Free Essay

Unit V Ip

In:

Submitted By Strghtlgz09
Words 3097
Pages 13
ComboFix 12-04-20.03 - Marianna 21/04/2012 19:50:54.1.4 - x64
Microsoft Windows 7 Home Premium 6.1.7600.0.1252.39.1040.18.4076.2621 [GMT 2:00]
Eseguito da: c:\users\Marianna\Downloads\ComboFix.exe
AV: Norton Internet Security *Disabled/Outdated* {63DF5164-9100-186D-2187-8DC619EFD8BF}
FW: Norton Internet Security *Disabled* {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}
SP: Norton Internet Security *Disabled/Outdated* {D8BEB080-B73A-17E3-1B37-B6B462689202}
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((((((((((((((( Altre eliminazioni )))))))))))))))))))))))))))))))))))))))))))))))))))
.
. c:\users\Public\sdelevURL.tmp C:\WinLogon
.
.
((((((((((((((((((((((((( Files Creati Da 2012-03-21 al 2012-04-21 )))))))))))))))))))))))))))))))))))
.
.
2012-04-21 17:59 . 2012-04-21 17:59 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-04-21 08:36 . 2012-04-21 08:36 -------- d-----w- c:\users\Marianna\AppData\Roaming\Publish Providers
2012-04-21 08:32 . 2012-04-21 08:33 -------- d-----w- c:\users\Marianna\AppData\Local\Sony
2012-04-21 08:29 . 2012-04-21 08:29 -------- d-----w- c:\programdata\Sony
2012-04-21 08:29 . 2012-04-21 08:29 -------- d-----w- c:\program files (x86)\Sony
2012-04-21 08:27 . 2012-04-21 08:36 -------- d-----w- c:\users\Marianna\AppData\Roaming\Sony
2012-04-21 08:19 . 2012-04-21 08:19 -------- d-----w- c:\program files (x86)\Phpnuke Downloader
2012-04-20 16:03 . 2012-04-13 08:46 8917360 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{A2605AF4-3403-4D21-9142-C999F8B81755}\mpengine.dll
2012-04-12 16:41 . 2012-03-06 06:43 5504880 ----a-w- c:\windows\system32\ntoskrnl.exe
2012-04-12 16:41 . 2012-03-06 05:59 3958128 ----a-w- c:\windows\SysWow64\ntkrnlpa.exe
2012-04-12 16:41 . 2012-03-06 05:59 3902320 ----a-w- c:\windows\SysWow64\ntoskrnl.exe
2012-04-12 16:40 . 2012-03-01 06:54 22896 ----a-w- c:\windows\system32\drivers\fs_rec.sys
2012-04-12 16:40 . 2012-03-01 06:40 80896 ----a-w- c:\windows\system32\imagehlp.dll
2012-04-12 16:40 . 2012-03-01 05:45 158720 ----a-w- c:\windows\SysWow64\imagehlp.dll
2012-04-12 16:40 . 2012-03-01 06:45 220672 ----a-w- c:\windows\system32\wintrust.dll
2012-04-12 16:40 . 2012-03-01 06:35 5120 ----a-w- c:\windows\system32\wmi.dll
2012-04-12 16:40 . 2012-03-01 05:49 172544 ----a-w- c:\windows\SysWow64\wintrust.dll
2012-04-12 16:40 . 2012-03-01 05:40 5120 ----a-w- c:\windows\SysWow64\wmi.dll
2012-04-04 18:10 . 2012-04-05 05:47 -------- d-----w- c:\windows\system32\drivers\NISx64\1207010.003
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-03-20 15:49 . 2012-03-20 15:49 0 ----a-w- c:\windows\SysWow64\sho82E7.tmp
2012-02-23 08:18 . 2011-10-16 16:29 279656 ------w- c:\windows\system32\MpSigStub.exe
2012-02-15 06:27 . 2012-03-14 15:49 1031680 ----a-w- c:\windows\system32\rdpcore.dll
2012-02-15 05:44 . 2012-03-14 15:49 826368 ----a-w- c:\windows\SysWow64\rdpcore.dll
2012-02-15 04:47 . 2012-03-14 15:49 204800 ----a-w- c:\windows\system32\drivers\rdpwd.sys
2012-02-15 04:46 . 2012-03-14 15:49 23552 ----a-w- c:\windows\system32\drivers\tdtcp.sys
2012-02-14 20:04 . 2012-02-14 20:04 91648 ----a-w- c:\windows\system32\SetIEInstalledDate.exe
2012-02-14 20:04 . 2012-02-14 20:04 89088 ----a-w- c:\windows\system32\RegisterIEPKEYs.exe
2012-02-14 20:04 . 2012-02-14 20:04 86528 ----a-w- c:\windows\SysWow64\iesysprep.dll
2012-02-14 20:04 . 2012-02-14 20:04 85504 ----a-w- c:\windows\system32\iesetup.dll
2012-02-14 20:04 . 2012-02-14 20:04 76800 ----a-w- c:\windows\SysWow64\SetIEInstalledDate.exe
2012-02-14 20:04 . 2012-02-14 20:04 76800 ----a-w- c:\windows\system32\tdc.ocx
2012-02-14 20:04 . 2012-02-14 20:04 74752 ----a-w- c:\windows\SysWow64\RegisterIEPKEYs.exe
2012-02-14 20:04 . 2012-02-14 20:04 74752 ----a-w- c:\windows\SysWow64\iesetup.dll
2012-02-14 20:04 . 2012-02-14 20:04 63488 ----a-w- c:\windows\SysWow64\tdc.ocx
2012-02-14 20:04 . 2012-02-14 20:04 603648 ----a-w- c:\windows\system32\vbscript.dll
