The document contains log entries from a system that appears to have been infected with malware. It lists alternate data streams, scheduled tasks, installed software, and browser/system settings that indicate the presence of unwanted programs. The log also shows the system attempting to remove traces of the infection by deleting directories and scheduled tasks.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
129 views2 pages
Fix List
The document contains log entries from a system that appears to have been infected with malware. It lists alternate data streams, scheduled tasks, installed software, and browser/system settings that indicate the presence of unwanted programs. The log also shows the system attempting to remove traces of the infection by deleting directories and scheduled tasks.