Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

COM Error crashes computer when trying to email


  • Please log in to reply

#61
shorthaul99

shorthaul99

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 133 posts

AvastCrash#2.jpg

 

 

 

Crashed again after disabling Trace Disk IO Calls...


  • 0

Advertisements


#62
RKinner

RKinner

    Malware Expert

  • Expert
  • 24,748 posts
  • MVP

Did it leave you any files on the desktop?  It usually creates a log file and also a copy of the mbr.

 

It's possible that Kaspersky doesn't like it and is killing it since the last line said it was checking a Kaspersky file.  Not sure I've ever run it on a Kaspersky protected system.

 

Usually it only crashes in both modes when there is something wrong with the file structure.  It might be worth running a disk check to make sure there is nothing wrong there:

 

1. Double-click My Computer, and then right-click the hard disk that you want to check. C:
2. Click Properties, and then click Tools.
3. Under Error-checking, click Check Now. A dialog box that shows the Check disk options is displayed,
4. Check both boxes and then click Start.
You will receive the following message:
The disk check could not be performed because the disk check utility needs exclusive access to some Windows files on the disk. These files can be accessed by restarting Windows. Do you want to schedule the disk check to occur the next time you restart the computer?
Click Yes to schedule the disk check.

 

Reboot and the disk check should start.  It takes several hours depending on the size of the disk and the speed of the CPU so you might want to run it at night.

 

I usually follow up with

 

sfc /scannow

 

in case it removes a bad sector during the check:

 

Start, All Programs, Accessories then right click on Command Prompt and Run as Administrator.  Then type (with an Enter after each line).

sfc /scannow

(SPACE after sfc.  This will check your critical system files. Does this finish without complaint?  IF it says it couldn't fix everything then:

Copy the next two lines:
findstr  /c:"[SR]"  \windows\logs\cbs\cbs.log  >  %UserProfile%\desktop\junk.txt
notepad %UserProfile%\desktop\junk.txt


Start, All Programs, Accessories, right click on Command Prompt and Run as Administrator, Continue.  Right click and Paste or Edit then Paste and the copied line should appear.
Hit Enter if notepad does not open.  Copy and paste the text from notepad into a reply. 

 

Then I run VEW to make sure there are no new errors.

 

Have we run Rogue Killer?

 

Let's run Rogue Killer

http://www.adlice.co...iller/#download
Portable 32 bits
Portable 64 bits

Download and Save.



Right click on the downloaded file (RogueKillerX64.exe or RogueKiller.exe)  and Run As admin

Start Scan
Start Scan

Will take about 20 minutes to complete.

Open Report
Export TXT (save it to your desktop as rk) Save

Do not let Rogue Killer remove anything until you hear from me.  Leave Rogue Killer up (but minimized) so you won't have to rescan.

Open rk.txt and copy and paste it to your next Reply.


 


  • 0

#63
shorthaul99

shorthaul99

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 133 posts

ASWMBR did not leave any logs or files that I could retrieve. Also, CHKDSK didn't not come back with any kind of log or errors. 

 

Here is scannow log:

 

 