2012-02-14 20:04 . 2012-02-14 20:04 49664 ----a-w- c:\windows\system32\imgutil.dll
2012-02-14 20:04 . 2012-02-14 20:04 48640 ----a-w- c:\windows\SysWow64\mshtmler.dll
2012-02-14 20:04 . 2012-02-14 20:04 48640 ----a-w- c:\windows\system32\mshtmler.dll
2012-02-14 20:04 . 2012-02-14 20:04 448512 ----a-w- c:\windows\system32\html.iec
2012-02-14 20:04 . 2012-02-14 20:04 420864 ----a-w- c:\windows\SysWow64\vbscript.dll
2012-02-14 20:04 . 2012-02-14 20:04 367104 ----a-w- c:\windows\SysWow64\html.iec
2012-02-14 20:04 . 2012-02-14 20:04 35840 ----a-w- c:\windows\SysWow64\imgutil.dll
2012-02-14 20:04 . 2012-02-14 20:04 30720 ----a-w- c:\windows\system32\licmgr10.dll
2012-02-14 20:04 . 2012-02-14 20:04 23552 ----a-w- c:\windows\SysWow64\licmgr10.dll
2012-02-14 20:04 . 2012-02-14 20:04 222208 ----a-w- c:\windows\system32\msls31.dll
2012-02-14 20:04 . 2012-02-14 20:04 173056 ----a-w- c:\windows\system32\ieUnatt.exe
2012-02-14 20:04 . 2012-02-14 20:04 165888 ----a-w- c:\windows\system32\iexpress.exe
2012-02-14 20:04 . 2012-02-14 20:04 161792 ----a-w- c:\windows\SysWow64\msls31.dll
2012-02-14 20:04 . 2012-02-14 20:04 160256 ----a-w- c:\windows\system32\wextract.exe
2012-02-14 20:04 . 2012-02-14 20:04 152064 ----a-w- c:\windows\SysWow64\wextract.exe
2012-02-14 20:04 . 2012-02-14 20:04 150528 ----a-w- c:\windows\SysWow64\iexpress.exe
2012-02-14 20:04 . 2012-02-14 20:04 142848 ----a-w- c:\windows\SysWow64\ieUnatt.exe
2012-02-14 20:04 . 2012-02-14 20:04 135168 ----a-w- c:\windows\system32\IEAdvpack.dll
2012-02-14 20:04 . 2012-02-14 20:04 12288 ----a-w- c:\windows\system32\mshta.exe
2012-02-14 20:04 . 2012-02-14 20:04 11776 ----a-w- c:\windows\SysWow64\mshta.exe
2012-02-14 20:04 . 2012-02-14 20:04 114176 ----a-w- c:\windows\system32\admparse.dll
2012-02-14 20:04 . 2012-02-14 20:04 111616 ----a-w- c:\windows\system32\iesysprep.dll
2012-02-14 20:04 . 2012-02-14 20:04 110592 ----a-w- c:\windows\SysWow64\IEAdvpack.dll
2012-02-14 20:04 . 2012-02-14 20:04 101888 ----a-w- c:\windows\SysWow64\admparse.dll
2012-02-10 06:18 . 2012-03-14 15:50 1541120 ----a-w- c:\windows\system32\DWrite.dll
2012-02-10 06:17 . 2012-03-14 15:50 1837568 ----a-w- c:\windows\system32\d3d10warp.dll
2012-02-10 06:17 . 2012-03-14 15:50 902656 ----a-w- c:\windows\system32\d2d1.dll
2012-02-10 06:17 . 2012-03-14 15:50 320512 ----a-w- c:\windows\system32\d3d10_1core.dll
2012-02-10 06:17 . 2012-03-14 15:50 197120 ----a-w- c:\windows\system32\d3d10_1.dll
2012-02-10 05:41 . 2012-03-14 15:50 1074176 ----a-w- c:\windows\SysWow64\DWrite.dll
2012-02-10 05:41 . 2012-03-14 15:50 218624 ----a-w- c:\windows\SysWow64\d3d10_1core.dll
2012-02-10 05:41 . 2012-03-14 15:50 161792 ----a-w- c:\windows\SysWow64\d3d10_1.dll
2012-02-10 05:41 . 2012-03-14 15:50 1170944 ----a-w- c:\windows\SysWow64\d3d10warp.dll
2012-02-10 05:41 . 2012-03-14 15:50 739840 ----a-w- c:\windows\SysWow64\d2d1.dll
2012-02-03 04:16 . 2012-03-14 15:50 3143168 ----a-w- c:\windows\system32\win32k.sys
2012-01-25 06:27 . 2012-03-14 15:49 76288 ----a-w- c:\windows\system32\rdpwsx.dll
2012-01-25 06:27 . 2012-03-14 15:49 149504 ----a-w- c:\windows\system32\rdpcorekmts.dll
2012-01-25 06:20 . 2012-03-14 15:49 9216 ----a-w- c:\windows\system32\rdrmemptylst.exe
.
.
((((((((((((((((((((((((((((((((((((( Punti Reg Caricati ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Nota* i valori vuoti & legittimi/default non sono visualizzati.
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Facebook Update"="c:\users\Marianna\AppData\Local\Facebook\Update\FacebookUpdate.exe" [2011-10-22 137536]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"RemoteControl10"="c:\program files (x86)\CyberLink\Media+Player10\Media+Player10Serv.exe" [2010-09-20 87336]
"CLMLServer"="c:\program files (x86)\CyberLink\Power2Go\CLMLSvc.exe" [2009-11-02 103720]
"Norton Online Backup"="c:\program files (x86)\Symantec\Norton Online Backup\NOBuClient.exe" [2010-06-01 1155928]
