Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Norton blocking Trojan.BetaBot Activity 3


  • Please log in to reply
24 replies to this topic

#1 lowvoltage

lowvoltage

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:54 PM

Posted 11 December 2013 - 05:42 PM

Started happening this afternoon every few minutes.  Malwarebytes found and quarantined PUP.Optional.InstallIQ.A on a quick scan but Norton is still alerting regularly.

 

edit: Running Win7 Professional x64 


Edited by lowvoltage, 11 December 2013 - 05:52 PM.


BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,696 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:08:54 PM

Posted 11 December 2013 - 08:33 PM

p22002970.gif Download Security Check from here or here and save it to your Desktop.

  • Double-click SecurityCheck.exe
  • Follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

NOTE 1. If one of your security applications (e.g., third-party firewall) requests permission to allow DIG.EXE access the Internet, allow it to do so.
NOTE 2 SecurityCheck may produce some false warning(s), so leave the results reading to me.

p22002970.gif Please download Farbar Service Scanner (FSS) and run it on the computer with the issue.
  • Make sure the following options are checked:
    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center/Action Center
    • Windows Update
    • Windows Defender
    • Other Services
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.


p22002970.gif Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Devices (do NOT change any settings here)
  • List Users, Partitions and Memory size

Click Go and post the result.

p22002970.gif Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

p22002970.gifDownload Malwarebytes Anti-Rootkit from HERE to your Desktop.
  • Unzip downloaded file.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • DO NOT click on the Cleanup button. Simply exit the program.
  • When done, please post the two logs produced they will be in the MBAR folder..... mbar-log-xxxxx.txt and system-log.txt


p22002970.gif Please download Rkill (courtesy of BleepingComputer.com) to your desktop.
There are 2 different versions. If one of them won't run then download and try to run the other one.
You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

rKill.exe: http://www.bleepingcomputer.com/download/rkill/dl/10/
iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/

  • Double-click on the Rkill desktop icon to run the tool.
  • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • Do not reboot until instructed.
  • If the tool does not run from any of the links provided, please let me know.


If normal mode still doesn't work, run the tool from safe mode.

When the scan is done Notepad will open with rKill log.
Post it in your next reply.

NOTE. rKill.txt log will also be present on your desktop.

NOTE Do NOT wrap your logs in "quote" or "code" brackets.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 lowvoltage

lowvoltage
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:54 PM

Posted 12 December 2013 - 05:40 PM

Thanks for the response! Here are the logs as requested:

 

Security Check:

