New
#1
Constant BSoD all month
Lately a friend has been having constant BSoD's, and I can't narrow down to what the culprit causing them may be.
I've attached log, dmp and BSoD rars which contain everything related to the BSoD's.
Specs
Code:Summary Operating System MS Windows 7 Ultimate 64-bit SP1 CPU Intel Core 2 Quad Q6600 @ 2.40GHz 50 °C Kentsfield 65nm Technology RAM 3.00 GB DDR2 Motherboard Dell Inc. 0CT017 (Microprocessor) Graphics E321VL (1366x768@60Hz) NVIDIA Quadro NVS 285 (Microsoft Corporation - WDDM) (nVidia) Hard Drives 466GB Western Digital WDC WD5000AACS-00ZUB0 ATA Device (SATA) 39 °C Optical Drives hp DVD-RAM GH60L ATA Device DTSOFT Virtual CdRom Device TSSTcorp DVD+-RW TS-H653B ATA Device Audio High Definition Audio Device Operating System MS Windows 7 Ultimate 64-bit SP1 Computer type: Tower Installation Date: 19 June 2012, 22:22 Serial Number: 342DG-6YJR8-X92GV-V7DCV-P4K27 Windows Security Center User Account Control (UAC) Disabled Firewall Disabled Antivirus Disabled Windows Update AutoUpdate Download Automatically and Install at Set Scheduled time Schedule Frequency Every day Schedule Time 3 am Windows Defender Windows Defender Disabled Environment Variables USERPROFILE C:\Users\Mahya Bell SystemRoot C:\Windows User Variables TEMP C:\Users\Mahya Bell\AppData\Local\Temp TMP C:\Users\Mahya Bell\AppData\Local\Temp MOZ_PLUGIN_PATH C:\Program Files\Tracker Software\PDF Viewer\Win32\ Machine Variables ComSpec C:\Windows\system32\cmd.exe FP_NO_HOST_CHECK NO OS Windows_NT Path C:\Windows\system32 C:\Windows C:\Windows\System32\Wbem %SYSTEMROOT%\System32\WindowsPowerShell\v1.0\ C:\Program Files (x86)\QuickTime\QTSystem\ PATHEXT .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC PROCESSOR_ARCHITECTURE AMD64 TEMP C:\Windows\TEMP TMP C:\Windows\TEMP USERNAME SYSTEM windir C:\Windows PSModulePath C:\Windows\system32\WindowsPowerShell\v1.0\Modules\ NUMBER_OF_PROCESSORS 4 PROCESSOR_LEVEL 6 PROCESSOR_IDENTIFIER Intel64 Family 6 Model 15 Stepping 11, GenuineIntel PROCESSOR_REVISION 0f0b windows_tracing_logfile C:\BVTBin\Tests\installpackage\csilogfile.log windows_tracing_flags 3 CLASSPATH .;C:\Program Files (x86)\QuickTime\QTSystem\QTJava.zip QTJAVA C:\Program Files (x86)\QuickTime\QTSystem\QTJava.zip Battery AC line Online Battery full time Unknown Battery Charge % Unknown Battery State No Battery Amount of time remaining (sec) Unknown Power Profile Active power scheme Home/Office Desk Hibernation Enabled Power Shutdown Enabled Power Suspend Enabled Turn Off Monitor after: (On AC Power) Never Turn Off Monitor after: (On Battery Power) Never Turn Off Hard Disk after: (On AC Power) 20 min Turn Off Hard Disk after: (On Battery Power) 10 min Suspend after: (On AC Power) 30 min Suspend after: (On Battery Power) 15 min Screen saver Enabled Uptime Current Session Current Time 7/11/2012 5:02:14 PM Current Uptime 1055 sec (0 d, 00 h, 17 m, 35 s) Last Boot Time 7/11/2012 4:44:39 PM Last ShutDown Time 7/11/2012 3:17:50 AM Uptime Statistics First Boot Time 6/19/2012 10:16:33 PM First Shutdown Time 6/19/2012 10:19:17 PM Total Uptime 1044512 sec (12 d, 02 h, 08 m, 32 s) Total Downtime 298933 sec (3 d, 11 h, 02 m, 13 s) Longest Uptime 347856 sec (4 d, 00 h, 37 m, 36 s) Longest Downtime 186069 sec (2 d, 03 h, 41 m, 09 s) Total Reboots 28 System Availability 77.75% TimeZone TimeZone GMT -8 Hours Language English Country United States Currency $ Date Format M/d/yyyy Time Format h:mm:ss tt Scheduler 7/11/2012 5:31 PM; GoogleUpdateTaskUserS-1-5-21-151697316-1625926741-232140047-1000UA 7/11/2012 10:31 PM; GoogleUpdateTaskUserS-1-5-21-151697316-1625926741-232140047-1000Core 7/12/2012 4:46 PM; AutoKMS SidebarExecute Process List audiodg.exe Process ID 1652 avgcsrva.exe Process ID 4248 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\AVG\AVG2012\avgcsrva.exe Memory Usage 35 MB Peak Memory Usage 37 MB avgcsrva.exe Process ID 924 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\AVG\AVG2012\avgcsrva.exe Memory Usage 34 MB Peak Memory Usage 36 MB avgemca.exe Process ID 2784 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\AVG\AVG2012\avgemca.exe Memory Usage 6.70 MB Peak Memory Usage 7.51 MB avgfws.exe Process ID 1740 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\AVG\AVG2012\avgfws.exe Memory Usage 20 MB Peak Memory Usage 31 MB avgidsagent.exe Process ID 2240 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\AVG\AVG2012\avgidsagent.exe Memory Usage 15 MB Peak Memory Usage 24 MB avgnsa.exe Process ID 2568 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\AVG\AVG2012\avgnsa.exe Memory Usage 8.69 MB Peak Memory Usage 11 MB avgrsa.exe Process ID 640 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\AVG\AVG2012\avgrsa.exe Memory Usage 5.67 MB Peak Memory Usage 20 MB avgtray.exe Process ID 4024 User Mahya Bell Domain MahyaBell-PC Path C:\Program Files (x86)\AVG\AVG2012\avgtray.exe Memory Usage 14 MB Peak Memory Usage 14 MB avgwdsvc.exe Process ID 1904 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\AVG\AVG2012\avgwdsvc.exe Memory Usage 5.42 MB Peak Memory Usage 18 MB chrome.exe Process ID 2856 User Mahya Bell Domain MahyaBell-PC Path C:\Users\Mahya Bell\AppData\Local\Google\Chrome\Application\chrome.exe Memory Usage 41 MB Peak Memory Usage 53 MB chrome.exe Process ID 3164 User Mahya Bell Domain MahyaBell-PC Path C:\Users\Mahya Bell\AppData\Local\Google\Chrome\Application\chrome.exe Memory Usage 49 MB Peak Memory Usage 60 MB chrome.exe Process ID 4996 User Mahya Bell Domain MahyaBell-PC Path C:\Users\Mahya Bell\AppData\Local\Google\Chrome\Application\chrome.exe Memory Usage 58 MB Peak Memory Usage 71 MB chrome.exe Process ID 4908 User Mahya Bell Domain MahyaBell-PC Path C:\Users\Mahya Bell\AppData\Local\Google\Chrome\Application\chrome.exe Memory Usage 27 MB Peak Memory Usage 36 MB chrome.exe Process ID 4788 User Mahya Bell Domain MahyaBell-PC Path C:\Users\Mahya Bell\AppData\Local\Google\Chrome\Application\chrome.exe Memory Usage 50 MB Peak Memory Usage 133 MB chrome.exe Process ID 4736 User Mahya Bell Domain MahyaBell-PC Path C:\Users\Mahya Bell\AppData\Local\Google\Chrome\Application\chrome.exe Memory Usage 13 MB Peak Memory Usage 13 MB chrome.exe Process ID 4572 User Mahya Bell Domain MahyaBell-PC Path C:\Users\Mahya Bell\AppData\Local\Google\Chrome\Application\chrome.exe Memory Usage 22 MB Peak Memory Usage 25 MB chrome.exe Process ID 4560 User Mahya Bell Domain MahyaBell-PC Path C:\Users\Mahya Bell\AppData\Local\Google\Chrome\Application\chrome.exe Memory