"Adobe Reader Speed Launcher"="c:\program files (x86)\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]
"APSDaemon"="c:\program files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2011-09-27 59240]
"iTunesHelper"="c:\program files (x86)\iTunes\iTunesHelper.exe" [2011-10-09 421736]
"SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2011-06-09 254696]
"CanonSolutionMenuEx"="c:\program files (x86)\Canon\Solution Menu EX\CNSEMAIN.EXE" [2010-09-14 1213848]
"IJNetworkScannerSelectorEX"="c:\program files (x86)\Canon\IJ Network Scanner Selector EX\CNMNSST.exe" [2010-09-09 452016]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Bluetooth.lnk - c:\program files\WIDCOMM\Bluetooth Software\BTTray.exe [2011-2-8 1136928]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
"PromptOnSecureDesktop"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\progra~2\WI5C88~1\Datamngr\datamngr.dll c:\progra~2\WI5C88~1\Datamngr\IEBHO.dll
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
Security Packages REG_MULTI_SZ kerberos msv1_0 schannel wdigest tspkg pku2u livessp
.
R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384]
R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]
R2 gupdate;Servizio Google Update (gupdate);c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-12-24 136176]
R3 BBSvc;Bing Bar Update Service;c:\program files (x86)\Microsoft\BingBar\BBSvc.EXE [2011-03-01 183560]
R3 GamesAppService;GamesAppService;c:\program files (x86)\WildTangent Games\App\GamesAppService.exe [2010-10-12 206072]
R3 gupdatem;Servizio Google Update (gupdatem);c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-12-24 136176]
R3 osppsvc;Office Software Protection Platform;c:\program files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE [2010-01-09 4925184]
R3 Samsung UPD Service;Samsung UPD Service;c:\windows\System32\SUPDSvc.exe [x]
R3 TurboBoost;Intel(R) Turbo Boost Technology Monitor 2.0;c:\program files\Intel\TurboBoost\TurboBoost.exe [2010-10-08 150016]
R3 WatAdminSvc;Servizio Windows Activation Technologies;c:\windows\system32\Wat\WatAdminSvc.exe [x]
R4 wlcrasvc;Windows Live Mesh remote connections service;c:\program files\Windows Live\Mesh\wlcrasvc.exe [2010-09-22 57184]
S0 SymDS;Symantec Data Store;c:\windows\system32\drivers\NISx64\1207010.003\SYMDS64.SYS [x]
S0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\NISx64\1207010.003\SYMEFA64.SYS [x]
S1 BHDrvx64;BHDrvx64;c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_18.1.0.37\Definitions\BASHDefs\20120121.002\BHDrvx64.sys [2011-12-01 1157240]
S1 IDSVia64;IDSVia64;c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_18.1.0.37\Definitions\IPSDefs\20120126.003\IDSvia64.sys [2011-12-15 488568]
S1 SABI;SAMSUNG Kernel Driver For Windows 7;c:\windows\system32\Drivers\SABI.sys [x]
S1 SymIRON;Symantec Iron Driver;c:\windows\system32\drivers\NISx64\1207010.003\Ironx64.SYS [x]
S1 SymNetS;Symantec Network Security WFP Driver;c:\windows\System32\Drivers\NISx64\1207010.003\SYMNETS.SYS [x]
S1 vwififlt;Virtual WiFi Filter Driver;c:\windows\system32\DRIVERS\vwififlt.sys [x]
S2 cvhsvc;Client Virtualization Handler;c:\program files (x86)\Common Files\Microsoft Shared\Virtualization Handler\CVHSVC.EXE [2012-01-04 822624]
S2 NIS;Norton Internet Security;c:\program files (x86)\Norton Internet Security\Engine\18.7.1.3\ccSvcHst.exe [2011-04-17 130008]
S2 NOBU;Norton Online Backup;c:\program files (x86)\Symantec\Norton Online Backup\NOBuAgent.exe SERVICE [x]
S2 sftlist;Application Virtualization Client;c:\program files (x86)\Microsoft Application Virtualization Client\sftlist.exe [2011-10-01 508776]
S2 TurboB;Turbo Boost UI Monitor driver;c:\windows\system32\DRIVERS\TurboB.sys [x]
S2 UNS;Intel(R) Management and Security Application User Notification Service;c:\program files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe [2010-12-21 2656280]
S3 BTWAMPFL;BTWAMPFL;c:\windows\system32\DRIVERS\btwampfl.sys [x]
S3 btwl2cap;Bluetooth L2CAP Service;c:\windows\system32\DRIVERS\btwl2cap.sys [x]