2017-12-13 18:34:24, Info                  CSI    00000009 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:24, Info                  CSI    0000000a [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:24, Info                  CSI    0000000c [SR] Verify complete
2017-12-13 18:34:24, Info                  CSI    0000000d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:24, Info                  CSI    0000000e [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:24, Info                  CSI    00000010 [SR] Verify complete
2017-12-13 18:34:25, Info                  CSI    00000011 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:25, Info                  CSI    00000012 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:25, Info                  CSI    00000014 [SR] Verify complete
2017-12-13 18:34:25, Info                  CSI    00000015 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:25, Info                  CSI    00000016 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:25, Info                  CSI    00000018 [SR] Verify complete
2017-12-13 18:34:25, Info                  CSI    00000019 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:25, Info                  CSI    0000001a [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:26, Info                  CSI    0000001c [SR] Verify complete
2017-12-13 18:34:26, Info                  CSI    0000001d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:26, Info                  CSI    0000001e [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:26, Info                  CSI    00000020 [SR] Verify complete
2017-12-13 18:34:26, Info                  CSI    00000021 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:26, Info                  CSI    00000022 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:27, Info                  CSI    00000024 [SR] Verify complete
2017-12-13 18:34:27, Info                  CSI    00000025 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:27, Info                  CSI    00000026 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:27, Info                  CSI    00000028 [SR] Verify complete
2017-12-13 18:34:27, Info                  CSI    00000029 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:27, Info                  CSI    0000002a [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:27, Info                  CSI    0000002c [SR] Verify complete
2017-12-13 18:34:28, Info                  CSI    0000002d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:28, Info                  CSI    0000002e [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:28, Info                  CSI    00000030 [SR] Verify complete
2017-12-13 18:34:28, Info                  CSI    00000031 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:28, Info                  CSI    00000032 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:28, Info                  CSI    00000034 [SR] Verify complete
2017-12-13 18:34:28, Info                  CSI    00000035 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:28, Info                  CSI    00000036 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:29, Info                  CSI    00000038 [SR] Verify complete
2017-12-13 18:34:29, Info                  CSI    00000039 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:29, Info                  CSI    0000003a [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:29, Info                  CSI    0000003c [SR] Verify complete
2017-12-13 18:34:29, Info                  CSI    0000003d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:29, Info                  CSI    0000003e [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:30, Info                  CSI    00000040 [SR] Verify complete
2017-12-13 18:34:30, Info                  CSI    00000041 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:30, Info                  CSI    00000042 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:30, Info                  CSI    00000044 [SR] Verify complete
2017-12-13 18:34:30, Info                  CSI    00000045 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:30, Info                  CSI    00000046 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:30, Info                  CSI    00000048 [SR] Verify complete
2017-12-13 18:34:31, Info                  CSI    00000049 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:31, Info                  CSI    0000004a [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:31, Info                  CSI    0000004c [SR] Verify complete
2017-12-13 18:34:31, Info                  CSI    0000004d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:31, Info                  CSI    0000004e [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:31, Info                  CSI    00000050 [SR] Verify complete
2017-12-13 18:34:31, Info                  CSI    00000051 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:31, Info                  CSI    00000052 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:32, Info                  CSI    00000054 [SR] Verify complete
2017-12-13 18:34:32, Info                  CSI    00000055 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:32, Info                  CSI    00000056 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:32, Info                  CSI    00000058 [SR] Verify complete
2017-12-13 18:34:32, Info                  CSI    00000059 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:32, Info                  CSI    0000005a [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:33, Info                  CSI    0000005c [SR] Verify complete
2017-12-13 18:34:33, Info                  CSI    0000005d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:33, Info                  CSI    0000005e [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:34, Info                  CSI    00000060 [SR] Verify complete
2017-12-13 18:34:34, Info                  CSI    00000061 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:34, Info                  CSI    00000062 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:34, Info                  CSI    00000064 [SR] Verify complete
2017-12-13 18:34:35, Info                  CSI    00000065 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:35, Info                  CSI    00000066 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:35, Info                  CSI    00000068 [SR] Verify complete
2017-12-13 18:34:35, Info                  CSI    00000069 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:35, Info                  CSI    0000006a [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:36, Info                  CSI    0000006c [SR] Verify complete
2017-12-13 18:34:36, Info                  CSI    0000006d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:36, Info                  CSI    0000006e [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:37, Info                  CSI    00000070 [SR] Verify complete
2017-12-13 18:34:37, Info                  CSI    00000071 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:37, Info                  CSI    00000072 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:37, Info                  CSI    00000074 [SR] Verify complete
2017-12-13 18:34:37, Info                  CSI    00000075 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:37, Info                  CSI    00000076 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:38, Info                  CSI    00000078 [SR] Verify complete
2017-12-13 18:34:38, Info                  CSI    00000079 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:38, Info                  CSI    0000007a [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:38, Info                  CSI    0000007c [SR] Verify complete
2017-12-13 18:34:38, Info                  CSI    0000007d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:38, Info                  CSI    0000007e [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:39, Info                  CSI    00000080 [SR] Verify complete
2017-12-13 18:34:39, Info                  CSI    00000081 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:39, Info                  CSI    00000082 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:39, Info                  CSI    00000084 [SR] Verify complete
2017-12-13 18:34:39, Info                  CSI    00000085 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:39, Info                  CSI    00000086 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:40, Info                  CSI    00000088 [SR] Verify complete
2017-12-13 18:34:40, Info                  CSI    00000089 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:40, Info                  CSI    0000008a [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:42, Info                  CSI    0000008c [SR] Verify complete
2017-12-13 18:34:42, Info                  CSI    0000008d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:42, Info                  CSI    0000008e [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:43, Info                  CSI    00000090 [SR] Verify complete
2017-12-13 18:34:43, Info                  CSI    00000091 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:43, Info                  CSI    00000092 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:44, Info                  CSI    00000094 [SR] Verify complete
2017-12-13 18:34:44, Info                  CSI    00000095 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:44, Info                  CSI    00000096 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:45, Info                  CSI    0000009a [SR] Verify complete
2017-12-13 18:34:46, Info                  CSI    0000009b [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:46, Info                  CSI    0000009c [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:48, Info                  CSI    000000a1 [SR] Verify complete
2017-12-13 18:34:48, Info                  CSI    000000a2 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:48, Info                  CSI    000000a3 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:49, Info                  CSI    000000a5 [SR] Verify complete
2017-12-13 18:34:50, Info                  CSI    000000a6 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:50, Info                  CSI    000000a7 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:51, Info                  CSI    000000aa [SR] Verify complete
2017-12-13 18:34:51, Info                  CSI    000000ab [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:51, Info                  CSI    000000ac [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:53, Info                  CSI    000000ae [SR] Verify complete
2017-12-13 18:34:53, Info                  CSI    000000af [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:53, Info                  CSI    000000b0 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:56, Info                  CSI    000000d2 [SR] Verify complete
2017-12-13 18:34:56, Info                  CSI    000000d3 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:56, Info                  CSI    000000d4 [SR] Beginning Verify and Repair transaction
2017-12-13 18:34:57, Info                  CSI    000000d9 [SR] Verify complete
2017-12-13 18:34:57, Info                  CSI    000000da [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:34:57, Info                  CSI    000000db [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:00, Info                  CSI    000000dd [SR] Verify complete
2017-12-13 18:35:00, Info                  CSI    000000de [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:00, Info                  CSI    000000df [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:01, Info                  CSI    000000e1 [SR] Verify complete
2017-12-13 18:35:01, Info                  CSI    000000e2 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:01, Info                  CSI    000000e3 [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:03, Info                  CSI    000000e5 [SR] Verify complete
2017-12-13 18:35:03, Info                  CSI    000000e6 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:03, Info                  CSI    000000e7 [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:04, Info                  CSI    000000e9 [SR] Verify complete
2017-12-13 18:35:05, Info                  CSI    000000ea [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:05, Info                  CSI    000000eb [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:07, Info                  CSI    000000ed [SR] Verify complete
2017-12-13 18:35:07, Info                  CSI    000000ee [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:07, Info                  CSI    000000ef [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:09, Info                  CSI    00000112 [SR] Verify complete
2017-12-13 18:35:09, Info                  CSI    00000113 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:09, Info                  CSI    00000114 [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:12, Info                  CSI    00000116 [SR] Verify complete
2017-12-13 18:35:12, Info                  CSI    00000117 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:12, Info                  CSI    00000118 [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:16, Info                  CSI    0000011a [SR] Verify complete
2017-12-13 18:35:16, Info                  CSI    0000011b [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:16, Info                  CSI    0000011c [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:19, Info                  CSI    00000120 [SR] Verify complete
2017-12-13 18:35:19, Info                  CSI    00000121 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:19, Info                  CSI    00000122 [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:20, Info                  CSI    00000124 [SR] Verify complete
2017-12-13 18:35:20, Info                  CSI    00000125 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:20, Info                  CSI    00000126 [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:21, Info                  CSI    00000128 [SR] Verify complete
2017-12-13 18:35:21, Info                  CSI    00000129 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:21, Info                  CSI    0000012a [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:22, Info                  CSI    0000012c [SR] Verify complete
2017-12-13 18:35:22, Info                  CSI    0000012d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:22, Info                  CSI    0000012e [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:25, Info                  CSI    0000013e [SR] Verify complete
2017-12-13 18:35:25, Info                  CSI    0000013f [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:25, Info                  CSI    00000140 [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:27, Info                  CSI    00000145 [SR] Verify complete
2017-12-13 18:35:27, Info                  CSI    00000146 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:27, Info                  CSI    00000147 [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:28, Info                  CSI    00000149 [SR] Verify complete
2017-12-13 18:35:28, Info                  CSI    0000014a [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:28, Info                  CSI    0000014b [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:30, Info                  CSI    0000014d [SR] Verify complete
2017-12-13 18:35:30, Info                  CSI    0000014e [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:30, Info                  CSI    0000014f [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:31, Info                  CSI    00000151 [SR] Verify complete
2017-12-13 18:35:31, Info                  CSI    00000152 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:31, Info                  CSI    00000153 [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:34, Info                  CSI    00000156 [SR] Verify complete
2017-12-13 18:35:34, Info                  CSI    00000157 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:34, Info                  CSI    00000158 [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:36, Info                  CSI    0000015b [SR] Verify complete
2017-12-13 18:35:36, Info                  CSI    0000015c [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:36, Info                  CSI    0000015d [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:37, Info                  CSI    0000015f [SR] Verify complete
2017-12-13 18:35:38, Info                  CSI    00000160 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:38, Info                  CSI    00000161 [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:38, Info                  CSI    00000163 [SR] Verify complete
2017-12-13 18:35:39, Info                  CSI    00000164 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:39, Info                  CSI    00000165 [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:41, Info                  CSI    00000167 [SR] Verify complete
2017-12-13 18:35:41, Info                  CSI    00000168 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:41, Info                  CSI    00000169 [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:43, Info                  CSI    0000016b [SR] Verify complete
2017-12-13 18:35:43, Info                  CSI    0000016c [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:43, Info                  CSI    0000016d [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:46, Info                  CSI    0000016f [SR] Verify complete
2017-12-13 18:35:46, Info                  CSI    00000170 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:46, Info                  CSI    00000171 [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:50, Info                  CSI    00000189 [SR] Verify complete
2017-12-13 18:35:50, Info                  CSI    0000018a [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:50, Info                  CSI    0000018b [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:52, Info                  CSI    0000018d [SR] Verify complete
2017-12-13 18:35:52, Info                  CSI    0000018e [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:52, Info                  CSI    0000018f [SR] Beginning Verify and Repair transaction
2017-12-13 18:35:57, Info                  CSI    00000191 [SR] Verify complete
2017-12-13 18:35:57, Info                  CSI    00000192 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:35:57, Info                  CSI    00000193 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:01, Info                  CSI    00000196 [SR] Verify complete
2017-12-13 18:36:01, Info                  CSI    00000197 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:01, Info                  CSI    00000198 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:03, Info                  CSI    0000019a [SR] Verify complete
2017-12-13 18:36:03, Info                  CSI    0000019b [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:03, Info                  CSI    0000019c [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:05, Info                  CSI    0000019e [SR] Verify complete
2017-12-13 18:36:05, Info                  CSI    0000019f [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:05, Info                  CSI    000001a0 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:07, Info                  CSI    000001a2 [SR] Verify complete
2017-12-13 18:36:07, Info                  CSI    000001a3 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:07, Info                  CSI    000001a4 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:09, Info                  CSI    000001a6 [SR] Verify complete
2017-12-13 18:36:09, Info                  CSI    000001a7 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:09, Info                  CSI    000001a8 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:10, Info                  CSI    000001ac [SR] Verify complete
2017-12-13 18:36:11, Info                  CSI    000001ad [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:11, Info                  CSI    000001ae [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:12, Info                  CSI    000001b0 [SR] Verify complete
2017-12-13 18:36:12, Info                  CSI    000001b1 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:12, Info                  CSI    000001b2 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:17, Info                  CSI    000001b4 [SR] Verify complete
2017-12-13 18:36:17, Info                  CSI    000001b5 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:17, Info                  CSI    000001b6 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:20, Info                  CSI    000001b9 [SR] Verify complete
2017-12-13 18:36:20, Info                  CSI    000001ba [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:20, Info                  CSI    000001bb [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:21, Info                  CSI    000001be [SR] Verify complete
2017-12-13 18:36:21, Info                  CSI    000001bf [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:21, Info                  CSI    000001c0 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:23, Info                  CSI    000001c2 [SR] Verify complete
2017-12-13 18:36:23, Info                  CSI    000001c3 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:23, Info                  CSI    000001c4 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:26, Info                  CSI    000001c7 [SR] Verify complete
2017-12-13 18:36:26, Info                  CSI    000001c8 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:26, Info                  CSI    000001c9 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:28, Info                  CSI    000001cb [SR] Verify complete
2017-12-13 18:36:28, Info                  CSI    000001cc [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:28, Info                  CSI    000001cd [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:30, Info                  CSI    000001cf [SR] Verify complete