 Results of screen317's Security Check version 0.99.77  
 Windows 7 Service Pack 1 x64 (UAC is enabled)  
 Internet Explorer 11  
``````````````Antivirus/Firewall Check:`````````````` 
 Windows Firewall Enabled!  
Norton Security Suite   
 WMI entry may not exist for antivirus; attempting automatic update. 
`````````Anti-malware/Other Utilities Check:````````` 
 Malwarebytes Anti-Malware version 1.75.0.1300  
 Java 7 Update 45  
 Adobe Flash Player 11.9.900.170  
 Adobe Reader 10.1.7 Adobe Reader out of Date!  
 Google Chrome 31.0.1650.57  
 Google Chrome 31.0.1650.63  
 Google Chrome plugins...  
````````Process Check: objlist.exe by Laurent````````  
 Norton ccSvcHst.exe 
 Malwarebytes Anti-Malware mbamservice.exe  
 Malwarebytes Anti-Malware mbamgui.exe  
 Malwarebytes' Anti-Malware mbamscheduler.exe   
`````````````````System Health check````````````````` 
 Total Fragmentation on Drive C: 11% Defragment your hard drive soon! (Do NOT defrag if SSD!)
````````````````````End of Log`````````````````````` 
 
FSS:

Farbar Service Scanner Version: 05-12-2013
Ran by Plague (administrator) on 12-12-2013 at 17:32:33
Running from "C:\Users\Plague\Desktop"
Microsoft Windows 7 Professional  Service Pack 1 (X64)
Boot Mode: Normal
****************************************************************
 
Internet Services:
============
 
Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Google.com is accessible.
Yahoo.com is accessible.
 
 
Windows Firewall:
=============
 
Firewall Disabled Policy: 
==================
 
 
System Restore:
============
 
System Restore Disabled Policy: 
========================
 
 
Action Center:
============
 
 
Windows Update:
============
 
Windows Autoupdate Disabled Policy: 
============================
 
 
Windows Defender:
==============
WinDefend Service is not running. Checking service configuration:
The start type of WinDefend service is set to Demand. The default start type is Auto.
The ImagePath of WinDefend service is OK.
The ServiceDll of WinDefend service is OK.
 
 
Windows Defender Disabled Policy: 
==========================
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender]
"DisableAntiSpyware"=DWORD:1
 
 
Other Services:
==============
 
 
File Check:
========
C:\Windows\System32\nsisvc.dll => MD5 is legit
C:\Windows\System32\drivers\nsiproxy.sys => MD5 is legit
C:\Windows\System32\dhcpcore.dll => MD5 is legit
C:\Windows\System32\drivers\afd.sys => MD5 is legit
C:\Windows\System32\drivers\tdx.sys => MD5 is legit
C:\Windows\System32\Drivers\tcpip.sys => MD5 is legit
C:\Windows\System32\dnsrslvr.dll => MD5 is legit
C:\Windows\System32\mpssvc.dll => MD5 is legit
C:\Windows\System32\bfe.dll => MD5 is legit
C:\Windows\System32\drivers\mpsdrv.sys => MD5 is legit
C:\Windows\System32\SDRSVC.dll => MD5 is legit
C:\Windows\System32\vssvc.exe => MD5 is legit
C:\Windows\System32\wscsvc.dll => MD5 is legit
C:\Windows\System32\wbem\WMIsvc.dll => MD5 is legit
C:\Windows\System32\wuaueng.dll => MD5 is legit
C:\Windows\System32\qmgr.dll => MD5 is legit
C:\Windows\System32\es.dll => MD5 is legit
C:\Windows\System32\cryptsvc.dll => MD5 is legit
C:\Program Files\Windows Defender\MpSvc.dll => MD5 is legit
C:\Windows\System32\ipnathlp.dll => MD5 is legit
C:\Windows\System32\iphlpsvc.dll => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\System32\rpcss.dll => MD5 is legit
 
 
**** End of log ****
 

Minitoolbox:

MiniToolBox by Farbar  Version: 13-07-2013
Ran by Plague (administrator) on 12-12-2013 at 17:34:41
Running from "C:\Users\Plague\Desktop"
Microsoft Windows 7 Professional  Service Pack 1 (X64)
Boot Mode: Normal
***************************************************************************
 
========================= IE Proxy Settings: ============================== 
 
Proxy is not enabled.
No Proxy Server is set.
========================= Hosts content: =================================
 
 
 
========================= IP Configuration: ================================
 
Intel® 82583V Gigabit Network Connection = Local Area Connection 3 (Connected)
VMware Virtual Ethernet Adapter for VMnet1 = VMware Network Adapter VMnet1 (Connected)
VMware Virtual Ethernet Adapter for VMnet8 = VMware Network Adapter VMnet8 (Connected)
Intel® 82579V Gigabit Network Connection = Local Area Connection 2 (Media disconnected)
 
 
# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4
 
reset
set global icmpredirects=enabled
add address name="Local Area Connection* 8-QoS Packet Scheduler-0000" address=192.168.57.1 mask=255.255.255.0
add address name="Local Area Connection* 7-QoS Packet Scheduler-0000" address=192.168.47.1 mask=255.255.255.0
add address name="VMware Network Adapter VMnet8" address=192.168.11.1 mask=255.255.255.0
add address name="VMware Network Adapter VMnet1" address=192.168.110.1 mask=255.255.255.0
 
 
popd