S3 clwvd;CyberLink WebCam Virtual Driver;c:\windows\system32\DRIVERS\clwvd.sys [x]
S3 MEIx64;Intel(R) Management Engine Interface;c:\windows\system32\DRIVERS\HECIx64.sys [x]
S3 NVHDA;Service for NVIDIA High Definition Audio Driver;c:\windows\system32\drivers\nvhda64v.sys [x]
S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys [x]
S3 Sftfs;Sftfs;c:\windows\system32\DRIVERS\Sftfslh.sys [x]
S3 Sftplay;Sftplay;c:\windows\system32\DRIVERS\Sftplaylh.sys [x]
S3 Sftredir;Sftredir;c:\windows\system32\DRIVERS\Sftredirlh.sys [x]
S3 Sftvol;Sftvol;c:\windows\system32\DRIVERS\Sftvollh.sys [x]
S3 sftvsa;Application Virtualization Service Agent;c:\program files (x86)\Microsoft Application Virtualization Client\sftvsa.exe [2011-10-01 219496]
.
.
Contenuto della cartella 'Scheduled Tasks'
.
2012-04-21 c:\windows\Tasks\FacebookUpdateTaskUserS-1-5-21-336442205-827502387-1674173946-1001Core.job
- c:\users\Marianna\AppData\Local\Facebook\Update\FacebookUpdate.exe [2011-10-22 12:25]
.
2012-04-21 c:\windows\Tasks\FacebookUpdateTaskUserS-1-5-21-336442205-827502387-1674173946-1001UA.job
- c:\users\Marianna\AppData\Local\Facebook\Update\FacebookUpdate.exe [2011-10-22 12:25]
.
2012-04-21 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-12-24 09:23]
.
2012-04-21 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-12-24 09:23]
.
.
--------- x86-64 -----------
.
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A40DC6C5-79D0-4ca8-A185-8FF989AF1115}]
2011-06-01 20:34 1793432 ----a-w- c:\progra~2\WI5C88~1\Datamngr\x64\IEBHO.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RAVCpl64.exe" [2011-02-27 11780712]
"IntelTBRunOnce"="wscript.exe" [2009-07-14 168960]
"CanonMyPrinter"="c:\program files\Canon\MyPrinter\BJMyPrt.exe" [2010-07-25 2782096]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"LoadAppInit_DLLs"=0x1
"AppInit_DLLs"=c:\progra~2\WI5C88~1\Datamngr\x64\datamngr.dll c:\progra~2\WI5C88~1\Datamngr\x64\IEBHO.dll
.
------- Scansione supplementare -------
.
uLocal Page = c:\windows\system32\blank.htm uStart Page = hxxp://www.google.it/ mStart Page = hxxp://samsung.msn.com mLocal Page = c:\windows\SysWOW64\blank.htm uInternet Settings,ProxyOverride = *.local
IE: Invia immagine alla periferica &Bluetooth... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm
IE: Invia pagina alla periferica &Bluetooth... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
IE: Save video on Savevid.com - c:\program files (x86)\Savevid\redirect.htm
IE: {{328ECD19-C167-40eb-A0C7-16FE7634105E} - {94BB0C4C-B957-479A-85E4-42F53B89F681} - c:\program files\Samsung AnyWeb Print\W2PBrowser.dll
TCP: DhcpNameServer = 192.168.1.1
FF - ProfilePath - c:\users\Marianna\AppData\Roaming\Mozilla\Firefox\Profiles\87zzkdrh.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.searchqu.com/405
FF - prefs.js: keyword.URL - hxxp://dts.search-results.com/sr?src=ffb&appid=0&systemid=405&q=
.
- - - - CHIAVI ORFANE RIMOSSE - - - -
.
Toolbar-Locked - (no file)
Toolbar-10 - (no file)
Toolbar-Locked - (no file)
Toolbar-10 - (no file)
.
.
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\services\NIS]
"ImagePath"="\"c:\program files (x86)\Norton Internet Security\Engine\18.7.1.3\ccSvcHst.exe\" /s \"NIS\" /m \"c:\program files (x86)\Norton Internet Security\Engine\18.7.1.3\diMaster.dll\" /prefetch:1"
.
--------------------- CHIAVI DI REGISTRO BLOCCATE ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash10h.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.10"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash10h.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash10h.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash10h.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Ora fine scansione: 2012-04-21 20:02:38
ComboFix-quarantined-files.txt 2012-04-21 18:02
.
Pre-Run: 122.266.587.136 byte disponibili
Post-Run: 123.688.820.736 byte disponibili
.
- - End Of File - - AB79002002719FCB03CEB207BE90B1FB