2017-12-13 18:36:30, Info                  CSI    000001d0 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:30, Info                  CSI    000001d1 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:32, Info                  CSI    000001d3 [SR] Verify complete
2017-12-13 18:36:32, Info                  CSI    000001d4 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:32, Info                  CSI    000001d5 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:33, Info                  CSI    000001d8 [SR] Verify complete
2017-12-13 18:36:34, Info                  CSI    000001d9 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:34, Info                  CSI    000001da [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:35, Info                  CSI    000001dc [SR] Verify complete
2017-12-13 18:36:35, Info                  CSI    000001dd [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:35, Info                  CSI    000001de [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:37, Info                  CSI    000001e0 [SR] Verify complete
2017-12-13 18:36:37, Info                  CSI    000001e1 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:37, Info                  CSI    000001e2 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:39, Info                  CSI    000001e5 [SR] Verify complete
2017-12-13 18:36:39, Info                  CSI    000001e6 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:39, Info                  CSI    000001e7 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:41, Info                  CSI    000001e9 [SR] Verify complete
2017-12-13 18:36:41, Info                  CSI    000001ea [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:41, Info                  CSI    000001eb [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:42, Info                  CSI    000001ef [SR] Verify complete
2017-12-13 18:36:43, Info                  CSI    000001f0 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:43, Info                  CSI    000001f1 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:45, Info                  CSI    000001f3 [SR] Verify complete
2017-12-13 18:36:45, Info                  CSI    000001f4 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:45, Info                  CSI    000001f5 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:47, Info                  CSI    000001f8 [SR] Verify complete
2017-12-13 18:36:47, Info                  CSI    000001f9 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:47, Info                  CSI    000001fa [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:49, Info                  CSI    000001fc [SR] Verify complete
2017-12-13 18:36:49, Info                  CSI    000001fd [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:49, Info                  CSI    000001fe [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:50, Info                  CSI    00000200 [SR] Verify complete
2017-12-13 18:36:50, Info                  CSI    00000201 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:50, Info                  CSI    00000202 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:51, Info                  CSI    00000204 [SR] Verify complete
2017-12-13 18:36:51, Info                  CSI    00000205 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:51, Info                  CSI    00000206 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:53, Info                  CSI    00000208 [SR] Verify complete
2017-12-13 18:36:53, Info                  CSI    00000209 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:53, Info                  CSI    0000020a [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:55, Info                  CSI    0000020c [SR] Verify complete
2017-12-13 18:36:55, Info                  CSI    0000020d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:55, Info                  CSI    0000020e [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:57, Info                  CSI    00000210 [SR] Verify complete
2017-12-13 18:36:57, Info                  CSI    00000211 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:57, Info                  CSI    00000212 [SR] Beginning Verify and Repair transaction
2017-12-13 18:36:58, Info                  CSI    00000214 [SR] Verify complete
2017-12-13 18:36:58, Info                  CSI    00000215 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:36:58, Info                  CSI    00000216 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:02, Info                  CSI    00000218 [SR] Verify complete
2017-12-13 18:37:02, Info                  CSI    00000219 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:02, Info                  CSI    0000021a [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:11, Info                  CSI    0000021c [SR] Verify complete
2017-12-13 18:37:11, Info                  CSI    0000021d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:11, Info                  CSI    0000021e [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:14, Info                  CSI    00000220 [SR] Verify complete
2017-12-13 18:37:14, Info                  CSI    00000221 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:14, Info                  CSI    00000222 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:17, Info                  CSI    00000224 [SR] Verify complete
2017-12-13 18:37:17, Info                  CSI    00000225 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:17, Info                  CSI    00000226 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:18, Info                  CSI    00000228 [SR] Verify complete
2017-12-13 18:37:19, Info                  CSI    00000229 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:19, Info                  CSI    0000022a [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:20, Info                  CSI    0000022c [SR] Verify complete
2017-12-13 18:37:20, Info                  CSI    0000022d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:20, Info                  CSI    0000022e [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:21, Info                  CSI    00000230 [SR] Verify complete
2017-12-13 18:37:21, Info                  CSI    00000231 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:21, Info                  CSI    00000232 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:23, Info                  CSI    00000234 [SR] Verify complete
2017-12-13 18:37:23, Info                  CSI    00000235 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:23, Info                  CSI    00000236 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:24, Info                  CSI    00000238 [SR] Verify complete
2017-12-13 18:37:24, Info                  CSI    00000239 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:24, Info                  CSI    0000023a [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:24, Info                  CSI    0000023c [SR] Verify complete
2017-12-13 18:37:24, Info                  CSI    0000023d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:24, Info                  CSI    0000023e [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:27, Info                  CSI    00000246 [SR] Verify complete
2017-12-13 18:37:27, Info                  CSI    00000247 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:27, Info                  CSI    00000248 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:28, Info                  CSI    0000024a [SR] Verify complete
2017-12-13 18:37:28, Info                  CSI    0000024b [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:28, Info                  CSI    0000024c [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:29, Info                  CSI    0000024e [SR] Verify complete
2017-12-13 18:37:29, Info                  CSI    0000024f [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:29, Info                  CSI    00000250 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:31, Info                  CSI    00000252 [SR] Verify complete
2017-12-13 18:37:31, Info                  CSI    00000253 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:31, Info                  CSI    00000254 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:33, Info                  CSI    00000256 [SR] Verify complete
2017-12-13 18:37:33, Info                  CSI    00000257 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:33, Info                  CSI    00000258 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:36, Info                  CSI    0000025b [SR] Verify complete
2017-12-13 18:37:36, Info                  CSI    0000025c [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:36, Info                  CSI    0000025d [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:37, Info                  CSI    0000025f [SR] Verify complete
2017-12-13 18:37:37, Info                  CSI    00000260 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:37, Info                  CSI    00000261 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:38, Info                  CSI    00000263 [SR] Verify complete
2017-12-13 18:37:38, Info                  CSI    00000264 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:38, Info                  CSI    00000265 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:39, Info                  CSI    00000267 [SR] Cannot repair member file [l:26{13}]"iesysprep.dll" of Microsoft-Windows-IE-Sysprep, Version = 11.2.9600.16428, pA = PROCESSOR_ARCHITECTURE_IA32_ON_WIN64 (10), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral in the store, hash mismatch
2017-12-13 18:37:41, Info                  CSI    0000026b [SR] Cannot repair member file [l:26{13}]"iesysprep.dll" of Microsoft-Windows-IE-Sysprep, Version = 11.2.9600.16428, pA = PROCESSOR_ARCHITECTURE_IA32_ON_WIN64 (10), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral in the store, hash mismatch
2017-12-13 18:37:41, Info                  CSI    0000026c [SR] This component was referenced by [l:230{115}]"Microsoft-Windows-InternetExplorer-VistaPlus-Update~31bf3856ad364e35~amd64~~11.2.9600.16428.Internet-Explorer-amd64"
2017-12-13 18:37:42, Info                  CSI    0000026f [SR] Verify complete
2017-12-13 18:37:42, Info                  CSI    00000270 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:42, Info                  CSI    00000271 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:45, Info                  CSI    00000274 [SR] Verify complete
2017-12-13 18:37:45, Info                  CSI    00000275 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:45, Info                  CSI    00000276 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:47, Info                  CSI    0000027a [SR] Verify complete
2017-12-13 18:37:48, Info                  CSI    0000027b [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:48, Info                  CSI    0000027c [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:50, Info                  CSI    00000286 [SR] Verify complete
2017-12-13 18:37:50, Info                  CSI    00000287 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:50, Info                  CSI    00000288 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:52, Info                  CSI    0000028f [SR] Verify complete
2017-12-13 18:37:53, Info                  CSI    00000290 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:53, Info                  CSI    00000291 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:54, Info                  CSI    00000296 [SR] Verify complete
2017-12-13 18:37:54, Info                  CSI    00000297 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:54, Info                  CSI    00000298 [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:56, Info                  CSI    0000029c [SR] Verify complete
2017-12-13 18:37:56, Info                  CSI    0000029d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:56, Info                  CSI    0000029e [SR] Beginning Verify and Repair transaction
2017-12-13 18:37:57, Info                  CSI    000002a0 [SR] Verify complete
2017-12-13 18:37:57, Info                  CSI    000002a1 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:37:57, Info                  CSI    000002a2 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:00, Info                  CSI    000002c7 [SR] Verify complete
2017-12-13 18:38:00, Info                  CSI    000002c8 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:00, Info                  CSI    000002c9 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:02, Info                  CSI    000002cb [SR] Verify complete
2017-12-13 18:38:02, Info                  CSI    000002cc [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:02, Info                  CSI    000002cd [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:03, Info                  CSI    000002cf [SR] Verify complete
2017-12-13 18:38:04, Info                  CSI    000002d0 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:04, Info                  CSI    000002d1 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:05, Info                  CSI    000002d3 [SR] Verify complete
2017-12-13 18:38:06, Info                  CSI    000002d4 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:06, Info                  CSI    000002d5 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:07, Info                  CSI    000002e2 [SR] Verify complete
2017-12-13 18:38:07, Info                  CSI    000002e3 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:07, Info                  CSI    000002e4 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:08, Info                  CSI    000002e7 [SR] Verify complete
2017-12-13 18:38:08, Info                  CSI    000002e8 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:08, Info                  CSI    000002e9 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:11, Info                  CSI    000002ed [SR] Verify complete
2017-12-13 18:38:11, Info                  CSI    000002ee [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:11, Info                  CSI    000002ef [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:14, Info                  CSI    000002fb [SR] Verify complete
2017-12-13 18:38:14, Info                  CSI    000002fc [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:14, Info                  CSI    000002fd [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:15, Info                  CSI    000002ff [SR] Verify complete
2017-12-13 18:38:15, Info                  CSI    00000300 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:15, Info                  CSI    00000301 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:17, Info                  CSI    00000304 [SR] Verify complete
2017-12-13 18:38:17, Info                  CSI    00000305 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:17, Info                  CSI    00000306 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:18, Info                  CSI    00000308 [SR] Verify complete
2017-12-13 18:38:18, Info                  CSI    00000309 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:18, Info                  CSI    0000030a [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:20, Info                  CSI    0000030c [SR] Verify complete
2017-12-13 18:38:20, Info                  CSI    0000030d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:20, Info                  CSI    0000030e [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:22, Info                  CSI    00000310 [SR] Verify complete
2017-12-13 18:38:22, Info                  CSI    00000311 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:22, Info                  CSI    00000312 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:24, Info                  CSI    00000314 [SR] Verify complete
2017-12-13 18:38:24, Info                  CSI    00000315 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:24, Info                  CSI    00000316 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:27, Info                  CSI    00000330 [SR] Verify complete
2017-12-13 18:38:27, Info                  CSI    00000331 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:27, Info                  CSI    00000332 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:29, Info                  CSI    00000334 [SR] Verify complete
2017-12-13 18:38:29, Info                  CSI    00000335 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:29, Info                  CSI    00000336 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:34, Info                  CSI    00000338 [SR] Verify complete
2017-12-13 18:38:34, Info                  CSI    00000339 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:34, Info                  CSI    0000033a [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:36, Info                  CSI    0000033c [SR] Verify complete
2017-12-13 18:38:36, Info                  CSI    0000033d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:36, Info                  CSI    0000033e [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:37, Info                  CSI    00000342 [SR] Verify complete
2017-12-13 18:38:37, Info                  CSI    00000343 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:37, Info                  CSI    00000344 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:38, Info                  CSI    00000346 [SR] Verify complete
2017-12-13 18:38:39, Info                  CSI    00000347 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:39, Info                  CSI    00000348 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:41, Info                  CSI    0000034a [SR] Verify complete
2017-12-13 18:38:41, Info                  CSI    0000034b [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:41, Info                  CSI    0000034c [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:42, Info                  CSI    0000034e [SR] Verify complete
2017-12-13 18:38:42, Info                  CSI    0000034f [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:42, Info                  CSI    00000350 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:44, Info                  CSI    00000353 [SR] Verify complete
2017-12-13 18:38:44, Info                  CSI    00000354 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:44, Info                  CSI    00000355 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:45, Info                  CSI    00000357 [SR] Verify complete
2017-12-13 18:38:45, Info                  CSI    00000358 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:45, Info                  CSI    00000359 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:47, Info                  CSI    0000035b [SR] Verify complete
2017-12-13 18:38:47, Info                  CSI    0000035c [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:47, Info                  CSI    0000035d [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:48, Info                  CSI    0000035f [SR] Verify complete
2017-12-13 18:38:48, Info                  CSI    00000360 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:48, Info                  CSI    00000361 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:51, Info                  CSI    00000364 [SR] Verify complete
2017-12-13 18:38:51, Info                  CSI    00000365 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:51, Info                  CSI    00000366 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:52, Info                  CSI    00000368 [SR] Verify complete
2017-12-13 18:38:52, Info                  CSI    00000369 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:52, Info                  CSI    0000036a [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:54, Info                  CSI    0000036c [SR] Verify complete
2017-12-13 18:38:54, Info                  CSI    0000036d [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:54, Info                  CSI    0000036e [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:56, Info                  CSI    00000370 [SR] Verify complete
2017-12-13 18:38:56, Info                  CSI    00000371 [SR] Verifying 100 (0x0000000000000064) components
2017-12-13 18:38:56, Info                  CSI    00000372 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:58, Info                  CSI    00000374 [SR] Verify complete
2017-12-13 18:38:58, Info                  CSI    00000375 [SR] Verifying 27 (0x000000000000001b) components
2017-12-13 18:38:58, Info                  CSI    00000376 [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:58, Info                  CSI    00000378 [SR] Verify complete
2017-12-13 18:38:58, Info                  CSI    00000379 [SR] Repairing 1 components
2017-12-13 18:38:58, Info                  CSI    0000037a [SR] Beginning Verify and Repair transaction
2017-12-13 18:38:58, Info                  CSI    0000037c [SR] Cannot repair member file [l:26{13}]"iesysprep.dll" of Microsoft-Windows-IE-Sysprep, Version = 11.2.9600.16428, pA = PROCESSOR_ARCHITECTURE_IA32_ON_WIN64 (10), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral in the store, hash mismatch
2017-12-13 18:38:58, Info                  CSI    0000037e [SR] Cannot repair member file [l:26{13}]"iesysprep.dll" of Microsoft-Windows-IE-Sysprep, Version = 11.2.9600.16428, pA = PROCESSOR_ARCHITECTURE_IA32_ON_WIN64 (10), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral in the store, hash mismatch
2017-12-13 18:38:58, Info                  CSI    0000037f [SR] This component was referenced by [l:230{115}]"Microsoft-Windows-InternetExplorer-VistaPlus-Update~31bf3856ad364e35~amd64~~11.2.9600.16428.Internet-Explorer-amd64"
2017-12-13 18:38:58, Info                  CSI    00000381 [SR] Repair complete
2017-12-13 18:38:58, Info                  CSI    00000382 [SR] Committing transaction
2017-12-13 18:38:58, Info                  CSI    00000386 [SR] Verify and Repair Transaction completed. All files and registry keys listed in this transaction  have been successfully repaired