# End of IPv4 configuration
 
 
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : Plague-PC
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : hsd1.va.comcast.net.
 
Ethernet adapter Local Area Connection 2:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Intel® 82579V Gigabit Network Connection
   Physical Address. . . . . . . . . : 54-04-A6-4D-C9-64
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Ethernet adapter Local Area Connection 3:
 
   Connection-specific DNS Suffix  . : hsd1.va.comcast.net.
   Description . . . . . . . . . . . : Intel® 82583V Gigabit Network Connection
   Physical Address. . . . . . . . . : 54-04-A6-4D-C7-69
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::30b2:68eb:6727:2a11%13(Preferred) 
   IPv4 Address. . . . . . . . . . . : 10.1.88.145(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Thursday, December 12, 2013 3:18:08 AM
   Lease Expires . . . . . . . . . . : Friday, December 13, 2013 3:18:08 PM
   Default Gateway . . . . . . . . . : 10.1.88.1
   DHCP Server . . . . . . . . . . . : 10.1.88.1
   DHCPv6 IAID . . . . . . . . . . . : 357827750
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-16-ED-45-54-54-04-A6-4D-C9-64
   DNS Servers . . . . . . . . . . . : 75.75.75.75
                                       75.75.76.76
                                       10.1.88.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Ethernet adapter VMware Network Adapter VMnet1:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : VMware Virtual Ethernet Adapter for VMnet1
   Physical Address. . . . . . . . . : 00-50-56-C0-00-01
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::8176:eec2:1165:8177%16(Preferred) 
   Autoconfiguration IPv4 Address. . : 169.254.129.119(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.0.0
   Default Gateway . . . . . . . . . : 
   DHCPv6 IAID . . . . . . . . . . . : 352342102
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-16-ED-45-54-54-04-A6-4D-C9-64
   DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
                                       fec0:0:0:ffff::2%1
                                       fec0:0:0:ffff::3%1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Ethernet adapter VMware Network Adapter VMnet8:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : VMware Virtual Ethernet Adapter for VMnet8
   Physical Address. . . . . . . . . : 00-50-56-C0-00-08
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::4974:60a5:6bf8:220b%17(Preferred) 
   Autoconfiguration IPv4 Address. . : 169.254.34.11(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.0.0
   Default Gateway . . . . . . . . . : 
   DHCPv6 IAID . . . . . . . . . . . : 369119318
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-16-ED-45-54-54-04-A6-4D-C9-64
   DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
                                       fec0:0:0:ffff::2%1
                                       fec0:0:0:ffff::3%1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Tunnel adapter isatap.{8E5AE4CF-E099-4EC3-AF3C-90DAEAAFD0FA}:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
 
Tunnel adapter isatap.{BAE5FB3F-67E4-4786-B8EB-4FA297CEA0D2}:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
 
Tunnel adapter Teredo Tunneling Pseudo-Interface:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
 
Tunnel adapter isatap.hsd1.va.comcast.net.:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : hsd1.va.comcast.net.
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter #3
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
 
Tunnel adapter isatap.{6DE454EC-CD4B-4115-918F-5BD2BA90F878}:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter #5
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
Server:  cdns01.comcast.net
Address:  75.75.75.75
 
Name:    google.com
Addresses:  2607:f8b0:4002:c06::8b
 173.194.37.65
 173.194.37.72
 173.194.37.70
 173.194.37.78
 173.194.37.69
 173.194.37.68
 173.194.37.73
 173.194.37.66
 173.194.37.67
 173.194.37.71
 173.194.37.64
 
 
Pinging google.com [173.194.37.72] with 32 bytes of data:
Reply from 173.194.37.72: bytes=32 time=29ms TTL=55
Reply from 173.194.37.72: bytes=32 time=28ms TTL=55
 
Ping statistics for 173.194.37.72:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 28ms, Maximum = 29ms, Average = 28ms
Server:  cdns01.comcast.net
Address:  75.75.75.75
 
Name:    yahoo.com
Addresses:  98.138.253.109
 206.190.36.45
 98.139.183.24
 
 
Pinging yahoo.com [98.139.183.24] with 32 bytes of data:
Reply from 98.139.183.24: bytes=32 time=49ms TTL=49
Reply from 98.139.183.24: bytes=32 time=52ms TTL=47
 
Ping statistics for 98.139.183.24:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 49ms, Maximum = 52ms, Average = 50ms
 
Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time=1ms TTL=128
Reply from 127.0.0.1: bytes=32 time=2ms TTL=128
 