Usage 19 MB Peak Memory Usage 19 MB chrome.exe Process ID 4424 User Mahya Bell Domain MahyaBell-PC Path C:\Users\Mahya Bell\AppData\Local\Google\Chrome\Application\chrome.exe Memory Usage 95 MB Peak Memory Usage 111 MB chrome.exe Process ID 3628 User Mahya Bell Domain MahyaBell-PC Path C:\Users\Mahya Bell\AppData\Local\Google\Chrome\Application\chrome.exe Memory Usage 81 MB Peak Memory Usage 86 MB chrome.exe Process ID 3380 User Mahya Bell Domain MahyaBell-PC Path C:\Users\Mahya Bell\AppData\Local\Google\Chrome\Application\chrome.exe Memory Usage 41 MB Peak Memory Usage 47 MB csrss.exe Process ID 724 User SYSTEM Domain NT AUTHORITY Path C:\Windows\system32\csrss.exe Memory Usage 13 MB Peak Memory Usage 13 MB csrss.exe Process ID 368 User SYSTEM Domain NT AUTHORITY Path C:\Windows\system32\csrss.exe Memory Usage 4.93 MB Peak Memory Usage 4.94 MB dwm.exe Process ID 1600 User Mahya Bell Domain MahyaBell-PC Path C:\Windows\system32\Dwm.exe Memory Usage 56 MB Peak Memory Usage 59 MB explorer.exe Process ID 2264 User Mahya Bell Domain MahyaBell-PC Path C:\Windows\Explorer.EXE Memory Usage 81 MB Peak Memory Usage 92 MB fwupdate.exe Process ID 4000 User Mahya Bell Domain MahyaBell-PC Path C:\Program Files (x86)\lg_fwupdate\fwupdate.exe Memory Usage 9.73 MB Peak Memory Usage 9.75 MB lsass.exe Process ID 820 User SYSTEM Domain NT AUTHORITY Path C:\Windows\system32\lsass.exe Memory Usage 11 MB Peak Memory Usage 11 MB lsm.exe Process ID 828 User SYSTEM Domain NT AUTHORITY Path C:\Windows\system32\lsm.exe Memory Usage 4.24 MB Peak Memory Usage 4.27 MB nlssrv32.exe Process ID 2004 User SYSTEM Domain NT AUTHORITY Path C:\Windows\SysWOW64\nlssrv32.exe Memory Usage 2.66 MB Peak Memory Usage 2.69 MB osppsvc.exe Process ID 2168 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE Memory Usage 14 MB Peak Memory Usage 14 MB pdvdserv.exe Process ID 3804 User Mahya Bell Domain MahyaBell-PC Path C:\Program Files (x86)\CyberLink\PowerDVD\PDVDServ.exe Memory Usage 4.98 MB Peak Memory Usage 5.05 MB psiservice_2.exe Process ID 288 User SYSTEM Domain NT AUTHORITY Path c:\Program Files (x86)\Common Files\Protexis\License Service\PsiService_2.exe Memory Usage 3.64 MB Peak Memory Usage 3.68 MB richvideo.exe Process ID 732 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\CyberLink\Shared Files\RichVideo.exe Memory Usage 4.20 MB Peak Memory Usage 4.26 MB rocketdock.exe Process ID 2652 User Mahya Bell Domain MahyaBell-PC Path C:\Program Files (x86)\RocketDock\RocketDock.exe Memory Usage 13 MB Peak Memory Usage 13 MB rundll32.exe Process ID 4900 User Mahya Bell Domain MahyaBell-PC Path C:\Windows\SysWOW64\rundll32.exe Memory Usage 6.43 MB Peak Memory Usage 6.51 MB sascore64.exe Process ID 1692 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE Memory Usage 3.59 MB Peak Memory Usage 3.63 MB searchfilterhost.exe Process ID 1168 User SYSTEM Domain NT AUTHORITY Path C:\Windows\system32\SearchFilterHost.exe Memory Usage 6.50 MB Peak Memory Usage 6.50 MB searchindexer.exe Process ID 3504 User SYSTEM Domain NT AUTHORITY Path C:\Windows\system32\SearchIndexer.exe Memory Usage 45 MB Peak Memory Usage 63 MB searchprotocolhost.exe Process ID 4012 User SYSTEM Domain NT AUTHORITY Path C:\Windows\system32\SearchProtocolHost.exe Memory Usage 8.18 MB Peak Memory Usage 8.18 MB services.exe Process ID 804 User SYSTEM Domain NT AUTHORITY Path C:\Windows\system32\services.exe Memory Usage 9.40 MB Peak Memory Usage 10.00 MB sidebar.exe Process ID 2956 User Mahya Bell Domain MahyaBell-PC Path C:\Program Files\Windows Sidebar\sidebar.exe Memory Usage 80 MB Peak Memory Usage 81 MB smss.exe Process ID 260 User SYSTEM Domain NT AUTHORITY Path \SystemRoot\System32\smss.exe Memory Usage 1.18 MB Peak Memory Usage 1.22 MB speccy64.exe Process ID 1176 User Mahya Bell Domain MahyaBell-PC Path C:\Program Files\Speccy\Speccy64.exe Memory Usage 29 MB Peak Memory Usage 29 MB spoolsv.exe Process ID 1436 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\spoolsv.exe Memory Usage 12 MB Peak Memory Usage 12 MB svchost.exe Process ID 728 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 14 MB Peak Memory Usage 14 MB svchost.exe Process ID 2072 User SYSTEM Domain NT AUTHORITY Path C:\Windows\system32\svchost.exe Memory Usage 63 MB Peak Memory Usage 84 MB svchost.exe Process ID 2000 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\system32\svchost.exe Memory Usage 5.68 MB Peak Memory Usage 5.73 MB svchost.exe Process ID 3272 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\system32\svchost.exe Memory Usage 5.38 MB Peak Memory Usage 5.43 MB svchost.exe Process ID 1972 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\system32\svchost.exe Memory Usage 45 MB Peak Memory Usage 45 MB svchost.exe Process ID 1512 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\system32\svchost.exe Memory Usage 13 MB Peak Memory Usage 53 MB svchost.exe Process ID 1160 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\system32\svchost.exe Memory Usage 11 MB Peak Memory Usage 11 MB svchost.exe Process ID 668 User SYSTEM Domain NT AUTHORITY Path C:\Windows\system32\svchost.exe Memory Usage 34 MB Peak Memory Usage 40 MB svchost.exe Process ID 3016 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.61 MB Peak Memory Usage 6.61 MB svchost.exe Process ID 380 User LOCAL SERVICE Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 20 MB Peak Memory Usage 20 MB svchost.exe Process ID 1020 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\system32\svchost.exe Memory Usage 8.16 MB Peak Memory Usage 8.25 MB svchost.exe Process ID 936 User SYSTEM Domain NT AUTHORITY Path C:\Windows\system32\svchost.exe Memory Usage 9.37 MB Peak Memory Usage 9.73 MB svchost.exe Process ID 1296 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\system32\svchost.exe Memory Usage 18 MB Peak Memory Usage 18 MB system Process ID 4 system idle process Process ID 0 taskhost.exe Process ID 1808 User Mahya Bell Domain MahyaBell-PC Path C:\Windows\system32\taskhost.exe Memory Usage 9.21 MB Peak Memory Usage 9.27 MB teamviewer.exe Process ID 2664 User Mahya Bell Domain MahyaBell-PC Path C:\Program Files (x86)\TeamViewer\Version7\TeamViewer.exe Memory Usage 19 MB Peak Memory Usage 19 MB teamviewer_service.exe Process ID 2112 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\TeamViewer\Version7\TeamViewer_Service.exe Memory Usage 13 MB Peak Memory Usage 17 MB tv_w32.exe Process ID 3368 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\TeamViewer\Version7\tv_w32.exe