Similar Documents

Free Essay

Network

...Network Technology and Service Integration Unit 1 Homework The following homework is designed to cover the course objectives for this unit. Assignment 1.1: Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 3 VLSM Subnetting a Subnet Exercises on pages 9-11 VLSM Addressing Design Scenarios 1-6 on pages 15-20 Summary Route Exercises on pages 21-24 Concept Questions on pages 25-27 VLSM Case Study on page 27 Internet Research on page 29 (Use the ITT Tech Virtual Library.) • Complete Chapter 9 Review Questions 2-7, 10, 14, 20-22 on pages 258-259 of Introduction to Telecommunications. Submit your written answers to your instructor at the beginning of Unit 2. . Assignment 1.2: Virtual Labs • Complete Virtual Labs 6, 7, and 8 from the CCNA 640-802 CCNA Simulator, which you can find by clicking through these paths: ICND1 Troubleshooting Scenarios Lab 6: IP Addressing and Routing. ICND1 Troubleshooting Scenarios ICND1 Part 4: Troubleshooting Labs Lab 7: IP Routing I ICND 2 Troubleshooting Scenarios Lab 13: IP Routing II Submit your written answers to your instructor at the beginning of Unit 2. ©ITT Educational Services, Inc: Date: 03/13/09 Network Technology and Service Integration Unit 2 Homework The following homework is designed to cover the course objectives for this unit. Assignment 2.1: Textbook/Workbook Assignments • Complete the following exercises...

Words: 2825 - Pages: 12

Free Essay

Case Study

...Paper III Paper IV Practical I Paper V Paper VI Paper VII Practical II Project Advanced Computer Architecture Computer Graphics & Multimedia Software Engineering Computer Networks Computer Graphics and Multimedia Lab Advanced Operating System Internet programming and Web Design Data Mining and Warehousing Internet programming and Web Design Lab Project Work and Viva Voce Total University Examinations Durations Max in Hrs Marks 3 100 3 100 3 100 3 100 3 100 3 3 3 3 100 100 100 100 100 1000 II For project work and viva voce (External) Breakup: Project Evaluation : 75 Viva Voce : 25 1 Anx.31 J - M Sc CS (SDE) 2007-08 with MQP Page 2 of 16 YEAR – I PAPER I: ADVANCED COMPUTER ARCHITECTURE Subject Description: This paper presents the concept of parallel processing, solving problem in parallel processing, Parallel algorithms and different types of processors. Goal: To enable the students to learn the Architecture of the Computer. Objectives: On successful completion of the course the students should have: Understand the concept of Parallel Processing. Learnt the different types of Processors. Learnt the Parallel algorithms. Content: Unit I Introduction to parallel processing – Trends towards parallel processing – parallelism in uniprocessor Systems – Parallel Computer structures – architectural classification schemes – Flynn’ Classification – Feng’s Classification – Handler’s Classification – Parallel Processing Applications. Unit II Solving problems in Parallel:...