Ping statistics for 127.0.0.1:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 1ms, Maximum = 2ms, Average = 1ms
===========================================================================
Interface List
 18...54 04 a6 4d c9 64 ......Intel® 82579V Gigabit Network Connection
 13...54 04 a6 4d c7 69 ......Intel® 82583V Gigabit Network Connection
 16...00 50 56 c0 00 01 ......VMware Virtual Ethernet Adapter for VMnet1
 17...00 50 56 c0 00 08 ......VMware Virtual Ethernet Adapter for VMnet8
  1...........................Software Loopback Interface 1
 20...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
 21...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #2
 14...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
 22...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #3
 19...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #5
===========================================================================
 
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0        10.1.88.1      10.1.88.145     10
        10.1.88.0    255.255.255.0         On-link       10.1.88.145    266
      10.1.88.145  255.255.255.255         On-link       10.1.88.145    266
      10.1.88.255  255.255.255.255         On-link       10.1.88.145    266
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
      169.254.0.0      255.255.0.0         On-link     169.254.34.11    276
      169.254.0.0      255.255.0.0         On-link   169.254.129.119    276
    169.254.34.11  255.255.255.255         On-link     169.254.34.11    276
  169.254.129.119  255.255.255.255         On-link   169.254.129.119    276
  169.254.255.255  255.255.255.255         On-link     169.254.34.11    276
  169.254.255.255  255.255.255.255         On-link   169.254.129.119    276
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link       10.1.88.145    266
        224.0.0.0        240.0.0.0         On-link   169.254.129.119    276
        224.0.0.0        240.0.0.0         On-link     169.254.34.11    276
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link       10.1.88.145    266
  255.255.255.255  255.255.255.255         On-link   169.254.129.119    276
  255.255.255.255  255.255.255.255         On-link     169.254.34.11    276
===========================================================================
Persistent Routes:
  None
 
IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
  1    306 ::1/128                  On-link
 13    266 fe80::/64                On-link
 16    276 fe80::/64                On-link
 17    276 fe80::/64                On-link
 13    266 fe80::30b2:68eb:6727:2a11/128
                                    On-link
 17    276 fe80::4974:60a5:6bf8:220b/128
                                    On-link
 16    276 fe80::8176:eec2:1165:8177/128
                                    On-link
  1    306 ff00::/8                 On-link
 13    266 ff00::/8                 On-link
 16    276 ff00::/8                 On-link
 17    276 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None
========================= Winsock entries =====================================
 
Catalog5 01 C:\Windows\SysWOW64\NLAapi.dll [52224] (Microsoft Corporation)
Catalog5 02 C:\Windows\SysWOW64\napinsp.dll [52224] (Microsoft Corporation)
Catalog5 03 C:\Windows\SysWOW64\pnrpnsp.dll [65024] (Microsoft Corporation)
Catalog5 04 C:\Windows\SysWOW64\pnrpnsp.dll [65024] (Microsoft Corporation)
Catalog5 05 C:\Windows\SysWOW64\wshbth.dll [36352] (Microsoft Corporation)
Catalog5 06 C:\Windows\SysWOW64\mswsock.dll [231424] (Microsoft Corporation)
Catalog5 07 C:\Windows\SysWOW64\winrnr.dll [20992] (Microsoft Corporation)
Catalog5 08 C:\Program Files (x86)\Bonjour\mdnsNSP.dll [152864] (Apple Inc.)
Catalog9 01 C:\Windows\SysWOW64\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 02 C:\Windows\SysWOW64\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 03 C:\Windows\SysWOW64\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 04 C:\Windows\SysWOW64\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 05 C:\Windows\SysWOW64\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 06 C:\Windows\SysWOW64\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 07 C:\Windows\SysWOW64\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 08 C:\Windows\SysWOW64\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 09 C:\Windows\SysWOW64\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 10 C:\Windows\SysWOW64\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 11 C:\Windows\SysWOW64\mswsock.dll [231424] (Microsoft Corporation)
Catalog9 12 C:\Windows\SysWOW64\vsocklib.dll [63088] (VMware, Inc.)
Catalog9 13 C:\Windows\SysWOW64\vsocklib.dll [63088] (VMware, Inc.)
x64-Catalog5 01 C:\Windows\System32\NLAapi.dll [70656] (Microsoft Corporation)
x64-Catalog5 02 C:\Windows\System32\napinsp.dll [68096] (Microsoft Corporation)
x64-Catalog5 03 C:\Windows\System32\pnrpnsp.dll [86016] (Microsoft Corporation)