Memory Usage 4.32 MB Peak Memory Usage 4.35 MB tv_x64.exe Process ID 3388 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\TeamViewer\Version7\tv_x64.exe Memory Usage 4.51 MB Peak Memory Usage 4.56 MB wininit.exe Process ID 688 User SYSTEM Domain NT AUTHORITY Path C:\Windows\system32\wininit.exe Memory Usage 4.79 MB Peak Memory Usage 4.86 MB winlogon.exe Process ID 764 User SYSTEM Domain NT AUTHORITY Path C:\Windows\system32\winlogon.exe Memory Usage 7.36 MB Peak Memory Usage 9.21 MB wmiprvse.exe Process ID 4420 User SYSTEM Domain NT AUTHORITY Path C:\Windows\system32\wbem\wmiprvse.exe Memory Usage 6.05 MB Peak Memory Usage 6.30 MB wmiprvse.exe Process ID 4076 User NETWORK SERVICE Domain NT AUTHORITY Path C:\Windows\system32\wbem\wmiprvse.exe Memory Usage 13 MB Peak Memory Usage 13 MB wuauclt.exe Process ID 2256 User Mahya Bell Domain MahyaBell-PC Path C:\Windows\system32\wuauclt.exe Memory Usage 6.42 MB Peak Memory Usage 6.64 MB Hotfixes 7/11/2012 Security Update for Windows 7 for x64-based Systems (KB2718523) A security issue has been identified that could allow an authenticated local attacker to compromise your system and gain control over it. You can help protect your system by installing this update from Microsoft. After you install this update, you may have to restart your system. 7/11/2012 Security Update for Windows 7 for x64-based Systems (KB2719985) A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it. You can help protect your system by installing this update from Microsoft. After you install this update, you may have to restart your system. 7/11/2012 Security Update for Windows 7 for x64-based Systems (KB2691442) A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it. You can help protect your system by installing this update from Microsoft. After you install this update, you may have to restart your system. 7/11/2012 Security Update for Windows 7 for x64-based Systems (KB2655992) A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain access to information. You can help protect your system by installing this update from Microsoft. After you install this update, you may have to restart your system. 7/11/2012 Security Update for Microsoft Office 2010 (KB2553447) 32-Bit Edition A security vulnerability exists in Microsoft Office 2010 32-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. 7/11/2012 Definition Update for Microsoft Office 2010 (KB982726) 32-Bit Edition This update provides the latest junk email and malicious links filter definitions for Microsoft Office 2010 32-Bit Edition. 7/11/2012 Security Update for Microsoft InfoPath 2010 (KB2553322) 32-Bit Edition A security vulnerability exists in Microsoft InfoPath 2010 32-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. 7/11/2012 Security Update for Microsoft InfoPath 2010 (KB2553431) 32-Bit Edition A security vulnerability exists in Microsoft InfoPath 2010 32-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. 7/11/2012 Update for Windows 7 for x64-based Systems (KB2506014) An issue has been identified that could allow a user with administrative permissions to load an unsigned driver. This update resolves that issue. You can help protect your system by installing this update from Microsoft. After you install this update, you may have to restart your system. 7/11/2012 Cumulative Security Update for Internet Explorer 9 for Windows 7 for x64-based Systems (KB2719177) Security issues have been identified that could allow an attacker to compromise a system that is running Microsoft Internet Explorer and gain control over it. You can help protect your system by installing this update from Microsoft. After you install this item, you may have to restart your computer. 7/11/2012 Security Update for Microsoft Office 2010 (KB2598243) 32-Bit Edition A security vulnerability exists in Microsoft Office 2010 32-Bit Edition that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. 7/11/2012 Security Update for Windows 7 for x64-based Systems (KB2698365) A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it. You can help protect your system by installing this update from Microsoft. After you install this update, you may have to restart your system. 7/10/2012 Update for Windows 7 for x64-based Systems (KB2506014) An issue has been identified that could allow a user with administrative permissions to load an unsigned driver. This update resolves that issue. You can help protect your system by installing this update from Microsoft. After you install this update, you may have to restart your system. 7/9/2012 Update for Windows 7 for x64-based Systems (KB2506014) An issue has been identified that could allow a user with administrative permissions to load an unsigned driver. This update resolves that issue. You can help protect your system by installing this update from Microsoft. After you install this update, you may have to restart your system. 7/8/2012 Update for Windows 7 for x64-based Systems (KB2506014) An issue has been identified that could allow a user with administrative permissions to load an unsigned driver. This update resolves that issue. You can help protect your system by installing this update from Microsoft. After you install this update, you may have to restart your system. 7/7/2012 Security Update for Windows 7 for x64-based Systems (KB2507618) A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it. You can help protect your system by installing this update from Microsoft. After you install this update, you may have to restart your system. 