 

 

 

Here is VEW application:

 

 

 

Vino's Event Viewer v01c run on Windows 2008 in English
Report run at 13/12/2017 6:42:18 PM

Note: All dates below are in the format dd/mm/yyyy

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
'Application' Log - Critical Type
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
'Application' Log - Error Type
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Log: 'Application' Date/Time: 13/12/2017 8:23:17 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
Host Start  failed

Log: 'Application' Date/Time: 13/12/2017 8:23:17 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
Runtime not yet initialized

Log: 'Application' Date/Time: 13/12/2017 4:38:59 AM
Type: Error Category: 100
Event: 1000 Source: Application Error
Faulting application name: aswmbr.exe, version: 1.0.1.2290, time stamp: 0x54b4df14 Faulting module name: ntdll.dll, version: 6.1.7601.23915, time stamp: 0x59b94a16 Exception code: 0xc0000005 Fault offset: 0x0002e49b Faulting process id: 0xc7c Faulting application start time: 0x01d373c87c235a19 Faulting application path: C:\Users\JB\Desktop\aswmbr.exe Faulting module path: C:\windows\SysWOW64\ntdll.dll Report Id: 88b3e5bf-dfbf-11e7-8a36-d85de2936b3c

Log: 'Application' Date/Time: 12/12/2017 11:24:10 PM
Type: Error Category: 100
Event: 1000 Source: Application Error
Faulting application name: aswmbr.exe, version: 1.0.1.2290, time stamp: 0x54b4df14 Faulting module name: ntdll.dll, version: 6.1.7601.23915, time stamp: 0x59b94a16 Exception code: 0xc0000005 Fault offset: 0x0002e49b Faulting process id: 0x1918 Faulting application start time: 0x01d3739d3f8a72b5 Faulting application path: C:\Users\JB\Desktop\aswmbr.exe Faulting module path: C:\windows\SysWOW64\ntdll.dll Report Id: 8e17cf8c-df93-11e7-8a36-d85de2936b3c

Log: 'Application' Date/Time: 12/12/2017 11:01:06 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
QuickBooks has experienced a problem and must be shut down, ErrorCode:2004937507.

Log: 'Application' Date/Time: 11/12/2017 9:23:15 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
Host Start  failed

Log: 'Application' Date/Time: 11/12/2017 9:23:15 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
Runtime not yet initialized

Log: 'Application' Date/Time: 11/12/2017 9:22:32 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
V28.0D R3 (M=1066, L=335, C=249, V=0 (0))

Log: 'Application' Date/Time: 11/12/2017 8:36:47 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
Host Start  failed

Log: 'Application' Date/Time: 11/12/2017 8:36:47 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
Runtime not yet initialized

Log: 'Application' Date/Time: 11/12/2017 8:27:40 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
DMError Information:-6069Additional Info:An Invalid Id or password was specified.

Log: 'Application' Date/Time: 11/12/2017 8:27:40 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
DBConnPool::HandleConnectionError errorCode:-6069, dbCode:-103 from file:'src\connpool.cpp' at line 1042 from function:'DBMgr::DBConnPool::init'

Log: 'Application' Date/Time: 11/12/2017 8:27:40 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
Connection String:CON=QBConnectionPool-Probe-QB_JB-HP_28;;DBF=C:\Users\Public\Documents\Intuit\QuickBooks\Company Files\Short Haul Concrete LLC.qbw;CommLinks="ShMem,tcpip(IP=192.168.7.81;TO=5;DOBROADCAST=NONE;port=55378)";ServerName=QB_JB-HP_28;DBN=81b183e537844ac384bc26d615598f2f

Log: 'Application' Date/Time: 11/12/2017 8:27:40 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
Connection Error:Invalid user ID or password

Log: 'Application' Date/Time: 11/12/2017 8:27:39 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
DBConnPool::HandleConnectionError errorCode:-6069, dbCode:-103 from file:'src\connpool.cpp' at line 1042 from function:'DBMgr::DBConnPool::init'

Log: 'Application' Date/Time: 11/12/2017 8:27:39 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
Connection String:CON=QBConnectionPool-Probe-QB_JB-HP_28;;DBF=C:\Users\Public\Documents\Intuit\QuickBooks\Company Files\Short Haul Concrete LLC.qbw;CommLinks="ShMem,tcpip(IP=192.168.7.81;TO=5;DOBROADCAST=NONE;port=55378)";ServerName=QB_JB-HP_28;DBN=76ea9268c9354e96b76d7e3a6a953c97

Log: 'Application' Date/Time: 11/12/2017 8:27:39 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
Connection Error:Invalid user ID or password

Log: 'Application' Date/Time: 11/12/2017 8:26:38 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
QuickBooks has experienced a problem and must be shut down, ErrorCode:2004937507.

Log: 'Application' Date/Time: 11/12/2017 8:10:48 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
DMError Information:-6069Additional Info:An Invalid Id or password was specified.

Log: 'Application' Date/Time: 11/12/2017 8:10:48 PM
Type: Error Category: 2
Event: 4 Source: QuickBooks
An unexpected error has occured in "QuickBooks Desktop Pro 2018":
DBConnPool::HandleConnectionError errorCode:-6069, dbCode:-103 from file:'src\connpool.cpp' at line 1042 from function:'DBMgr::DBConnPool::init'

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
'Application' Log - Warning Type
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Log: 'Application' Date/Time: 14/12/2017 12:08:37 AM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   24 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2008 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2008 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2008 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2008 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 2008 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 2008 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 2008 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 2008 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 2008 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 2008 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\TrustedPeople
Process 2008 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2008 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2008 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2008 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2008 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Disallowed

Log: 'Application' Date/Time: 13/12/2017 5:14:53 AM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   1 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000_Classes:
Process 6872 (\Device\HarddiskVolume3\Windows\winsxs\amd64_microsoft-windows-rundll32_31bf3856ad364e35_6.1.7601.23755_none_368a88b9dac77673\rundll32.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000_CLASSES

Log: 'Application' Date/Time: 13/12/2017 5:14:53 AM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   24 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 4468 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 4468 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1956 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1956 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1956 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1956 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 4468 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 1956 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 4468 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 1956 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 4468 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 1956 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 4468 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 1956 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 4468 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 1956 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 1956 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\TrustedPeople
Process 1956 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1956 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1956 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1956 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 4468 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 4468 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1956 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Disallowed

Log: 'Application' Date/Time: 11/12/2017 6:50:56 PM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   24 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 6448 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6448 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 6448 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 6448 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 6448 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 6448 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 6448 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\TrustedPeople
Process 6448 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6448 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Disallowed

Log: 'Application' Date/Time: 11/12/2017 12:03:18 AM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   24 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 6436 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6436 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2016 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2016 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2016 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2016 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6436 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 2016 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 2016 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 6436 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 6436 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 2016 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 6436 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 2016 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 6436 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 2016 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 2016 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\TrustedPeople
Process 2016 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2016 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2016 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2016 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6436 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6436 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2016 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Disallowed

Log: 'Application' Date/Time: 10/12/2017 11:39:04 PM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   24 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2032 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2032 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2032 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2032 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 2032 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 2032 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 2032 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 2032 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 2032 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 2032 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\TrustedPeople
Process 2032 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2032 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2032 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2032 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6596 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2032 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Disallowed

Log: 'Application' Date/Time: 10/12/2017 10:26:11 PM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   9 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 6480 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6480 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6480 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 6480 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 6480 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 6480 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 6480 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 6480 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6480 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates

Log: 'Application' Date/Time: 10/12/2017 10:23:22 PM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   11 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 6828 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6828 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1852 (\Device\HarddiskVolume3\Windows\System32\CompatTelRunner.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6828 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 6828 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 6828 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 6828 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 6828 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 1852 (\Device\HarddiskVolume3\Windows\System32\CompatTelRunner.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\Windows\CurrentVersion\Explorer
Process 6828 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6828 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates

Log: 'Application' Date/Time: 08/12/2017 4:57:26 PM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   24 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 1976 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1976 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1976 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1976 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6580 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6580 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1976 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 6580 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 1976 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 6580 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 1976 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 6580 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 1976 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 6580 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 1976 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 6580 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 1976 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\TrustedPeople
Process 6580 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6580 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1976 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1976 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1976 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1976 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1976 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Disallowed

Log: 'Application' Date/Time: 08/12/2017 1:44:29 AM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   24 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 7068 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 7068 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1996 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1996 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1996 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1996 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 7068 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 1996 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 7068 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 1996 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 7068 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 1996 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 7068 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 1996 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 7068 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 1996 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 1996 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\TrustedPeople
Process 1996 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1996 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1996 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1996 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 7068 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 7068 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1996 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Disallowed

Log: 'Application' Date/Time: 07/12/2017 9:37:40 PM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   24 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 2036 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2036 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2036 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2036 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6628 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6628 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2036 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 6628 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 2036 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 6628 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 2036 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 6628 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 2036 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 6628 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 2036 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 6628 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 2036 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\TrustedPeople
Process 6628 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6628 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2036 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2036 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2036 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2036 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2036 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Disallowed

Log: 'Application' Date/Time: 07/12/2017 2:21:01 AM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   24 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 7088 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 7088 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1948 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1948 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1948 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1948 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1948 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 7088 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 7088 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 1948 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 1948 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 7088 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 1948 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 7088 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 1948 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 7088 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 1948 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\TrustedPeople
Process 7088 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 7088 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1948 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1948 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1948 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1948 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1948 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Disallowed

Log: 'Application' Date/Time: 05/12/2017 9:32:29 PM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   24 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 6540 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6540 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 6540 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 6540 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 6540 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 6540 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 6540 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\TrustedPeople
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6540 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6540 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Disallowed

Log: 'Application' Date/Time: 01/12/2017 9:36:35 PM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   24 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 2012 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2012 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2012 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2012 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 7116 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 7116 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 7116 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 2012 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 7116 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 2012 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 7116 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 2012 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 7116 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 2012 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 7116 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 2012 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 2012 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\TrustedPeople
Process 2012 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2012 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2012 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2012 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 7116 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 7116 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2012 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Disallowed

Log: 'Application' Date/Time: 01/12/2017 4:12:19 AM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   24 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 2028 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2028 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2028 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2028 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6696 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6696 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2028 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 6696 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 2028 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 6696 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 2028 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 6696 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 2028 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 6696 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 2028 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 6696 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 2028 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\TrustedPeople
Process 6696 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6696 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2028 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2028 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2028 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2028 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2028 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Disallowed

Log: 'Application' Date/Time: 30/11/2017 5:40:22 AM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   15 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\TrustedPeople
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Disallowed

