-in Administrator account Disabled
User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop Disabled
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode Prompt for consent for non-Windows binaries
User Account Control: Behavior of the elevation prompt for standard users Prompt for credentials
User Account Control: Detect application installations and prompt for elevation Enabled
User Account Control: Only elevate executables that are signed and validated Disabled
User Account Control: Only elevate UIAccess applications that are installed in secure locations Enabled
User Account Control: Run all administrators in Admin Approval Mode Enabled
User Account Control: Switch to the secure desktop when prompting for elevation Enabled
User Account Control: Virtualize file and registry write failures to per-user locations Enabled
Device Tree
ACPI x86-based PC
Microsoft ACPI-Compliant System
ACPI Power Button
High precision event timer
Motherboard resources
System board
AMD C-60 APU with Radeon HD Graphics
AMD C-60 APU with Radeon HD Graphics
Microsoft Windows Management Interface for ACPI
ACPI Lid
ACPI Sleep Button
ACPI Thermal Zone
ACPI Fixed Feature Button
PCI bus
AMD SMBus
ATI I/O Communications Processor PCI Bus Controller
PCI standard host CPU bridge
PCI standard host CPU bridge
PCI standard host CPU bridge
PCI standard host CPU bridge
PCI standard host CPU bridge
PCI standard host CPU bridge
PCI standard host CPU bridge
PCI standard host CPU bridge
System board
Microsoft ACPI-Compliant Control Method Battery
Microsoft AC Adapter
PCI standard host CPU bridge
Motherboard resources
AMD Radeon HD 6290 Graphics
Generic PnP Monitor
High Definition Audio Controller
Unknown Device
PCI standard PCI-to-PCI bridge
Atheros AR9285 Wireless Network Adapter
PCI standard PCI-to-PCI bridge
Atheros AR8152/8158 PCI-E Fast Ethernet Controller (NDIS 6.20)
AMD SATA Controller
ST932032 5AS SATA Disk Device
Standard OpenHCD USB Host Controller
USB Root Hub
Standard Enhanced PCI to USB Host Controller
USB Root Hub
USB Mass Storage Device
Corsair Voyager USB Device
Standard OpenHCD USB Host Controller
USB Root Hub
Standard Enhanced PCI to USB Host Controller
USB Root Hub
USB Composite Device
USB2.0 UVC VGA WebCam
High Definition Audio Controller
Unknown Device
PCI standard ISA bridge
Motherboard resources
ELAN PS/2 Port Smart-Pad
Keyboard Device Filter
Microsoft ACPI-Compliant Embedded Controller
Programmable interrupt controller
Direct memory access controller
System timer
System CMOS/real time clock
System speaker
 



#4 dc3

dc3

    Bleeping Treehugger


  • Members
  • 30,608 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Sierra Foothills of Northern Ca.
  • Local time:04:50 AM

Posted 23 April 2014 - 09:42 AM

That log is incomplete.  Please use the instructions below, follow them exactly.


Family and loved ones will always be a priority in my daily life.  You never know when one will leave you.

 

 

 

 


#5 hamluis

hamluis

    Moderator


  • Moderator
  • 55,887 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Killeen, TX
  • Local time:06:50 AM

Posted 23 April 2014 - 05:02 PM

Publish a Snapshot using Speccy - http://www.bleepingcomputer.com/forums/topic323892.html/page__p__1797792#entry1797792 , taking care to post the link of the snapshot in your next post.
 

Louis



#6 dc3

dc3

    Bleeping Treehugger


  • Members
  • 30,608 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Sierra Foothills of Northern Ca.
  • Local time:04:50 AM

Posted 24 April 2014 - 09:17 AM

I guess I chose a font too small to be legible. :whistle:

 

Please download and install Speccy to provide us with information about your computer.  When  FileHippo opens, click on Download latest version in the upper right pane.
 
When Speccy opens you will see a screen similar to the one below.
 
speccy9_zps2d9cdedc.png
 
Click on File which is outlined in red in the screen above, and then click on Publish Snapshot.
 
The following screen will appear, click on Yes.
 
speccy7_zpsfa02105f.png
 
The following screen will appear, click on Copy to Clipboard.
 
speccy3_zps1791b093.png
 
In your next post right click inside the Reply to Topic box, then click on Paste.  This will load a link to the Speccy log.

Edited by dc3, 24 April 2014 - 09:18 AM.

Family and loved ones will always be a priority in my daily life.  You never know when one will leave you.

 

 

 

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users