7/7/2012 Update for Windows 7 for x64-based Systems (KB2506014) An issue has been identified that could allow a user with administrative permissions to load an unsigned driver. This update resolves that issue. You can help protect your system by installing this update from Microsoft. After you install this update, you may have to restart your system. System Folders Path for burning CD C:\Users\Mahya Bell\AppData\Local\Microsoft\Windows\Burn\Burn1 Application Data C:\ProgramData Public Desktop C:\Users\Public\Desktop Documents C:\Users\Public\Documents Global Favorites C:\Users\Mahya Bell\Favorites Music C:\Users\Public\Music Pictures C:\Users\Public\Pictures Start Menu Programs C:\ProgramData\Microsoft\Windows\Start Menu\Programs Start Menu C:\ProgramData\Microsoft\Windows\Start Menu Startup C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup Templates C:\ProgramData\Microsoft\Windows\Templates Videos C:\Users\Public\Videos Cookies C:\Users\Mahya Bell\AppData\Roaming\Microsoft\Windows\Cookies Desktop C:\Users\Mahya Bell\Desktop Physical Desktop C:\Users\Mahya Bell\Desktop User Favorites C:\Users\Mahya Bell\Favorites Fonts C:\Windows\Fonts Internet History C:\Users\Mahya Bell\AppData\Local\Microsoft\Windows\History Temporary Internet Files C:\Users\Mahya Bell\AppData\Local\Microsoft\Windows\Temporary Internet Files Local Application Data C:\Users\Mahya Bell\AppData\Local Windows directory C:\Windows Windows/System C:\Windows\system32 Program Files C:\Program Files Security Options Accounts: Administrator account status Disabled Accounts: Guest account status Disabled Accounts: Limit local account use of blank passwords to console logon only Enabled Accounts: Rename administrator account Administrator Accounts: Rename guest account Guest Audit: Audit the access of global system objects Disabled Audit: Audit the use of Backup and Restore privilege Disabled Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings Not Defined Audit: Shut down system immediately if unable to log security audits Disabled DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax Not Defined DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax Not Defined Devices: Allow undock without having to log on Enabled Devices: Allowed to format and eject removable media Not Defined Devices: Prevent users from installing printer drivers Disabled Devices: Restrict CD-ROM access to locally logged-on user only Not Defined Devices: Restrict floppy access to locally logged-on user only Not Defined Domain controller: Allow server operators to schedule tasks Not Defined Domain controller: LDAP server signing requirements Not Defined Domain controller: Refuse machine account password changes Not Defined Domain member: Digitally encrypt or sign secure channel data (always) Enabled Domain member: Digitally encrypt secure channel data (when possible) Enabled Domain member: Digitally sign secure channel data (when possible) Enabled Domain member: Disable machine account password changes Disabled Domain member: Maximum machine account password age 30 days Domain member: Require strong (Windows 2000 or later) session key Enabled Interactive logon: Display user information when the session is locked Not Defined Interactive logon: Do not display last user name Disabled Interactive logon: Do not require CTRL+ALT+DEL Not Defined Interactive logon: Message text for users attempting to log on Not Defined Interactive logon: Message title for users attempting to log on Interactive logon: Number of previous logons to cache (in case domain controller is not available) 10 logons Interactive logon: Prompt user to change password before expiration 5 days Interactive logon: Require Domain Controller authentication to unlock workstation Disabled Interactive logon: Require smart card Disabled Interactive logon: Smart card removal behavior No Action Microsoft network client: Digitally sign communications (always) Disabled Microsoft network client: Digitally sign communications (if server agrees) Enabled Microsoft network client: Send unencrypted password to third-party SMB servers Disabled Microsoft network server: Amount of idle time required before suspending session 15 minutes Microsoft network server: Digitally sign communications (always) Disabled Microsoft network server: Digitally sign communications (if client agrees) Disabled Microsoft network server: Disconnect clients when logon hours expire Enabled Microsoft network server: Server SPN target name validation level Not Defined Network access: Allow anonymous SID/Name translation Disabled Network access: Do not allow anonymous enumeration of SAM accounts Enabled Network access: Do not allow anonymous enumeration of SAM accounts and shares Disabled Network access: Do not allow storage of passwords and credentials for network authentication Disabled Network access: Let Everyone permissions apply to anonymous users Disabled Network access: Named Pipes that can be accessed anonymously Network access: Remotely accessible registry paths System\CurrentControlSet\Control\ProductOptions,System\CurrentControlSet\Control\Server Applications,Software\Microsoft\Windows NT\CurrentVersion Network access: Remotely accessible registry paths and sub-paths System\CurrentControlSet\Control\Print\Printers,System\CurrentControlSet\Services\Eventlog,Software\Microsoft\OLAP Server,Software\Microsoft\Windows NT\CurrentVersion\Print,Software\Microsoft\Windows NT\CurrentVersion\Windows,System\CurrentControlSet\Control\ContentIndex,System\CurrentControlSet\Control\Terminal Server,System\CurrentControlSet\Control\Terminal Server\UserConfig,System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration,Software\Microsoft\Windows NT\CurrentVersion\Perflib,System\CurrentControlSet\Services\SysmonLog Network access: Restrict anonymous access to Named Pipes and Shares Enabled Network access: Shares that can be accessed anonymously Not Defined Network access: Sharing and security model for local accounts Classic - local users authenticate as themselves Network security: Allow Local System to use computer identity for NTLM Not Defined Network security: Allow LocalSystem NULL session fallback Not Defined Network Security: Allow PKU2U authentication requests to this computer to use online identities Not Defined Network security: Configure encryption types allowed for Kerberos Not Defined Network security: Do not store LAN Manager hash value on next password change Enabled Network security: Force logoff when logon hours expire Disabled Network security: LAN Manager authentication level Not Defined Network security: LDAP client signing requirements Negotiate signing Network security: Minimum session security for NTLM SSP based (including secure RPC) clients Require 128-bit encryption Network security: Minimum session security for NTLM SSP based (including secure RPC) servers Require 128-bit encryption Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication Not Defined Network security: Restrict NTLM: Add server exceptions in this domain Not Defined Network security: Restrict NTLM: Audit Incoming NTLM Traffic Not Defined Network security: Restrict NTLM: Audit NTLM authentication in this domain Not Defined Network security: Restrict NTLM: Incoming NTLM traffic Not Defined Network security: Restrict NTLM: NTLM authentication in this domain Not Defined Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers Not Defined Recovery console: Allow