Log: 'Application' Date/Time: 28/11/2017 11:27:53 PM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   15 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1001:
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1001
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1001
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1001
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1001
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1001\Software\Microsoft\SystemCertificates\TrustedPeople
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1001\Software\Microsoft\SystemCertificates\trust
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1001\Software\Microsoft\SystemCertificates\Disallowed
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1001\Software\Microsoft\SystemCertificates\My
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1001\Software\Microsoft\SystemCertificates\CA
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1001\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1001\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1001\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1001\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1001\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1001\Software\Microsoft\SystemCertificates\Root

Log: 'Application' Date/Time: 28/11/2017 11:10:04 PM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   1 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000_Classes:
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000_CLASSES

Log: 'Application' Date/Time: 28/11/2017 11:10:04 PM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   24 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 6600 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6600 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 6600 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 6600 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 6600 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 6600 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 6600 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\TrustedPeople
Process 6600 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6600 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 1984 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Disallowed

Log: 'Application' Date/Time: 28/11/2017 2:06:38 AM
Type: Warning Category: 0
Event: 1530 Source: Microsoft-Windows-User Profiles Service
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.     DETAIL -   24 user registry handles leaked from \Registry\User\S-1-5-21-2577112198-3913129868-2286876578-1000:
Process 6416 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 6416 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 6416 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\trust
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 6416 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\My
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 6416 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\CA
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 6416 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 6416 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Root
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\TrustedPeople
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6416 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 6416 (\Device\HarddiskVolume3\Windows\SysWOW64\wbem\WmiPrvSE.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Policies\Microsoft\SystemCertificates
Process 2000 (\Device\HarddiskVolume3\Program Files (x86)\Kaspersky Lab\Kaspersky Small Office Security 17.0.0\avp.exe) has opened key \REGISTRY\USER\S-1-5-21-2577112198-3913129868-2286876578-1000\Software\Microsoft\SystemCertificates\Disallowed

 

And VEW system:

 

 

Vino's Event Viewer v01c run on Windows 2008 in English
Report run at 13/12/2017 6:43:03 PM

Note: All dates below are in the format dd/mm/yyyy

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
'System' Log - Critical Type
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Log: 'System' Date/Time: 13/12/2017 8:05:31 PM
Type: Critical Category: 63
Event: 41 Source: Microsoft-Windows-Kernel-Power
The system has rebooted without cleanly shutting down first. This error could be caused if the system stopped responding, crashed, or lost power unexpectedly.

Log: 'System' Date/Time: 13/12/2017 8:01:53 PM
Type: Critical Category: 63
Event: 41 Source: Microsoft-Windows-Kernel-Power
The system has rebooted without cleanly shutting down first. This error could be caused if the system stopped responding, crashed, or lost power unexpectedly.

Log: 'System' Date/Time: 10/12/2017 10:14:13 PM
Type: Critical Category: 63
Event: 41 Source: Microsoft-Windows-Kernel-Power
The system has rebooted without cleanly shutting down first. This error could be caused if the system stopped responding, crashed, or lost power unexpectedly.

Log: 'System' Date/Time: 10/12/2017 10:10:02 PM
Type: Critical Category: 63
Event: 41 Source: Microsoft-Windows-Kernel-Power
The system has rebooted without cleanly shutting down first. This error could be caused if the system stopped responding, crashed, or lost power unexpectedly.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
'System' Log - Error Type
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Log: 'System' Date/Time: 13/12/2017 8:05:33 PM
Type: Error Category: 0
Event: 6008 Source: EventLog
The previous system shutdown at 2:04:53 PM on ?12/?13/?2017 was unexpected.

Log: 'System' Date/Time: 13/12/2017 8:04:26 PM
Type: Error Category: 0
Event: 10010 Source: Microsoft-Windows-DistributedCOM
The server {F9717507-6651-4EDB-BFF7-AE615179BCCF} did not register with DCOM within the required timeout.

Log: 'System' Date/Time: 13/12/2017 8:02:37 PM
Type: Error Category: 0
Event: 7011 Source: Service Control Manager
A timeout (30000 milliseconds) was reached while waiting for a transaction response from the MBAMService service.

Log: 'System' Date/Time: 13/12/2017 8:01:55 PM
Type: Error Category: 0
Event: 6008 Source: EventLog
The previous system shutdown at 2:01:02 PM on ?12/?13/?2017 was unexpected.

Log: 'System' Date/Time: 13/12/2017 5:15:23 AM
Type: Error Category: 0
Event: 10010 Source: Microsoft-Windows-DistributedCOM
The server {995C996E-D918-4A8C-A302-45719A6F4EA7} did not register with DCOM within the required timeout.

Log: 'System' Date/Time: 10/12/2017 10:39:34 PM
Type: Error Category: 0
Event: 5 Source: BTHUSB
The Bluetooth driver expected an HCI event with a certain size but did not receive it.

Log: 'System' Date/Time: 10/12/2017 10:33:10 PM
Type: Error Category: 0
Event: 5 Source: BTHUSB
The Bluetooth driver expected an HCI event with a certain size but did not receive it.

Log: 'System' Date/Time: 10/12/2017 10:31:18 PM
Type: Error Category: 0
Event: 5 Source: BTHUSB
The Bluetooth driver expected an HCI event with a certain size but did not receive it.

Log: 'System' Date/Time: 10/12/2017 10:14:15 PM
Type: Error Category: 0
Event: 6008 Source: EventLog
The previous system shutdown at 4:13:02 PM on ?12/?10/?2017 was unexpected.

Log: 'System' Date/Time: 10/12/2017 10:10:45 PM
Type: Error Category: 0
Event: 7011 Source: Service Control Manager
A timeout (30000 milliseconds) was reached while waiting for a transaction response from the MBAMService service.

Log: 'System' Date/Time: 10/12/2017 10:10:04 PM
Type: Error Category: 0
Event: 6008 Source: EventLog
The previous system shutdown at 4:08:48 PM on ?12/?10/?2017 was unexpected.

Log: 'System' Date/Time: 10/12/2017 10:08:21 PM
Type: Error Category: 0
Event: 7011 Source: Service Control Manager
A timeout (30000 milliseconds) was reached while waiting for a transaction response from the AVP17.0.0 service.

Log: 'System' Date/Time: 10/12/2017 10:08:11 PM
Type: Error Category: 0
Event: 7011 Source: Service Control Manager
A timeout (30000 milliseconds) was reached while waiting for a transaction response from the Spooler service.

Log: 'System' Date/Time: 01/12/2017 3:48:06 AM
Type: Error Category: 0
Event: 10016 Source: Microsoft-Windows-DistributedCOM
The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID  {D3DCB472-7261-43CE-924B-0704BD730D5F}  and APPID  {D3DCB472-7261-43CE-924B-0704BD730D5F}  to the user JB-HP\JB SID (S-1-5-21-2577112198-3913129868-2286876578-1000) from address LocalHost (Using LRPC). This security permission can be modified using the Component Services administrative tool.

Log: 'System' Date/Time: 01/12/2017 3:48:06 AM
Type: Error Category: 0
Event: 10016 Source: Microsoft-Windows-DistributedCOM
The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID  {145B4335-FE2A-4927-A040-7C35AD3180EF}  and APPID  {145B4335-FE2A-4927-A040-7C35AD3180EF}  to the user JB-HP\JB SID (S-1-5-21-2577112198-3913129868-2286876578-1000) from address LocalHost (Using LRPC). This security permission can be modified using the Component Services administrative tool.

Log: 'System' Date/Time: 30/11/2017 5:16:06 AM
Type: Error Category: 0
Event: 10016 Source: Microsoft-Windows-DistributedCOM
The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID  {D3DCB472-7261-43CE-924B-0704BD730D5F}  and APPID  {D3DCB472-7261-43CE-924B-0704BD730D5F}  to the user JB-HP\JB SID (S-1-5-21-2577112198-3913129868-2286876578-1000) from address LocalHost (Using LRPC). This security permission can be modified using the Component Services administrative tool.

Log: 'System' Date/Time: 30/11/2017 5:16:06 AM
Type: Error Category: 0
Event: 10016 Source: Microsoft-Windows-DistributedCOM
The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID  {145B4335-FE2A-4927-A040-7C35AD3180EF}  and APPID  {145B4335-FE2A-4927-A040-7C35AD3180EF}  to the user JB-HP\JB SID (S-1-5-21-2577112198-3913129868-2286876578-1000) from address LocalHost (Using LRPC). This security permission can be modified using the Component Services administrative tool.

Log: 'System' Date/Time: 28/11/2017 8:53:31 PM
Type: Error Category: 0
Event: 10016 Source: Microsoft-Windows-DistributedCOM
The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID  {D3DCB472-7261-43CE-924B-0704BD730D5F}  and APPID  {D3DCB472-7261-43CE-924B-0704BD730D5F}  to the user JB-HP\JB SID (S-1-5-21-2577112198-3913129868-2286876578-1000) from address LocalHost (Using LRPC). This security permission can be modified using the Component Services administrative tool.

Log: 'System' Date/Time: 28/11/2017 8:53:31 PM
Type: Error Category: 0
Event: 10016 Source: Microsoft-Windows-DistributedCOM
The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID  {145B4335-FE2A-4927-A040-7C35AD3180EF}  and APPID  {145B4335-FE2A-4927-A040-7C35AD3180EF}  to the user JB-HP\JB SID (S-1-5-21-2577112198-3913129868-2286876578-1000) from address LocalHost (Using LRPC). This security permission can be modified using the Component Services administrative tool.

Log: 'System' Date/Time: 28/11/2017 1:25:18 AM
Type: Error Category: 0
Event: 10016 Source: Microsoft-Windows-DistributedCOM
The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID  {D3DCB472-7261-43CE-924B-0704BD730D5F}  and APPID  {D3DCB472-7261-43CE-924B-0704BD730D5F}  to the user JB-HP\JB SID (S-1-5-21-2577112198-3913129868-2286876578-1000) from address LocalHost (Using LRPC). This security permission can be modified using the Component Services administrative tool.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
'System' Log - Warning Type
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Log: 'System' Date/Time: 14/12/2017 12:08:38 AM
Type: Warning Category: 0
Event: 4001 Source: Microsoft-Windows-WLAN-AutoConfig
WLAN AutoConfig service has successfully stopped.

Log: 'System' Date/Time: 13/12/2017 5:17:00 AM
Type: Warning Category: 0
Event: 4001 Source: Microsoft-Windows-WLAN-AutoConfig
WLAN AutoConfig service has successfully stopped.

Log: 'System' Date/Time: 11/12/2017 6:50:58 PM
Type: Warning Category: 0
Event: 4001 Source: Microsoft-Windows-WLAN-AutoConfig
WLAN AutoConfig service has successfully stopped.

Log: 'System' Date/Time: 11/12/2017 12:03:19 AM
Type: Warning Category: 0
Event: 4001 Source: Microsoft-Windows-WLAN-AutoConfig
WLAN AutoConfig service has successfully stopped.