Words: 3613 - Pages: 15

Premium Essay

1102

...Short Run Equilibrium Equilibrium condition Y  PAE Y  [C  cT  I  G  X ]  c(1  t )Y P Solve for equilibrium GDP Y [1  c(1  t )]  [C  cT  I P  G  X ] Ye  1 [C  cT  I P  G  X ] [1  c(1  t )] 3 Recap Week 6: Keynesian model – recessionary gap . PAE (planned aggregate expenditure) PAE = Cd + IP + G + X 0 IP+ G + X IP + G IP Y* Y (= GDP) Starting at potential output (Y*), a fall in exogenous C, I, G, NX will lead to a recessionary gap 4 Recap Week 6: If we assume that the planned aggregate expenditure is given by the equation PAE = 960 + 0.8Y a 10-unit drop in exogenous expenditure would result in a _____________ in short-run equilibrium output. A. 50-unit decline B. 40-unit decline C. 950-unit decline D. 4-unit decline 5 Recap Week 6: Keynesian model – recessionary gap . PAE (planned aggregate expenditure) PAE = C + IP + G + NX 0 Ye Y* I P + G + NX IP + G IP Y (= GDP) Recessionary gap 6 Recap Week 6: Keynesian model – expansionary gap . PAE (planned aggregate expenditure) PAE = C + IP + G + NX I P + G + NX IP + G 0 IP Y* Ye Expansionary gap Y (= GDP) 7 Recap Week 6: Multipliers  The government expenditure multiplier is greater than the tax/transfers multiplier  Withdrawals – higher income taxes and imports – reduce the impact of the multipliers 8 Recap Week 6: The short-run effect of equilibrium GDP of an equal change...

Words: 3681 - Pages: 15

Free Essay

Kaplan It 530 Unit 1

...Unit 1: Exploring DNS Kaplan University IT 530 July 2, 2013 Unit 1: Exploring DNS A domain name system (DNS) serves an important role for those who wish to access other networks, which includes websites. DNS allows for users to be able to be able to access Internet websites through a unique name rather than having to memorize a lengthy set of numbers and periods. In addition, DNS allows for the physical hosting location of a network or website to change transparently without anyone noticing. This is more commonly referred to as when a website changes hosts. Furthermore, DNS serves important functions related to mail by allowing users to connect, send, and receive email messages based off of the DNS of the mail server for a specific network (Karrenberg, 2004). Exploring Hierarchies All domains follow a certain hierarchy top to bottom hierarchy. The order for this hierarchy is: 1. root domain 2. top level 3. second level 4. sub-domain The root domain is a top-level domain that refers to the Internet. This is mostly maintained by ICANN, which is a private organization that maintain this area. ICANN manages the internet protocol addresses as well as the DNS root zones. ICANN also manages the DNS policy on naming abilities for top level domains ("INETDAEMON.com," 2013). The level that most users will first visibly notice when connecting to a domain through DNS is the top level domain. In this domain is the area where users will see .com, .net, and .org,...

Words: 1449 - Pages: 6

Premium Essay

Hotel Management Srs

...Questions UNIT I KNOWLEDGE OF SPECIFIC FACTS 1. What is computer network? 2. What is the difference between computer network and distributed system? 3. What is client-server model? 4. What are local area networks? 5. What are metropolitan area networks? 6. What are wide area networks? 7. What is multicasting? 8. What is broadcasting? 9. What is unicasting? 10. What are switching elements? 11. What is routing algorithm? 12. What is blue tooth? 13. What is communication subnet? 14. What are peers? 15. What is a protocol stack? 16. What is topology? 17. What is ring topology? 18. What is star topology? 19. What is bus topology? 20. What is mesh topology? 21. What is tree topology? 22. What is connection-oriented service? 23. What is connection less service? 24. What is a datagram service? 25. What is store and forward network? 26. What is a cell? KNOWLEDGE OF TERMINOLOGY 27. Define broadcast links. 28. Define point-to-point links 29. Define gateway 30. Define Internet work. 31. Define protocol. 32. Define interface. 33. Define bandwidth. KNOWLEDGE OF CLASSIFICATION AND CATEGORY 34. Give the two types of transmission technology. 35. Give the different types of services. 36. Mention the different types of reference models 37. Mention the different layers of OSI reference model. 38. Mention the different layers of TCP/IP reference...

Words: 2997 - Pages: 12

Free Essay

Statistics

...in integer quantities. If requiring integer values is the only way in which a problem deviates from a linear programming formulation, then it is an integer programming (IP) problem. (The more complete name is integer linear programming, but the adjective linear normally is dropped except when this problem is contrasted with the more esoteric integer nonlinear programming problem, which is beyond the scope of this book.) The mathematical model for integer programming is the linear programming model (see Sec. 3.2) with the one additional restriction that the variables must have integer values. If only some of the variables are required to have integer values (so the divisibility assumption holds for the rest), this model is referred to as mixed integer programming (MIP). When distinguishing the all-integer problem from this mixed case, we call the former pure integer programming. For example, the Wyndor Glass Co. problem presented in Sec. 3.1 actually would have been an IP problem if the two decision variables x1 and x2 had represented the total number of units to be produced of products 1 and 2, respectively, instead of the production rates. Because both products (glass doors and wood-framed windows) necessarily come in whole units, x1 and x2 would have to be restricted to integer values. Another example of an IP problem is provided by the prize-winning OR study...