automatic administrative logon Disabled Recovery console: Allow floppy copy and access to all drives and all folders Disabled Shutdown: Allow system to be shut down without having to log on Enabled Shutdown: Clear virtual memory pagefile Disabled System cryptography: Force strong key protection for user keys stored on the computer Not Defined System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing Disabled System objects: Require case insensitivity for non-Windows subsystems Enabled System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) Enabled System settings: Optional subsystems Posix System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies Disabled User Account Control: Admin Approval Mode for the Built-in Administrator account Disabled User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop Disabled User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode Elevate without prompting User Account Control: Behavior of the elevation prompt for standard users Prompt for credentials User Account Control: Detect application installations and prompt for elevation Enabled User Account Control: Only elevate executables that are signed and validated Disabled User Account Control: Only elevate UIAccess applications that are installed in secure locations Enabled User Account Control: Run all administrators in Admin Approval Mode Disabled User Account Control: Switch to the secure desktop when prompting for elevation Disabled User Account Control: Virtualize file and registry write failures to per-user locations Enabled Services Running Application Experience Running AVG Firewall Running AVG WatchDog Running AVGIDSAgent Running Base Filtering Engine Running COM+ Event System Running Computer Browser Running Cryptographic Services Running Cyberlink RichVideo Service(CRVS) Running DCOM Server Process Launcher Running Desktop Window Manager Session Manager Running DHCP Client Running Diagnostic Policy Service Running Diagnostic Service Host Running Diagnostic System Host Running Distributed Link Tracking Client Running DNS Client Running Function Discovery Resource Publication Running Group Policy Client Running Human Interface Device Access Running IKE and AuthIP IPsec Keying Modules Running IP Helper Running IPsec Policy Agent Running Multimedia Class Scheduler Running Nalpeiron Licensing Service Running Network Connections Running Network List Service Running Network Location Awareness Running Network Store Interface Service Running Office Software Protection Platform Running Offline Files Running Peer Name Resolution Protocol Running Peer Networking Identity Manager Running Plug and Play Running Power Running Print Spooler Running Program Compatibility Assistant Service Running Protexis Licensing V2 Running Remote Procedure Call (RPC) Running RPC Endpoint Mapper Running SAS Core Service Running Security Accounts Manager Running Security Center Running Server Running Shell Hardware Detection Running Superfetch Running System Event Notification Service Running Task Scheduler Running TCP/IP NetBIOS Helper Running TeamViewer 7 Running Themes Running User Profile Service Running Windows Audio Running Windows Audio Endpoint Builder Running Windows Driver Foundation - User-mode Driver Framework Running Windows Event Log Running Windows Firewall Running Windows Font Cache Service Running Windows Image Acquisition (WIA) Running Windows Management Instrumentation Running Windows Search Running Windows Update Running WinHTTP Web Proxy Auto-Discovery Service Running Workstation Stopped ActiveX Installer (AxInstSV) Stopped Adaptive Brightness Stopped Adobe SwitchBoard Stopped Application Identity Stopped Application Information Stopped Application Layer Gateway Service Stopped Application Management Stopped ASP.NET State Service Stopped Background Intelligent Transfer Service Stopped BitLocker Drive Encryption Service Stopped Block Level Backup Engine Service Stopped Bluetooth Support Service Stopped BranchCache Stopped Certificate Propagation Stopped CNG Key Isolation Stopped COM+ System Application Stopped Credential Manager Stopped Disk Defragmenter Stopped Distributed Transaction Coordinator Stopped Encrypting File System (EFS) Stopped Extensible Authentication Protocol Stopped Fax Stopped Function Discovery Provider Host Stopped Google Updater Service Stopped Health Key and Certificate Management Stopped HomeGroup Listener Stopped HomeGroup Provider Stopped Interactive Services Detection Stopped Internet Connection Sharing (ICS) Stopped KtmRm for Distributed Transaction Coordinator Stopped Link-Layer Topology Discovery Mapper Stopped Media Center Extender Service Stopped Microsoft .NET Framework NGEN v2.0.50727_X64 Stopped Microsoft .NET Framework NGEN v2.0.50727_X86 Stopped Microsoft .NET Framework NGEN v4.0.30319_X64 Stopped Microsoft .NET Framework NGEN v4.0.30319_X86 Stopped Microsoft iSCSI Initiator Service Stopped Microsoft SharePoint Workspace Audit Service Stopped Microsoft Software Shadow Copy Provider Stopped NBService Stopped Net.Msmq Listener Adapter Stopped Net.Pipe Listener Adapter Stopped Net.Tcp Listener Adapter Stopped Net.Tcp Port Sharing Service Stopped Netlogon Stopped Network Access Protection Agent Stopped NMIndexingService Stopped Office Source Engine Stopped Parental Controls Stopped Peer Networking Grouping Stopped Performance Counter DLL Host Stopped Performance Logs & Alerts Stopped PnP-X IP Bus Enumerator Stopped PNRP Machine Name Publication Service Stopped Portable Device Enumerator Service Stopped Problem Reports and Solutions Control Panel Support Stopped Protected Storage Stopped Quality Windows Audio Video Experience Stopped Remote Access Auto Connection Manager Stopped Remote Access Connection Manager Stopped Remote Desktop Configuration Stopped Remote Desktop Services Stopped Remote Desktop Services UserMode Port Redirector Stopped Remote Procedure Call (RPC) Locator Stopped Remote Registry Stopped Routing and Remote Access Stopped Secondary Logon Stopped Secure Socket Tunneling Protocol Service Stopped Smart Card Stopped Smart Card Removal Policy Stopped SNMP Trap Stopped Software Protection Stopped SPP Notification Service Stopped SSDP Discovery Stopped Tablet PC Input Service Stopped Telephony Stopped Thread Ordering Server Stopped TPM Base Services Stopped UPnP Device Host Stopped Virtual Disk Stopped Volume Shadow Copy Stopped WajamUpdater Stopped WebClient Stopped Windows Activation Technologies Service Stopped Windows Backup