Log: 'System' Date/Time: 10/12/2017 11:42:21 PM
Type: Warning Category: 0
Event: 1014 Source: Microsoft-Windows-DNS-Client
Name resolution for the name isatap.attlocal.net timed out after none of the configured DNS servers responded.

Log: 'System' Date/Time: 10/12/2017 11:42:14 PM
Type: Warning Category: 0
Event: 1014 Source: Microsoft-Windows-DNS-Client
Name resolution for the name www.msftncsi.com timed out after none of the configured DNS servers responded.

Log: 'System' Date/Time: 10/12/2017 11:42:07 PM
Type: Warning Category: 0
Event: 1014 Source: Microsoft-Windows-DNS-Client
Name resolution for the name dns.msftncsi.com timed out after none of the configured DNS servers responded.

Log: 'System' Date/Time: 10/12/2017 11:41:55 PM
Type: Warning Category: 0
Event: 1014 Source: Microsoft-Windows-DNS-Client
Name resolution for the name patt81xmpp.att.motive.com timed out after none of the configured DNS servers responded.

Log: 'System' Date/Time: 10/12/2017 11:40:31 PM
Type: Warning Category: 0
Event: 1014 Source: Microsoft-Windows-DNS-Client
Name resolution for the name btms.samsungsemi.com timed out after none of the configured DNS servers responded.

Log: 'System' Date/Time: 10/12/2017 11:39:48 PM
Type: Warning Category: 0
Event: 1014 Source: Microsoft-Windows-DNS-Client
Name resolution for the name isatap.attlocal.net timed out after none of the configured DNS servers responded.

Log: 'System' Date/Time: 10/12/2017 11:39:06 PM
Type: Warning Category: 0
Event: 4001 Source: Microsoft-Windows-WLAN-AutoConfig
WLAN AutoConfig service has successfully stopped.

Log: 'System' Date/Time: 10/12/2017 10:58:35 PM
Type: Warning Category: 0
Event: 1014 Source: Microsoft-Windows-DNS-Client
Name resolution for the name www.msftncsi.com timed out after none of the configured DNS servers responded.

Log: 'System' Date/Time: 10/12/2017 10:58:28 PM
Type: Warning Category: 0
Event: 1014 Source: Microsoft-Windows-DNS-Client
Name resolution for the name teredo.ipv6.microsoft.com timed out after none of the configured DNS servers responded.

Log: 'System' Date/Time: 10/12/2017 10:58:20 PM
Type: Warning Category: 0
Event: 1014 Source: Microsoft-Windows-DNS-Client
Name resolution for the name wpad.attlocal.net timed out after none of the configured DNS servers responded.

Log: 'System' Date/Time: 10/12/2017 10:52:26 PM
Type: Warning Category: 0
Event: 1014 Source: Microsoft-Windows-DNS-Client
Name resolution for the name dns.msftncsi.com timed out after none of the configured DNS servers responded.

Log: 'System' Date/Time: 10/12/2017 10:40:08 PM
Type: Warning Category: 0
Event: 1014 Source: Microsoft-Windows-DNS-Client
Name resolution for the name teredo.ipv6.microsoft.com timed out after none of the configured DNS servers responded.

Log: 'System' Date/Time: 10/12/2017 10:40:06 PM
Type: Warning Category: 0
Event: 1014 Source: Microsoft-Windows-DNS-Client
Name resolution for the name dnl-03.geo.kaspersky.com timed out after none of the configured DNS servers responded.

Log: 'System' Date/Time: 10/12/2017 10:40:05 PM
Type: Warning Category: 0
Event: 1014 Source: Microsoft-Windows-DNS-Client
Name resolution for the name wpad.attlocal.net timed out after none of the configured DNS servers responded.

Log: 'System' Date/Time: 10/12/2017 10:40:00 PM
Type: Warning Category: 0
Event: 1014 Source: Microsoft-Windows-DNS-Client
Name resolution for the name isatap.attlocal.net timed out after none of the configured DNS servers responded.

Log: 'System' Date/Time: 10/12/2017 10:39:56 PM
Type: Warning Category: 0
Event: 1014 Source: Microsoft-Windows-DNS-Client
Name resolution for the name wpad.attlocal.net timed out after none of the configured DNS servers responded.

 

Rogue Killer coming up...


  • 0

#64
RKinner

RKinner

    Malware Expert

  • Expert
  • 24,748 posts
  • MVP

The file that sfc is complaining about isn't important in normal operation.  It's used when you run Sysprep:

 

https://blogs.techne...w-step-by-step/

 

When you ran sfcfix last time it claimed to fix it but we didn't go back and rerun sfc /scannow to see if it did.

 

For the WPAD stuff:

 

Try opening Control panel. Internet Options, Connection , LAN Settings then note which boxes are checked then uncheck everything and OK.

 

Our Internet is acting up again.  May fail any minute.


  • 0

#65
shorthaul99

shorthaul99

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 133 posts

We have run Rogue Killer in the past on post #25 but this time it found a couple more items? 

 

 

 

RogueKiller V12.11.28.0 (x64) [Dec 11 2017] (Free) by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : https://forum.adlice.com
Website : http://www.adlice.co...ad/roguekiller/
Blog : http://www.adlice.com

Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : JB [Administrator]
Started from : C:\Users\JB\Desktop\RogueKiller_portable64.exe
Mode : Scan -- Date : 12/13/2017 18:46:34 (Duration : 00:46:22)

¤¤¤ Processes : 1 ¤¤¤
[Root.Wajam|Adw.Elex] svchost.exe(2704) -- C:\Windows\System32\svchost.exe[7] -> Found

¤¤¤ Registry : 50 ¤¤¤
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{5A134DD5-9609-460B-876D-D6D240D948BF} | DhcpNameServer : 172.20.10.1 ([])  -> Found
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{5A134DD5-9609-460B-876D-D6D240D948BF} | DhcpNameServer : 172.20.10.1 ([])  -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {07B06AB4-522B-4C4F-B99D-9DE5873EDB03} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS16D5\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {78A2AA77-A970-43C6-98D7-C6C6D5659933} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS16D5\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {9077B2AE-2F18-4FB7-B757-AE122B015C53} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS18B2\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {88571F9F-D999-4DEA-B108-F9DF772450A7} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS18B2\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {7A27F99D-B365-4AF9-A185-58ED93305AC1} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS2790\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {9E94AFF2-4632-42D9-8000-DCCE635A8EE7} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS2790\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {BC856DA0-34DF-48E9-9334-EDF9B9ED8258} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS27D8\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {A1038E70-2382-419D-9D8D-87CF1A1806A0} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS27D8\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {44A3F013-F920-4448-86CE-41B358FC2138} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS27A4\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {BADF1A0F-BBDF-4F91-895F-184DC93E6A3A} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS27A4\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {92652BF0-8A8A-49C6-A477-E349AD1C697F} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS2977\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {541920F7-9E3C-4240-93A5-2E9EB4EB3DDF} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS2977\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {88D60679-EACF-4B70-882A-330A9B3BB57A} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS3DD2\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {633FA523-67CC-4FA3-B869-D090138C3265} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS3DD2\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {405C44A0-E411-46C2-AAFC-CC1F60B57B9B} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS3DFC\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {832B3613-2108-46B5-921B-1036F32016C6} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS3DFC\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {9DB2E288-D457-4FB1-B9B0-1354E8C6D2BA} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS2E35\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {D357794E-00DA-4B04-BE5F-AF1981ECB3B7} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS2E35\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {140573B5-1C0F-4732-972C-31FD0614CB10} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Users\JB\AppData\Local\Temp\7zS5EC7\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {96CC9EEC-1223-4FFE-B43F-7A0D4D402D58} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Users\JB\AppData\Local\Temp\7zS5EC7\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {CBEB0721-EE38-4D82-B7FB-4473BC65E689} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Users\JB\AppData\Local\Temp\7zS5EF4\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {1A69642B-024F-4E0A-963F-415262C257C4} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Users\JB\AppData\Local\Temp\7zS5EF4\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {A046F598-86DB-47E1-B726-E59DF19750A9} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Users\JB\AppData\Local\Temp\7zS6112\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {28C34809-E0DD-4A71-88F7-543778E3D5FF} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Users\JB\AppData\Local\Temp\7zS6112\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {07B06AB4-522B-4C4F-B99D-9DE5873EDB03} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS16D5\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {78A2AA77-A970-43C6-98D7-C6C6D5659933} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS16D5\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {9077B2AE-2F18-4FB7-B757-AE122B015C53} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS18B2\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {88571F9F-D999-4DEA-B108-F9DF772450A7} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS18B2\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {7A27F99D-B365-4AF9-A185-58ED93305AC1} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS2790\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {9E94AFF2-4632-42D9-8000-DCCE635A8EE7} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS2790\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {BC856DA0-34DF-48E9-9334-EDF9B9ED8258} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS27D8\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {A1038E70-2382-419D-9D8D-87CF1A1806A0} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS27D8\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {44A3F013-F920-4448-86CE-41B358FC2138} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS27A4\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {BADF1A0F-BBDF-4F91-895F-184DC93E6A3A} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS27A4\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {92652BF0-8A8A-49C6-A477-E349AD1C697F} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS2977\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {541920F7-9E3C-4240-93A5-2E9EB4EB3DDF} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS2977\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {88D60679-EACF-4B70-882A-330A9B3BB57A} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS3DD2\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {633FA523-67CC-4FA3-B869-D090138C3265} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS3DD2\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {405C44A0-E411-46C2-AAFC-CC1F60B57B9B} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS3DFC\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {832B3613-2108-46B5-921B-1036F32016C6} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS3DFC\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {9DB2E288-D457-4FB1-B9B0-1354E8C6D2BA} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS2E35\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {D357794E-00DA-4B04-BE5F-AF1981ECB3B7} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Users\JB\AppData\Local\Temp\7zS2E35\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {140573B5-1C0F-4732-972C-31FD0614CB10} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Users\JB\AppData\Local\Temp\7zS5EC7\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {96CC9EEC-1223-4FFE-B43F-7A0D4D402D58} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Users\JB\AppData\Local\Temp\7zS5EC7\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {CBEB0721-EE38-4D82-B7FB-4473BC65E689} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Users\JB\AppData\Local\Temp\7zS5EF4\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {1A69642B-024F-4E0A-963F-415262C257C4} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Users\JB\AppData\Local\Temp\7zS5EF4\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {A046F598-86DB-47E1-B726-E59DF19750A9} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Users\JB\AppData\Local\Temp\7zS6112\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {28C34809-E0DD-4A71-88F7-543778E3D5FF} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Users\JB\AppData\Local\Temp\7zS6112\HPDiagnosticCoreUI.exe|Name=HPSAPS| [x] -> Found

¤¤¤ Tasks : 0 ¤¤¤

¤¤¤ Files : 0 ¤¤¤

¤¤¤ WMI : 0 ¤¤¤

¤¤¤ Hosts File : 0 ¤¤¤

¤¤¤ Antirootkit : 0 (Driver: Loaded) ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ MBR Check : ¤¤¤
+++++ PhysicalDrive0: Samsung SSD 850 PRO 512G SCSI Disk Device +++++
--- User ---
[MBR] a0df6803bfd5f93786ffb521cdd4a3c7
[BSP] ef5444ce539a871217aac157ae0020e8 : Empty MBR Code
Partition table:
0 - [MAN-MOUNT] EFI system partition | Offset (sectors): 2048 | Size: 100 MB
1 - [MAN-MOUNT] Microsoft reserved partition | Offset (sectors): 206848 | Size: 128 MB
2 - Basic data partition | Offset (sectors): 468992 | Size: 488153 MB
User = LL1 ... OK
User = LL2 ... OK

 

 

The LAN settings was checked to automatically detect settings so I unchecked it and saved and closed. 