Words: 36302 - Pages: 146

Premium Essay

Management

...Indian Public Health Standards (IPHS) Guidelines for Community Health Centres Revised 2012 Directorate General of Health Services Ministry of Health & Family Welfare Government of India Indian Public Health Standards (IPHS) Guidelines for Community Health Centres Revised 2012 Directorate General of Health Services Ministry of Health & Family Welfare Government of India CONTENTS Message Foreword Preface Acknowledgements Executive Summary Indian Public Health Standards (IPHS) for Community Health Centres v vi vii viii 1 3 Introduction�������������������������������������������������������������������������������������������������������������������������������������������������������� 3 Objectives of Indian Public Health Standards (IPHS) for CHCs���������������������������������������������������������������������������� 3 Service Delivery in CHCs�������������������������������������������������������������������������������������������������������������������������������������� 3 Manpower����������������������������������������������������������������������������������������������������������������������������������������������������������� 8 Equipment��������������������������������������������������������������������������������������������������������������������������������������������������������� 11 Drugs�����������������������������������������������������������������������������������������������������������������������������������������������������������������...

Words: 25498 - Pages: 102

Premium Essay

Nt1330 Unit 1 Assignment 1

...Unit 1 Assignment 1 DNS servers provide domain name resolution for network resources. They associate the TCP/IP address assigned by DHCP to a client with its fully qualified domain name. The association of an IP address to a domain name requires that a change in either the address or the name requires an update of the information in DNS. The DHCP protocol does not do this automatically. To make this more seamless, servers running Windows Server® 2008 and DHCP and clients running DHCP can register with DNS, allowing the two to cooperate (TechNet) Dynamic Host Configuration Protocol (DHCP) is a protocol that assists in configuring IP addresses, subnet masks, default routers, and other IP parameters to client PCs that don't have a static IP address. These computers locate a DHCP server in their local network that gives them an IP address so they can connect to the internet or other computers within the local network. (dhcp server) There are four way to allocate dynamic IP addresses: automatic, dynamic, roaming, and manual. Three of these (dynamic, roaming, and manual) use DHCP to assign the IP addresses. (DHCP Servers) There are a number of downsides to administering IP addresses statically. Foremost is human error. If the administrator mistypes the IP address or subnet mask, the workstation may not have connectivity to the resources it requires. If the DNS or WINS server IP addresses are mistyped, the workstation will not be able to perform name resolution. If the default gateway...

Words: 486 - Pages: 2

Premium Essay

Data Communication and Networking

... |3 |0 |0 |3 | |PRACTICAL | |6 |MC9237 |Graphics Lab |0 |0 |3 |2 | |7 |MC9238 |Microprocessor Lab |0 |0 |3 |2 | |8 |MC9239 |Web Programming Lab |0 |0 |3 |2 | | TOTAL |15 |0 |9 |21 | MC9231 COMPUTER NETWORKS L T P C 3 0 0 3 UNIT I INTRODUCTION 9 Communication model – Data communications...

Words: 1592 - Pages: 7

Premium Essay

Expected Us Gdp Growth Rate Going Forward

...Unit 1 Individual Project: TCP/IP Instructor: Michael Pry Robert Long American Intercontinental University Abstract In this brief I will attempt to explain the usage of the TCP/IP protocol so that the user may better understand the functions of this protocol. I will also provide the pertainate information for the configuration of the TCP/IP protocol to you system this will include the setting for this configuration. One of the most popular network protocols in use today is TCP/IP, (Transmission Control Protocol / Internet Protocol) which is the basic transmission language or protocol of the internet. This may also be utilized as a communications protocol in a private network as well, such as intranet or extranet. If you utilize a set up with direct access to the internet your computer is given a copy of the TCP / IP program as well as every other computer that you deal with (messages for example) or for information they to have a copy of TCP / IP. So let us address TCP/IP for a minute, TCP/IP is a two layer program, the higher of the two layers is the Transmission Control Protocol which manages the assembling of the message or file into a smaller packet. These are transmitted over the internet and received by a TCP layer which reconstructs the packet into the original message. The lower layer IP (Internet Protocol) deals with the address part of each packet so that it is routed to the proper destination. Every gateway computer on this network will check the...