Stopped Windows Biometric Service Stopped Windows CardSpace Stopped Windows Color System Stopped Windows Connect Now - Config Registrar Stopped Windows Defender Stopped Windows Error Reporting Service Stopped Windows Event Collector Stopped Windows Installer Stopped Windows Media Center Receiver Service Stopped Windows Media Center Scheduler Service Stopped Windows Media Player Network Sharing Service Stopped Windows Modules Installer Stopped Windows Presentation Foundation Font Cache 3.0.0.0 Stopped Windows Remote Management (WS-Management) Stopped Windows Time Stopped Wired AutoConfig Stopped WLAN AutoConfig Stopped WMI Performance Adapter Stopped WWAN AutoConfig Device Tree ACPI x64-based PC Microsoft ACPI-Compliant System ACPI Power Button Intel(R) Core(TM)2 Quad CPU Q6600 @ 2.40GHz Intel(R) Core(TM)2 Quad CPU Q6600 @ 2.40GHz Intel(R) Core(TM)2 Quad CPU Q6600 @ 2.40GHz Intel(R) Core(TM)2 Quad CPU Q6600 @ 2.40GHz System board Motherboard resources High precision event timer ACPI Fixed Feature Button PCI bus Intel(R) P965/G965 Processor to I/O Controller - 29A0 Intel(R) 82566DC Gigabit Network Connection Intel(R) ICH8 Family PCI Express Root Port 1 - 283F Intel(R) ICH8 Family PCI Express Root Port 5 - 2847 Intel(R) ICH8 Family SMBus Controller - 283E Intel(R) P965/G965 PCI Express Root Port - 29A1 NVIDIA Quadro NVS 285 (Microsoft Corporation - WDDM) Generic PnP Monitor Intel(R) ICH8 Family USB Universal Host Controller - 2834 USB Root Hub Intel(R) ICH8 Family USB Universal Host Controller - 2835 USB Root Hub USB Input Device HID-compliant mouse USB Composite Device USB Input Device HID Keyboard Device USB Input Device HID-compliant consumer control device HID-compliant device Intel(R) ICH8 Family USB2 Enhanced Host Controller - 283A USB Root Hub High Definition Audio Controller High Definition Audio Device Intel(R) ICH8 Family USB Universal Host Controller - 2830 USB Root Hub Intel(R) ICH8 Family USB Universal Host Controller - 2831 USB Root Hub Intel(R) ICH8 Family USB Universal Host Controller - 2832 USB Root Hub Intel(R) ICH8 Family USB2 Enhanced Host Controller - 2836 USB Root Hub Intel(R) 82801 PCI Bridge - 244E Conexant D850 56K V.90 DFVc Modem Intel(R) ICH8DH LPC Interface Controller - 2812 System board Direct memory access controller Numeric data processor Programmable interrupt controller System speaker System CMOS/real time clock System timer Intel(R) ICH8 4 port Serial ATA Storage Controller - 2820 ATA Channel 0 WDC WD5000AACS-00ZUB0 ATA Device TSSTcorp DVD+-RW TS-H653B ATA Device ATA Channel 1 hp DVD-RAM GH60L ATA Device Intel(R) ICH8 2 port Serial ATA Storage Controller - 2825 ATA Channel 0 CPU Intel Core 2 Quad Q6600 Cores 4 Threads 4 Name Intel Core 2 Quad Q6600 Code Name Kentsfield Package Socket 775 LGA Technology 65nm Specification Intel(R) Core(TM)2 Quad CPU Q6600 @ 2.40GHz Family 6 Extended Family 6 Model F Extended Model F Stepping B Revision G0 Instructions MMX, SSE, SSE2, SSE3, SSSE3, Intel 64 Virtualization Supported, Disabled Hyperthreading Not supported Fan Speed 1234 RPM Bus Speed 266.0 MHz Rated Bus Speed 1063.9 MHz Stock Core Speed 2400 MHz Stock Bus Speed 266 MHz Average Temperature 50 °C Caches L1 Data Cache Size 4 x 32 KBytes L1 Instructions Cache Size 4 x 32 KBytes L2 Unified Cache Size 2 x 4096 KBytes Core 0 Core Speed 1596.0 MHz Multiplier x 6.0 Bus Speed 266.0 MHz Rated Bus Speed 1063.9 MHz Temperature 54 °C Thread 1 APIC ID 0 Core 1 Core Speed 1596.0 MHz Multiplier x 6.0 Bus Speed 266.0 MHz Rated Bus Speed 1063.9 MHz Temperature 54 °C Thread 1 APIC ID 1 Core 2 Core Speed 1596.0 MHz Multiplier x 6.0 Bus Speed 266.0 MHz Rated Bus Speed 1063.9 MHz Temperature 46 °C Thread 1 APIC ID 2 Core 3 Core Speed 2394.0 MHz Multiplier x 6.0 Bus Speed 266.0 MHz Rated Bus Speed 1063.9 MHz Temperature 47 °C Thread 1 APIC ID 3 RAM Memory slots Total memory slots 4 Used memory slots 2 Free memory slots 2 Memory Type DDR2 Size 3072 MBytes Physical Memory Memory Usage 48 % Total Physical 3.00 GB Available Physical 1.54 GB Total Virtual 5.99 GB Available Virtual 4.19 GB SPD Number Of SPD Modules 2 Slot #1 Type DDR2 Size 2048 MBytes Manufacturer Unknown Max Bandwidth PC2-5300 (333 MHz) Part Number V01D2LF2GB18818867 Serial Number 00000001 SPD Ext. EPP JEDEC #3 Frequency 333.3 MHz CAS# Latency 5.0 RAS# To CAS# 5 RAS# Precharge 5 tRAS 15 tRC 20 Voltage 1.800 V JEDEC #2 Frequency 266.7 MHz CAS# Latency 4.0 RAS# To CAS# 4 RAS# Precharge 4 tRAS 12 tRC 16 Voltage 1.800 V JEDEC #1 Frequency 200.0 MHz CAS# Latency 3.0 RAS# To CAS# 3 RAS# Precharge 3 tRAS 9 tRC 12 Voltage 1.800 V Slot #2 Type DDR2 Size 1024 MBytes Manufacturer Unknown Max Bandwidth PC2-5300 (333 MHz) Part Number Week/year 20 / 07 SPD Ext. EPP JEDEC #3 Frequency 333.3 MHz CAS# Latency 5.0 RAS# To CAS# 5 RAS# Precharge 5 tRAS 15 tRC 20 Voltage 1.800 V JEDEC #2 Frequency 266.7 MHz CAS# Latency 4.0 RAS# To CAS# 4 RAS# Precharge 4 tRAS 12 tRC 16 Voltage 1.800 V JEDEC #1 Frequency 200.0 MHz CAS# Latency 3.0 RAS# To CAS# 3 RAS# Precharge 3 tRAS 9 tRC 12 Voltage 1.800 V Motherboard Manufacturer Dell Inc. Model 0CT017 (Microprocessor) Chipset Vendor Intel Chipset Model P965/G965 Chipset Revision C2 Southbridge Vendor Intel Southbridge Model 82801HH (ICH8DH) Southbridge Revision B0 BIOS Brand Dell Inc. Version 2.5.3 Date 11/22/2007 PCI Data Slot UNKNOWN Slot Type UNKNOWN Slot Usage In Use Bus Width Unknown Slot Designation PEG Slot Number 0 Slot UNKNOWN Slot Type UNKNOWN Slot Usage Available Bus Width Unknown Slot Designation SLOT1 Slot Number 1 Slot UNKNOWN Slot Type UNKNOWN Slot Usage Available Bus Width Unknown Slot Designation SLOT3 Slot Number 2 Slot UNKNOWN Slot Type UNKNOWN Slot Usage Available Bus Width 32 bit Slot Designation SLOT4 Slot Number 3 Slot UNKNOWN Slot Type UNKNOWN Slot Usage Available Bus Width 32 bit Slot Designation SLOT5 Slot Number 4 Slot UNKNOWN Slot Type UNKNOWN Slot Usage In Use Bus Width 32 bit Slot Designation SLOT6 Slot Number 5 Graphics Monitor Name E321VL on NVIDIA Quadro NVS 285 (Microsoft Corporation - WDDM) Current Resolution 1366x768 pixels Work Resolution 1366x768 pixels State enabled, primary, output devices support Monitor Width 1366 Monitor Height 768 Monitor BPP 32 bits per pixel Monitor Frequency 60 Hz Device \\.