 

In regards to SFC, I have never had any files that were able to be repaired to my recent memory or knowledge.


  • 0

#66
RKinner

RKinner

    Malware Expert

  • Expert
  • 24,748 posts
  • MVP

This one looks interesting:

 

[Root.Wajam|Adw.Elex] svchost.exe(2704) -- C:\Windows\System32\svchost.exe[7] -> Found

 

Open Process Explorer and see if you can find the svchost.exe with Process ID 2704.  Hover over it and it should say what services it is running.

 

If it's just the one service then let RK remove it.  Then do step 24 on:

 

https://www.bleeping...ads-wnetenhance

 

If it's more then one service then tell me what is running or  you can:

Copy the next 2 lines:

TASKLIST /SVC  > \junk.txt
notepad \junk.txt

Open an Elevated Command Prompt:
Start, All Programs, Accessories then right click on Command Prompt and Run as Administrator

Right click and Paste (or Edit then Paste) and the copied lines should appear.
Hit Enter if notepad does not open.  Copy and paste the text from notepad into a reply.
 

The rest are OK.

 

When I did a search for sfcfix on this topic it came up with a log from sfcfix so I thought we had run it and it appeared to be happy from the log.  Try running sfc /scannow then immediately after it finishes run sfcfix.  (Right click and Run As Admin.)  If you no longer have the file it is at:

 

http://www.majorgeek...ils/sfcfix.html


  • 0

#67
shorthaul99

shorthaul99

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 133 posts

I have searched on Google and it seems like there are several ways to get to process explorer but I can't find it on my computer? I don't think I have ever needed to run that program before.


  • 0

#68
RKinner

RKinner

    Malware Expert

  • Expert
  • 24,748 posts
  • MVP

Soory.  Thought we had:

 

Get Process Explorer

http://live.sysinter...com/procexp.exe
Save it to your desktop then run it (Vista or Win7+ - right click and Run As Administrator).  

View, Select Column, check Verified Signer, OK
Options, Verify Image Signatures


Click twice on the CPU column header  to sort things by CPU usage with the big hitters at the top.  

Wait a full minute then:

File, Save As, Save.  Note the file name.   Open the file  on your desktop and copy and paste the text to a reply.
 