Words: 1097 - Pages: 5

Free Essay

Gjgjgj

...APPLICATION SKETCHES : INDUCTIVE PROXIMITY SWITCH IPS IPS IPS RAILROAD YARD POSITATION SENSING NUT PLACEMENT ON TRANSFORMER SORT FERROUS & NON FERROUES CAN TOPS DETECTING INCORRECT SHAPE OF TARGET MATERIAL CUTTER M/MIN DOG IPS M8 IPS XXX SLOT IPS MIN BLK IPS MIN BLK POSITION SENSOR SPEED SENSING OF MACHINES Trigger SENSOR TABLET COUNTING POSITIONING OF BOTTLES Metal Parts Sensors SENSORS Work to be dipped Sensor VALVE POSITION CONTROL POSITION SENSOR FOR GALVANISING PLANT DRILL BREAK SENSOR PART COUNTER INDUCTIVE PROXIMITY SWITCH - SERIES IPS Flush Mounting: Fixing of switches in the metal up to their sensing face. Non-Flush Mounting: These switches are to be mounted keeping metal free zone around its sensing face. SENSING DISTANCE Sensing Distance of inductive Proximity Switch depends on, Size of the Proximity Switch/ Sensing Face and Material to be sensed. OBJECT The sensing distance specified here is for object made of mild steel, having thickness of 1 mm. Size of the object should be at least equal to the diameter of switch / sensing face. For object other than M.S. apply suitable correction factor CORRECTION FACTOR : Apply following correction factor (%) when object is other than Mild Steel. MS 100 SALIENT FEATURES : 1) 2) 3) 4) 5) 6) Repeat Accuracy Hysteresis Grade of Protection Enclosure LED Indication Ambient temp : : : : : : 0.02 mm 3-10% IP 67. For block type: IP 55 Metallic (Nickel-Chrome plated brass)...

Words: 3570 - Pages: 15

Premium Essay

Myself

... TCP  · UDP  · SCTP  · DCCP  · SPX | 3. Network Layer | IP (IPv4, IPv6)  · ICMP  · IPsec  · IGMP  ·IPX  · AppleTalk | 2. Data Link Layer | ATM  · SDLC  · HDLC  · ARP  · CSLIP  ·SLIP  · PLIP  · IEEE 802.3  · Frame Relay · ITU-T G.hn DLL  · PPP  · X.25 | 1. Physical Layer | EIA/TIA-232  · EIA/TIA-449  · ITU-T V-Series  · I.430  · I.431  · POTS  · PDH  ·SONET/SDH  · PON  · OTN  · DSL  ·IEEE 802.3  · IEEE 802.11  · IEEE 802.15 · IEEE 802.16  · IEEE 1394  · ITU-T G.hn PHY  · USB  · Bluetooth · Blue | This box: view · talk · edit | The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a way of sub-dividing a communications system into smaller parts called layers. A layer is a collection of similar functions that provide services to the layer above it and receives services from the layer below it. On each layer, an instance provides services to the instances at the layer above and requests service from the layer below. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of the path. two instances at one layer are connected by a horizontal connection on that layer. Most network protocols used in the market today are based on TCP/IP stacks. Communication in the OSI-Model...

Words: 3915 - Pages: 16

Premium Essay

Nt2640

...NT2640 IP Networking INSTRUCTOR GUIDE Onsite Credit hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport...

Words: 22068 - Pages: 89

Premium Essay

The Jim Crow Laws

...Plessy v. Ferguson. Plessy v. Ferguson was a case that took place in 1896, in which the United States Supreme Court ruled in favor of “separate but equal” (“Plessy v. Ferguson” 1). In a way, this served as the foundation of Jim Crow laws. The court said “separate but equal” and people referred back to this statement often when discussing Jim Crow laws. The flaw of this statement was that African Americans were not given equal quality facilities and opportunity. EXAMPLES OF JIM CROW LAWS As previously stated Jim Crow laws were segregation laws. So what exactly is segregation? Clive Gifford says “segregation is the keeping a part of different races in some, or all, areas of everyday life.” (Gifford 24). That is exactly what these laws did. They were meant to separate races in basically...

Words: 1665 - Pages: 7

Free Essay

Software

...Programming Languages Lab 0 3 2 Seminar - - 2 Total Credits (6 Theory + 1 Lab.) 22 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD MASTER OF TECHNOLOGY (REAL TIME SYSTEMS) I SEMESTER ADVANCED COMPUTER ARCHITECTURE UNIT I Concept of instruction format and instruction set of a computer, types of operands and operations; addressing modes; processor organization, register organization and stack organization; instruction cycle; basic details of Pentium processor and power PC processor, RISC and CISC instruction set. UNIT II Memory devices; Semiconductor and ferrite core memory, main memory, cache memory, associative memory organization; concept of virtual memory; memory organization and mapping; partitioning, demand paging, segmentation; magnetic disk organization, introduction to magnetic tape and CDROM. UNIT III IO Devices, Programmed IO, interrupt driver IO, DMA IO modules, IO addressing; IO channel, IO Processor, DOT matrix printer, ink jet printer, laser printer. Advanced concepts; Horizontal and vertical instruction format, microprogramming, microinstruction sequencing and control; instruction pipeline; parallel processing; problems in parallel processing; data hazard, control hazard. UNIT IV ILP software approach-complier techniques-static branch protection-VLIW approach-H.W...

Words: 3183 - Pages: 13