\DISPLAY1\Monitor0 NVIDIA Quadro NVS 285 (Microsoft Corporation - WDDM) GPU NV44 Device ID 10DE-0165 Revision A2 Subvendor nVidia (10DE) Current Performance Level Level 1 Die Size 110 nm? Transistors 77 M Release Date 2005 DirectX Support 9.0c DirectX Shader Model 3.0 OpenGL Support 2.0 BIOS Version Version 5.44.2.63.3 ROPs 2 Shaders Vertex 4/Pixel 4 Memory Type DDR Bus Width 64 Bit Count of performance levels : 1 Level 1 OpenGL Version 1.1.0 Vendor Microsoft Corporation Renderer GDI Generic GLU Version 1.2.2.0 Microsoft Corporation Values GL_MAX_LIGHTS 8 GL_MAX_TEXTURE_SIZE 1024 GL_MAX_TEXTURE_STACK_DEPTH 10 GL Extensions GL_WIN_swap_hint GL_EXT_bgra GL_EXT_paletted_texture GL_EXT_bgra Hard Drives WDC WD5000AACS-00ZUB0 ATA Device Manufacturer Western Digital Form Factor GB/3.5-inch Business Unit/Brand Desktop/WD Caviar® Heads 16 Cylinders 16383 SATA type SATA-II 3.0Gb/s Device type Fixed ATA Standard ATA8-ACS Serial Number WD-WCASU4603102 LBA Size 48-bit LBA Power On Count 1778 times Power On Time 943.9 days Features S.M.A.R.T., AAM, NCQ Transfer Mode SATA II Interface SATA Capacity 466GB Real size 500,107,862,016 bytes RAID Type None S.M.A.R.T 01 Read Error Rate 200 (200 worst) Data 0000000000 03 Spin-Up Time 166 (164) Data 000000123A 04 Start/Stop Count 097 (097) Data 0000000F9E 05 Reallocated Sectors Count 200 (200) Data 0000000000 07 Seek Error Rate 200 (200) Data 0000000000 09 Power-On Hours (POH) 069 (069) Data 000000587D 0A Spin Retry Count 100 (100) Data 0000000000 0B Recalibration Retries 100 (100) Data 0000000000 0C Device Power Cycle Count 099 (099) Data 00000006F2 C0 Power-off Retract Count 199 (199) Data 0000000303 C1 Load/Unload Cycle Count 151 (151) Data 0000024521 C2 Temperature 108 (092) Data 0000000027 C4 Reallocation Event Count 200 (200) Data 0000000000 C5 Current Pending Sector Count 200 (200) Data 0000000000 C6 Uncorrectable Sector Count 200 (200) Data 0000000000 C7 UltraDMA CRC Error Count 200 (200) Data 0000000000 C8 Write Error Rate / Multi-Zone Error Rate 200 (200) Data 0000000000 Temperature 39 °C Temperature Range ok (less than 50 °C) Status Good Partition 0 Partition ID Disk #0, Partition #0 Size 100 MB Partition 1 Partition ID Disk #0, Partition #1 Disk Letter C: File System NTFS Volume Serial Number 285D0820 Size 466GB Used Space 51GB (11%) Free Space 415GB (89%) Optical Drives hp DVD-RAM GH60L ATA Device Media Type DVD Writer Name hp DVD-RAM GH60L ATA Device Availability Running/Full Power Capabilities Random Access, Supports Writing, Supports Removable Media Config Manager Error Code Device is working properly Config Manager User Config FALSE Drive E: Media Loaded FALSE SCSI Bus 1 SCSI Logical Unit 0 SCSI Port 1 SCSI Target Id 0 Status OK DTSOFT Virtual CdRom Device Media Type DVD-ROM Name DTSOFT Virtual CdRom Device Availability Running/Full Power Capabilities Random Access, Supports Removable Media Config Manager Error Code Device is working properly Config Manager User Config FALSE Drive F: Media Loaded FALSE Status OK TSSTcorp DVD+-RW TS-H653B ATA Device Media Type DVD Writer Name TSSTcorp DVD+-RW TS-H653B ATA Device Availability Running/Full Power Capabilities Random Access, Supports Writing, Supports Removable Media Config Manager Error Code Device is working properly Config Manager User Config FALSE Drive D: Media Loaded TRUE SCSI Bus 0 SCSI Logical Unit 0 SCSI Port 0 SCSI Target Id 1 Size 3.44 GB Status OK Volume Name RD_MENU_LAYOUT Volume Serial Number C918C91A Audio Sound Card High Definition Audio Device Playback Devices Digital Audio (S/PDIF) (High Definition Audio Device) Speakers (High Definition Audio Device) (default) Peripherals HID Keyboard Device Device Kind Keyboard Device Name HID Keyboard Device Vendor Unknown Location USB Input Device Driver Date 6-21-2006 Version 6.1.7601.17514 File C:\Windows\system32\DRIVERS\kbdhid.sys File C:\Windows\system32\DRIVERS\kbdclass.sys HID-compliant mouse Device Kind Mouse Device Name HID-compliant mouse Vendor Logitech Location USB Input Device Driver Date 6-21-2006 Version 6.1.7600.16385 File C:\Windows\system32\DRIVERS\mouhid.sys File C:\Windows\system32\DRIVERS\mouclass.sys Printers Fax Printer Port SHRFAX: Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 200 * 200 dpi Monochrome Status Unknown Driver Driver Name Microsoft Shared Fax Driver (v4.00) Driver Path C:\Windows\system32\spool\DRIVERS\x64\3\FXSDRV.DLL Microsoft XPS Document Writer Printer Port XPSPort: Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 600 * 600 dpi Color Status Unknown Driver Driver Name Microsoft XPS Document Writer (v6.00) Driver Path C:\Windows\system32\spool\DRIVERS\x64\3\mxdwdrv.dll Send To OneNote 2010 (Default Printer) Printer Port nul: Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 600 * 600 dpi Color Status Unknown Driver Driver Name Send To Microsoft OneNote 2010 Driver (v6.00) Driver Path C:\Windows\system32\spool\DRIVERS\x64\3\mxdwdrv.dll Network You are connected to the internet Connected through Intel(R) 82566DC Gigabit Network Connection IP Address 192.168.0.5 Subnet mask 255.255.255.0 Gateway server 192.168.0.1 Preferred DNS server 209.18.47.61 Alternate DNS server 209.18.47.62 DHCP Enabled DHCP server 192.168.0.1 External IP Address 76.169.157.144 Adapter Type Ethernet NetBIOS over TCP/IP Enabled via DHCP NETBIOS Node Type Hybrid node Link Speed 0 kbps Computer Name NetBIOS Name MAHYABELL-PC DNS Name MahyaBell-PC Domain Name MahyaBell-PC Remote Desktop Console State Active Domain MahyaBell-PC WinInet Info LAN Connection Local system uses a local area network to connect to the Internet Local system has RAS to connect to the Internet Wi-Fi Info Wi-Fi not enabled WinHTTPInfo WinHTTPSessionProxyType No proxy Session Proxy Session Proxy Bypass Connect Retries 5 Connect Timeout 60000 HTTP Version HTTP 1.1 Max Connects Per 1.0 Servers INFINITE Max Connects Per Servers INFINITE Max HTTP automatic redirects 10 Max HTTP status continue 10 Send Timeout 30000 IEProxy Auto Detect No IEProxy Auto Config IEProxy IEProxy Bypass Default Proxy Config Access Type No proxy Default Config Proxy Default Config Proxy Bypass Sharing and Discovery Network Discovery Disabled File and Printer Sharing Disabled Simple File Sharing Disabled Administrative Shares Enabled Adapters List TeamViewer VPN Adapter IP Address 0.0.0.0 Subnet mask 0.0.0.0 Gateway server 0.0.0.0 Intel(R) 82566DC Gigabit Network Connection IP Address 192.168.0.5 Subnet mask 255.255.255.0 Gateway server 192.168.0.1 Network Shares No network shares Current TCP Connections C:\Program Files (x86)\TeamViewer\Version7\TeamViewer.exe (2664) Local 127.0.0.1:49157 ESTABLISHED Remote 127.0.0.1:49158 (Querying... ) Local 127.0.0.1:49162 ESTABLISHED Remote 127.0.0.1:5939 (Querying... ) Local 127.0.0.1:49158 