  • 0

#69
shorthaul99

shorthaul99

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 133 posts

Process CPU Private Bytes Working Set PID Description Company Name Verified Signer
System Idle Process 90.74 0 K 24 K 0   
procexp64.exe 3.52 40,284 K 61,760 K 7756 Sysinternals Process Explorer Sysinternals - www.sysinternals.com (Verified) Microsoft Corporation
avp.exe 2.35 305,476 K 192,932 K 1976 Kaspersky Anti-Virus AO Kaspersky Lab (Verified) Kaspersky Lab
dwm.exe 0.64 34,536 K 26,704 K 4348 Desktop Window Manager Microsoft Corporation (Verified) Microsoft Windows
QBW32.EXE 0.61 298,240 K 84,448 K 6776 QuickBooks Intuit Inc. (Verified) Intuit
Interrupts 0.49 0 K 0 K n/a Hardware Interrupts and DPCs  
iexplore.exe 0.31 138,604 K 160,588 K 8688 Internet Explorer Microsoft Corporation (Verified) Microsoft Corporation
System 0.27 280 K 1,940 K 4   
csrss.exe 0.27 3,664 K 39,684 K 744 Client Server Runtime Process Microsoft Corporation (Verified) Microsoft Windows
MB3Service.exe 0.17 21,500 K 20,904 K 2792 Malwarebytes Service Malwarebytes (Verified) Malwarebytes Corporation
explorer.exe 0.12 54,780 K 46,668 K 2200 Windows Explorer Microsoft Corporation (Verified) Microsoft Windows
node.exe 0.09 55,252 K 33,616 K 1988 Evented I/O for V8 JavaScript Joyent, Inc (No signature was present in the subject) Joyent, Inc
QBDBMgrN.exe 0.06 553,708 K 90,932 K 4384 Intuit Network Database Manager Intuit, Inc. (No signature was present in the subject) Intuit, Inc.
MAHostService.exe 0.05 1,764 K 708 K 1924 MAHostService Alcatel-Lucent (No signature was present in the subject) Alcatel-Lucent
avpui.exe 0.04 84,440 K 5,344 K 2572 Kaspersky Anti-Virus AO Kaspersky Lab (Verified) Kaspersky Lab
Keystatus.exe 0.04 1,648 K 2,328 K 5960 Caps Lock | Num Lock | Scroll Lock  State  (No signature was present in the subject)
taskhost.exe 0.04 26,284 K 14,344 K 3896 Host Process for Windows Tasks Microsoft Corporation (Verified) Microsoft Windows
lsass.exe 0.02 25,568 K 10,384 K 796   
LogMeInSystray.exe 0.02 4,624 K 3,548 K 4576 LogMeIn Control Panel LogMeIn, Inc. (Verified) LogMeIn
iexplore.exe 0.02 18,928 K 45,088 K 5308 Internet Explorer Microsoft Corporation (Verified) Microsoft Corporation
pcTrayApp.exe 0.02 4,740 K 5,580 K 4672 mcci+McciTrayApp Alcatel-Lucent (No signature was present in the subject) Alcatel-Lucent
OUTLOOK.EXE 0.01 120,420 K 98,096 K 5568 Microsoft Outlook Microsoft Corporation (Verified) Microsoft Corporation
CLMLSvc_P2G8.exe 0.01 3,288 K 2,180 K 7096 CyberLink MediaLibrary Service CyberLink (Verified) CyberLink Corp.
HPNetworkCommunicatorCom.exe < 0.01 4,712 K 6,484 K 5544 HPNetworkCommunicatorCom Hewlett-Packard Development Company, LP (Verified) Hewlett Packard
iPodService.exe < 0.01 2,464 K 2,504 K 5396 iPod Service Apple Inc. (Verified) Apple Inc.
HPKEYBOARDx.EXE < 0.01 7,124 K 2,772 K 5240 HP Keyboard Kit OSD Hewlett-Packard (No signature was present in the subject) Hewlett-Packard
svchost.exe < 0.01 12,556 K 15,596 K 872 Host Process for Windows Services Microsoft Corporation (Verified) Microsoft Windows
mbae.exe < 0.01 20,028 K 17,724 K 5436 Malwarebytes Anti-Exploit Malwarebytes Corporation (Verified) Malwarebytes Corporation
ScanToPCActivationApp.exe < 0.01 6,068 K 7,452 K 4300 ScanToPCActivationApp Hewlett-Packard Development Company, LP (Verified) Hewlett Packard
BTStackServer.exe < 0.01 26,432 K 13,072 K 5640 Bluetooth Stack COM Server Broadcom Corporation. (Verified) Broadcom Corporation
mbae-svc.exe < 0.01 6,980 K 4,828 K 2148 Malwarebytes Anti-Exploit Service Malwarebytes Corporation (Verified) Malwarebytes Corporation
RogueKiller_portable64.exe < 0.01 577,564 K 62,944 K 4792 Anti-malware remediation tool Adlice Software (Verified) Adlice
SearchIndexer.exe < 0.01 50,852 K 18,040 K 1336 Microsoft Windows Search Indexer Microsoft Corporation (Verified) Microsoft Windows
iusb3mon.exe < 0.01 2,388 K 1,668 K 5796 iusb3mon Intel Corporation (Verified) Intel Corporation - Client Components Group
mbarw.exe < 0.01 22,280 K 7,760 K 3132 Malwarebytes Malwarebytes (Verified) Malwarebytes Corporation
services.exe < 0.01 7,164 K 6,260 K 788 Services and Controller app Microsoft Corporation (Verified) Microsoft Windows
BTTray.exe < 0.01 7,380 K 5,840 K 748 Bluetooth Tray Application Broadcom Corporation. (Verified) Broadcom Corporation
AppleMobileDeviceService.exe < 0.01 4,208 K 3,152 K 1892 MobileDeviceService Apple Inc. (Verified) Apple Inc.
rundll32.exe < 0.01 1,692 K 1,096 K 6040 Windows host process (Rundll32) Microsoft Corporation (Verified) Microsoft Windows
svchost.exe < 0.01 15,424 K 9,708 K 1520 Host Process for Windows Services Microsoft Corporation (Verified) Microsoft Windows
pcContextHookShim.exe < 0.01 1,696 K 1,032 K 4172 mcci+McciContextHookShim Alcatel-Lucent (No signature was present in the subject) Alcatel-Lucent
RtkNGUI64.exe < 0.01 14,364 K 7,384 K 4852 Realtek HD Audio Manager Realtek Semiconductor (Verified) Realtek Semiconductor Corp
mbamgui.exe < 0.01 4,244 K 2,184 K 4180 Malwarebytes Anti-Malware (Corporate) Malwarebytes Corporation (Verified) Malwarebytes Corporation
FlashUtil64_28_0_0_126_ActiveX.exe < 0.01 4,560 K 10,796 K 8632 Adobe® Flash® Player Installer/Uninstaller 28.0 r0 Adobe Systems Incorporated (Verified) Adobe Systems Incorporated
OfficeClickToRun.exe < 0.01 30,888 K 16,920 K 1048 Microsoft Office Click-to-Run (SxS) Microsoft Corporation (Verified) Microsoft Corporation
taskeng.exe < 0.01 2,824 K 3,016 K 6184 Task Scheduler Engine Microsoft Corporation (Verified) Microsoft Windows
qbupdate.exe < 0.01 16,476 K 7,560 K 3880 QuickBooks Automatic Update Intuit Inc. (Verified) Intuit
svchost.exe < 0.01 36,380 K 30,472 K 1040 Host Process for Windows Services Microsoft Corporation (Verified) Microsoft Windows
svchost.exe < 0.01 33,924 K 26,780 K 1712 Host Process for Windows Services Microsoft Corporation (Verified) Microsoft Windows
iTunesHelper.exe < 0.01 5,416 K 3,472 K 4712 iTunesHelper Apple Inc. (Verified) Apple Inc.
axlbridge.exe < 0.01 1,964 K 1,724 K 7332 AXLBridge Module Intuit Inc. (Verified) Intuit
conhost.exe < 0.01 1,184 K 352 K 2328 Console Window Host Microsoft Corporation (Verified) Microsoft Windows
csrss.exe < 0.01 2,812 K 2,500 K 624 Client Server Runtime Process Microsoft Corporation (Verified) Microsoft Windows
svchost.exe < 0.01 182,536 K 33,304 K 2704 Host Process for Windows Services Microsoft Corporation (Verified) Microsoft Windows
LMIGuardianSvc.exe < 0.01 2,860 K 1,752 K 2100 LMIGuardianSvc LogMeIn, Inc. (Verified) LogMeIn
spoolsv.exe < 0.01 12,416 K 11,864 K 1664 Spooler SubSystem App Microsoft Corporation (Verified) Microsoft Windows
mbae64.exe < 0.01 1,892 K 1,568 K 2304 Malwarebytes Anti-Exploit 64bit tasks Malwarebytes Corporation (Verified) Malwarebytes Corporation
mbamservice.exe < 0.01 157,368 K 41,108 K 2296 Malwarebytes Anti-Malware (Corporate) Malwarebytes Corporation (Verified) Malwarebytes Corporation
igfxEM.exe < 0.01 4,204 K 4,292 K 4840 igfxEM Module Intel Corporation (Verified) Intel Corporation - pGFX
wmpnetwk.exe  5,640 K 7,584 K 6060 Windows Media Player Network Sharing Service Microsoft Corporation (Verified) Microsoft Windows
WmiPrvSE.exe  3,088 K 7,024 K 9128 WMI Provider Host Microsoft Corporation (Verified) Microsoft Windows
WmiPrvSE.exe  12,596 K 6,988 K 6432 WMI Provider Host Microsoft Corporation (Verified) Microsoft Windows
WmiPrvSE.exe  13,764 K 3,836 K 6912 WMI Provider Host Microsoft Corporation (Verified) Microsoft Windows
winlogon.exe  3,380 K 2,012 K 876 Windows Logon Application Microsoft Corporation (Verified) Microsoft Windows
wininit.exe  1,772 K 416 K 720 Windows Start-Up Application Microsoft Corporation (Verified) Microsoft Windows
taskeng.exe  2,400 K 2,012 K 6212 Task Scheduler Engine Microsoft Corporation (Verified) Microsoft Windows
svchost.exe  3,676 K 5,248 K 3796 Host Process for Windows Services Microsoft Corporation (Verified) Microsoft Windows
svchost.exe  6,412 K 5,356 K 952 Host Process for Windows Services Microsoft Corporation (Verified) Microsoft Windows
svchost.exe  9,728 K 8,644 K 576 Host Process for Windows Services Microsoft Corporation (Verified) Microsoft Windows
svchost.exe  7,528 K 6,748 K 160 Host Process for Windows Services Microsoft Corporation (Verified) Microsoft Windows
svchost.exe  25,932 K 12,276 K 668 Host Process for Windows Services Microsoft Corporation (Verified) Microsoft Windows
svchost.exe  4,748 K 4,652 K 1156 Host Process for Windows Services Microsoft Corporation (Verified) Microsoft Windows
svchost.exe  2,144 K 1,984 K 3700 Host Process for Windows Services Microsoft Corporation (Verified) Microsoft Windows
svchost.exe  2,776 K 3,300 K 4588 Host Process for Windows Services Microsoft Corporation (Verified) Microsoft Windows
svchost.exe  7,528 K 7,600 K 2052 Host Process for Windows Services Microsoft Corporation (Verified) Microsoft Windows
splwow64.exe  6,044 K 1,148 K 596 Print driver host for 32bit applications Microsoft Corporation (Verified) Microsoft Windows
smss.exe  564 K 412 K 444 Windows Session Manager Microsoft Corporation (Verified) Microsoft Windows
SamsungMagician.exe  11,828 K 4,340 K 6708 Samsung Magician Samsung Electronics Co. Ltd. (Verified) Samsung Electronics Co.
RtkAudioService64.exe  2,252 K 1,500 K 1328 Realtek Audio Service Realtek Semiconductor (Verified) Realtek Semiconductor Corp
RAVBg64.exe  15,004 K 4,000 K 1496 HD Audio Background Process Realtek Semiconductor (Verified) Realtek Semiconductor Corp
QBIDPService.exe  8,676 K 1,072 K 2596 QBIDPService Intuit Inc. (Verified) Intuit
QBCFMonitorService.exe  11,196 K 5,604 K 2528   Intuit Inc. (Verified) Intuit
procexp.exe  2,532 K 7,940 K 8912 Sysinternals Process Explorer Sysinternals - www.sysinternals.com (Verified) Microsoft Corporation
PresentationFontCache.exe  28,236 K 1,320 K 4364 PresentationFontCache.exe Microsoft Corporation (Verified) Microsoft Corporation
pcCMService.exe  1,984 K 1,360 K 2428 mcci+McciCMService Alcatel-Lucent (No signature was present in the subject) Alcatel-Lucent
pcCMService.exe  2,292 K 1,656 K 2484 mcci+McciCMService Alcatel-Lucent (No signature was present in the subject) Alcatel-Lucent
notepad.exe  1,928 K 800 K 6032 Notepad Microsoft Corporation (Verified) Microsoft Windows
mbamscheduler.exe  4,836 K 1,980 K 2240 Malwarebytes Anti-Malware (Corporate) Malwarebytes Corporation (Verified) Malwarebytes Corporation
lsm.exe  3,008 K 2,556 K 804 Local Session Manager Service Microsoft Corporation (Verified) Microsoft Windows
LMS.exe  4,728 K 2,912 K 4240 Intel® Local Management Service Intel Corporation (Verified) Intel Corporation - Intel® Management Engine Firmware
jhi_service.exe  1,604 K 596 K 2548 Intel® Dynamic Application Loader Host Interface Intel Corporation (Verified) Intel Corporation - Intel® Management Engine Firmware
igfxHK.exe  2,896 K 2,048 K 3916 igfxHK Module Intel Corporation (Verified) Intel Corporation - pGFX
igfxCUIService.exe  2,516 K 3,224 K 1288 igfxCUIService Module Intel Corporation (Verified) Intel Corporation - pGFX
HPSupportSolutionsFrameworkService.exe  38,892 K 4,936 K 5104 HP Support Solutions Framework Service HP Inc. (Verified) HP Inc.
dllhost.exe  2,420 K 6,428 K 4472 COM Surrogate Microsoft Corporation (Verified) Microsoft Windows
conhost.exe  1,460 K 724 K 1996 Console Window Host Microsoft Corporation (Verified) Microsoft Windows
btwdins.exe  3,344 K 4,292 K 2032 Bluetooth Support Server Broadcom Corporation. (Verified) Broadcom Corporation
audiodg.exe  18,384 K 18,784 K 4088 Windows Audio Device Graph Isolation  Microsoft Corporation (Verified) Microsoft Windows
armsvc.exe  1,244 K 464 K 1836 Adobe Acrobat Update Service Adobe Systems Incorporated (Verified) Adobe Systems

 


  • 0

#70
shorthaul99

shorthaul99

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 133 posts

SVCHost2704.jpg

 

 

 

It appears that there is only 1 service attached to it and it claims it is part of Windows Defender package.


  • 0

Advertisements


#71
RKinner

RKinner

    Malware Expert

  • Expert
  • 24,748 posts
  • MVP

Probably a false positive then.  Best to leave it tho I have to wonder why Windows Defender is running when you have an antivirus.  Normally when you install an antivirus the first thing it does is turn off Windows Defender.

 

Do you use Log Me In?


  • 0

#72
shorthaul99

shorthaul99

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 133 posts

My bookkeeper uses Log Me In occasionally when she needs to update something but it has been several months since she has needed in via remote.

 

I keep it disabled unless she asks me to keep computer on and Log Me In on so she can do some work.

 

I find it funny that the 2704 process wasn't caught on the original logs from Rogue Killer back on post #25...

 

Also, if this truly is an issue, I wonder why I pay for Corporate MBAM and it doesn't even see it as a threat plus it doesn't appear like it is running live in the startup bar?

 

Every time I open it, it does the little pop up windows for admin privileges to start it. It never used to do that.


  • 0

#73
RKinner

RKinner

    Malware Expert

  • Expert
  • 24,748 posts
  • MVP

They are always updating RK.  Probably an update caused the false positive but it really should not be running since you have an antivirus.  Search for:

 

services.msc

 

Scroll down to Windows Defender

Right click and select Properties then change the Startup Type to Disabled.  Apply.  Stop the service.

 

That should make the svchost 2704 go away.

 

You can close RK.

 

Back to the QB problem.  Have you tried logging in to your email provider and leaving it connected while you run QB and try to mail? 

I'll get back to looking at the Proc Mon logs but I have to put my Win 7 machine back together.  Borrowed the keyboard to use on my other PC.


  • 0

#74
shorthaul99

shorthaul99

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 133 posts

It makes no difference when emailing if Outlook is open or not. I usually keep it open while I am working so I can get updates of new emails throughout the day

but some days I will only monitor my email on my phone while working.

 

 

I asked QB forum and here is their response:

 

 

https://community.in...nt=new_question


  • 0

#75
RKinner

RKinner

    Malware Expert

  • Expert
  • 24,748 posts
  • MVP

I'm getting closer to the failure point.

 

The first thing the good one does that the bad one doesn't is open WebMail.dll which lives at c:\Program Files (x86)\Intuit\QuickBooks 2018\WebMail.dll

 

It doesn't even try.  This is right after both read C:\ProgramData\Intuit\QuickBooks 2018\Components\Messages\LEDCLSConfig.XML so could you send me a copy of the LEDCLSConfig.XML file?

 

Instead of opening WebMail.dll the bad one searches through tcpip connections then looks for

 

C:\Program Files (x86)\Intuit\QuickBooks 2018\FileLocations.ini

and

C:\Program Files (x86)\Intuit\QuickBooks 2018\SendError.ini

 

I expect if the last file existed it would tell the program what to do instead of crashing. 

 

Also when it fails it creates a dump file:

 

C:\Users\JB\AppData\Local\Temp\MemDump.dmp

 

I probably can't read it but send it to me anyway just in case.

 

Also send me a copy of

C:\Users\JB\AppData\Local\Intuit\CLSLibrary\CLSClientLogger.log


  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP