Win7 Ultimate x64 Free NOD32 business x64 I visited a website today using IE9 (eset staff can pm me for a link) and got delivered a payload somehow - I didn't bother to analyse how. the trojan disabled nod32, and installed it's user mode exe c:\program files (x86)\lp\1cc.exe. nod32 detected the trojan trying to access the web and blocked those attempts. It also detected the trojan exe itself (after it had executed), but not before the trojan had broken nod32. nod32 still appeared to "work", but I received the "application protocols will not function" error, I believe the software had tampered with the eset driver at this stage. I managed to remove the user mode portion of the trojan by suspending the process in procexp, then deleting it, but I couldn't be sure at that stage, that a kernel mode payload hadn't been delivered, so I took it off the web, flashed the bios, reformatted, and that was that. I think it's worth someone from eset taking a look at the virus, I haven't had this happen in a long time.