ESTABLISHED Remote 127.0.0.1:49157 (Querying... ) C:\Users\Mahya Bell\AppData\Local\Google\Chrome\Application\chrome.exe (4424) Local 192.168.0.5:49491 ESTABLISHED Remote 204.246.175.250:80 (Querying... ) (HTTP) Local 192.168.0.5:49526 ESTABLISHED Remote 107.14.32.10:80 (Querying... ) (HTTP) Local 192.168.0.5:49527 ESTABLISHED Remote 107.14.32.179:80 (Querying... ) (HTTP) Local 192.168.0.5:49529 ESTABLISHED Remote 23.15.63.139:80 (Querying... ) (HTTP) Local 192.168.0.5:49482 ESTABLISHED Remote 74.125.224.212:443 (Querying... ) (HTTPS) Local 192.168.0.5:49457 ESTABLISHED Remote 74.125.239.9:80 (Querying... ) (HTTP) Local 192.168.0.5:49499 ESTABLISHED Remote 74.125.224.185:80 (Querying... ) (HTTP) Local 192.168.0.5:49498 ESTABLISHED Remote 74.125.224.185:80 (Querying... ) (HTTP) Local 192.168.0.5:49540 ESTABLISHED Remote 23.15.31.144:80 (Querying... ) (HTTP) Local 192.168.0.5:49542 ESTABLISHED Remote 23.15.31.144:80 (Querying... ) (HTTP) Local 192.168.0.5:49543 ESTABLISHED Remote 23.15.31.144:80 (Querying... ) (HTTP) Local 192.168.0.5:49544 ESTABLISHED Remote 23.67.56.26:80 (Querying... ) (HTTP) Local 192.168.0.5:49545 CLOSE-WAIT Remote 23.15.31.144:443 (Querying... ) (HTTPS) Local 192.168.0.5:49546 ESTABLISHED Remote 23.15.31.144:443 (Querying... ) (HTTPS) Local 192.168.0.5:49496 ESTABLISHED Remote 204.246.175.250:80 (Querying... ) (HTTP) Local 192.168.0.5:49495 ESTABLISHED Remote 204.246.175.250:80 (Querying... ) (HTTP) Local 192.168.0.5:49549 CLOSE-WAIT Remote 23.15.50.110:443 (Querying... ) (HTTPS) Local 192.168.0.5:49492 ESTABLISHED Remote 204.246.175.250:80 (Querying... ) (HTTP) Local 192.168.0.5:49552 ESTABLISHED Remote 69.171.229.70:80 (Querying... ) (HTTP) Local 192.168.0.5:49553 ESTABLISHED Remote 23.15.92.20:80 (Querying... ) (HTTP) Local 192.168.0.5:49554 ESTABLISHED Remote 23.15.92.20:80 (Querying... ) (HTTP) Local 192.168.0.5:49516 ESTABLISHED Remote 74.125.224.217:80 (Querying... ) (HTTP) Local 192.168.0.5:49517 ESTABLISHED Remote 74.125.224.217:80 (Querying... ) (HTTP) Local 192.168.0.5:49494 ESTABLISHED Remote 204.246.175.250:80 (Querying... ) (HTTP) Local 192.168.0.5:49519 ESTABLISHED Remote 74.125.224.217:80 (Querying... ) (HTTP) Local 192.168.0.5:49493 ESTABLISHED Remote 204.246.175.250:80 (Querying... ) (HTTP) Local 192.168.0.5:49567 ESTABLISHED Remote 23.15.92.20:80 (Querying... ) (HTTP) Local 192.168.0.5:49568 ESTABLISHED Remote 67.228.177.87:80 (Querying... ) (HTTP) Local 192.168.0.5:49550 CLOSE-WAIT Remote 23.15.50.110:443 (Querying... ) (HTTPS) System Process Local 192.168.0.5:49484 TIME-WAIT Remote 74.125.224.193:80 (Querying... ) (HTTP) Local 192.168.0.5:49538 TIME-WAIT Remote 107.14.32.179:80 (Querying... ) (HTTP) Local 192.168.0.5:49506 TIME-WAIT Remote 74.125.224.212:80 (Querying... ) (HTTP) Local 192.168.0.5:49539 TIME-WAIT Remote 107.14.32.179:80 (Querying... ) (HTTP) Local 192.168.0.5:49547 TIME-WAIT Remote 107.14.32.64:80 (Querying... ) (HTTP) Local 192.168.0.5:49507 TIME-WAIT Remote 74.125.224.175:80 (Querying... ) (HTTP) Local 192.168.0.5:49508 TIME-WAIT Remote 74.125.224.175:80 (Querying... ) (HTTP) Local 192.168.0.5:49548 TIME-WAIT Remote 107.14.32.64:80 (Querying... ) (HTTP) Local 192.168.0.5:49555 TIME-WAIT Remote 23.67.56.17:80 (Querying... ) (HTTP) Local 192.168.0.5:49556 TIME-WAIT Remote 23.67.56.17:80 (Querying... ) (HTTP) Local 192.168.0.5:49557 TIME-WAIT Remote 23.67.56.17:80 (Querying... ) (HTTP) Local 192.168.0.5:49511 TIME-WAIT Remote 75.98.9.196:80 (Querying... ) (HTTP) Local 192.168.0.5:49558 TIME-WAIT Remote 23.67.56.17:80 (Querying... ) (HTTP) Local 192.168.0.5:49509 TIME-WAIT Remote 74.125.224.175:80 (Querying... ) (HTTP) Local 192.168.0.5:49537 TIME-WAIT Remote 174.129.17.198:80 (Querying... ) (HTTP) Local 192.168.0.5:49536 TIME-WAIT Remote 174.129.17.198:80 (Querying... ) (HTTP) Local 192.168.0.5:49532 TIME-WAIT Remote 107.14.32.10:80 (Querying... ) (HTTP) Local 192.168.0.5:49566 TIME-WAIT Remote 107.14.32.8:80 (Querying... ) (HTTP) Local 192.168.0.5:49510 TIME-WAIT Remote 75.98.9.196:80 (Querying... ) (HTTP) Local 192.168.0.5:49531 TIME-WAIT Remote 107.14.32.10:80 (Querying... ) (HTTP) Local 192.168.0.5:49530 TIME-WAIT Remote 107.14.32.10:80 (Querying... ) (HTTP) Local 192.168.0.5:49483 TIME-WAIT Remote 74.125.224.193:80 (Querying... ) (HTTP) Local 192.168.0.5:49524 TIME-WAIT Remote 74.125.224.175:80 (Querying... ) (HTTP) Local 192.168.0.5:49485 TIME-WAIT Remote 74.125.224.193:80 (Querying... ) (HTTP) Local 192.168.0.5:49523 TIME-WAIT Remote 74.125.224.175:80 (Querying... ) (HTTP) Local 192.168.0.5:49522 TIME-WAIT Remote 74.125.224.175:80 (Querying... ) (HTTP) Local 192.168.0.5:49520 TIME-WAIT Remote 74.125.224.217:80 (Querying... ) (HTTP) Local 192.168.0.5:49518 TIME-WAIT Remote 74.125.224.217:80 (Querying... ) (HTTP) Local 192.168.0.5:49515 TIME-WAIT Remote 75.98.9.196:80 (Querying... ) (HTTP) Local 192.168.0.5:49514 TIME-WAIT Remote 75.98.9.196:80 (Querying... ) (HTTP) Local 192.168.0.5:49497 TIME-WAIT Remote 74.125.224.185:80 (Querying... ) (HTTP) Local 192.168.0.5:49513 TIME-WAIT Remote 75.98.9.196:80 (Querying... ) (HTTP) Local 192.168.0.5:49512 TIME-WAIT Remote 75.98.9.196:80 (Querying... ) (HTTP) Local 192.168.0.5:49500 TIME-WAIT Remote 74.125.224.196:80 (Querying... ) (HTTP) Local 192.168.0.5:49501 TIME-WAIT Remote 74.125.224.196:80 (Querying... ) (HTTP) Local 192.168.0.5:49502 TIME-WAIT Remote 74.125.224.196:80 (Querying... ) (HTTP) Local 192.168.0.5:49503 TIME-WAIT Remote 74.125.224.212:80 (Querying... ) (HTTP) Local 192.168.0.5:49504 TIME-WAIT Remote 74.125.224.212:80 (Querying... ) (HTTP) Local 192.168.0.5:49505 TIME-WAIT Remote 74.125.224.212:80 (Querying... ) (HTTP) System Process Local 0.0.0.0:445 (Windows shares) LISTEN Local 0.0.0.0:5357 LISTEN Local 192.168.0.5:139 (NetBIOS session service) LISTEN TeamViewer_Service.exe (2112) Local 127.0.0.1:5939 ESTABLISHED Remote 127.0.0.1:49162 (Querying... ) Local 192.168.0.5:49165 ESTABLISHED Remote 95.211.37.203:5938 (Querying... ) Local 0.0.0.0:80 (HTTP) LISTEN Local 0.0.0.0:443 (HTTPS) LISTEN Local 0.0.0.0:5938 LISTEN Local 127.0.0.1:5939 LISTEN avgidsagent.exe (2240) Local 192.168.0.5:49570 ESTABLISHED Remote 204.193.144.31:80 (Querying... ) (HTTP) lsass.exe (820) Local 0.0.0.0:49155 LISTEN services.exe (804) Local 0.0.0.0:49160 LISTEN svchost.exe (1020) Local 0.0.0.0:135 (DCE) LISTEN svchost.exe (3272) Local 0.0.0.0:49166 LISTEN svchost.exe (380) Local 0.0.0.0:49153 LISTEN svchost.exe (668) Local 0.0.0.0:49154 LISTEN wininit.exe (688) Local 0.0.0.0:49152 LISTEN