x64-Catalog5 04 C:\Windows\System32\pnrpnsp.dll [86016] (Microsoft Corporation)
x64-Catalog5 05 C:\Windows\System32\wshbth.dll [47104] (Microsoft Corporation)
x64-Catalog5 06 C:\Windows\System32\mswsock.dll [327168] (Microsoft Corporation)
x64-Catalog5 07 C:\Windows\System32\winrnr.dll [28672] (Microsoft Corporation)
x64-Catalog5 08 C:\Program Files\Bonjour\mdnsNSP.dll [193824] (Apple Inc.)
x64-Catalog9 01 C:\Windows\System32\mswsock.dll [327168] (Microsoft Corporation)
x64-Catalog9 02 C:\Windows\System32\mswsock.dll [327168] (Microsoft Corporation)
x64-Catalog9 03 C:\Windows\System32\mswsock.dll [327168] (Microsoft Corporation)
x64-Catalog9 04 C:\Windows\System32\mswsock.dll [327168] (Microsoft Corporation)
x64-Catalog9 05 C:\Windows\System32\mswsock.dll [327168] (Microsoft Corporation)
x64-Catalog9 06 C:\Windows\System32\mswsock.dll [327168] (Microsoft Corporation)
x64-Catalog9 07 C:\Windows\System32\mswsock.dll [327168] (Microsoft Corporation)
x64-Catalog9 08 C:\Windows\System32\mswsock.dll [327168] (Microsoft Corporation)
x64-Catalog9 09 C:\Windows\System32\mswsock.dll [327168] (Microsoft Corporation)
x64-Catalog9 10 C:\Windows\System32\mswsock.dll [327168] (Microsoft Corporation)
x64-Catalog9 11 C:\Windows\System32\mswsock.dll [327168] (Microsoft Corporation)
x64-Catalog9 12 C:\Windows\System32\vsocklib.dll [67184] (VMware, Inc.)
x64-Catalog9 13 C:\Windows\System32\vsocklib.dll [67184] (VMware, Inc.)
 
========================= Event log errors: ===============================
 
Application errors:
==================
Error: (12/12/2013 00:31:24 AM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "Microsoft.VC80.DebugCRT,processorArchitecture="x86",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50608.0"1".
Dependent Assembly Microsoft.VC80.DebugCRT,processorArchitecture="x86",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50608.0" could not be found.
Please use sxstrace.exe for detailed diagnosis.
 
Error: (12/11/2013 00:30:22 AM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "Microsoft.VC80.DebugCRT,processorArchitecture="x86",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50608.0"1".
Dependent Assembly Microsoft.VC80.DebugCRT,processorArchitecture="x86",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50608.0" could not be found.
Please use sxstrace.exe for detailed diagnosis.
 
Error: (12/10/2013 00:30:18 AM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "Microsoft.VC80.DebugCRT,processorArchitecture="x86",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50608.0"1".
Dependent Assembly Microsoft.VC80.DebugCRT,processorArchitecture="x86",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50608.0" could not be found.
Please use sxstrace.exe for detailed diagnosis.
 
Error: (12/09/2013 01:12:10 PM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "Microsoft.VC80.DebugCRT,processorArchitecture="x86",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50608.0"1".
Dependent Assembly Microsoft.VC80.DebugCRT,processorArchitecture="x86",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50608.0" could not be found.
Please use sxstrace.exe for detailed diagnosis.
 
Error: (12/09/2013 00:32:22 PM) (Source: Bonjour Service) (User: )
Description: AbortUnlinkAndFree: ERROR: Attempt to abort operation 01E50048 not in list
 
Error: (12/09/2013 00:32:22 PM) (Source: Bonjour Service) (User: )
Description: abort_request: ERROR: Attempt to abort operation 01E50048 with req->terminate FFFFFFFF
 
Error: (12/09/2013 00:32:22 PM) (Source: Bonjour Service) (User: )
Description: -1: ERROR: read_msg errno 0 (The operation completed successfully.)
 
Error: (12/09/2013 00:32:22 PM) (Source: Bonjour Service) (User: )
Description: 568: DNSServiceQueryRecord      Plague-PC.local. (Addr)
 
Error: (12/09/2013 00:32:22 PM) (Source: Bonjour Service) (User: )
Description: 568: Could not write data to client because of error - aborting connection
 
Error: (12/09/2013 00:32:22 PM) (Source: Bonjour Service) (User: )
Description: send_msg ERROR: failed to write 71 of 71 bytes to fd 568 errno 10054 (An existing connection was forcibly closed by the remote host.)
 
 
System errors:
=============
Error: (12/11/2013 05:12:25 PM) (Source: Service Control Manager) (User: )
Description: The Intel® Rapid Storage Technology service terminated unexpectedly.  It has done this 1 time(s).
 
Error: (12/11/2013 05:12:24 PM) (Source: Service Control Manager) (User: )
Description: The VMware vCenter Converter Standalone Agent service terminated unexpectedly.  It has done this 1 time(s).
 
Error: (12/11/2013 05:12:24 PM) (Source: Service Control Manager) (User: )
Description: The CGPS Service service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 0 milliseconds: Restart the service.
 
Error: (12/11/2013 05:12:24 PM) (Source: Service Control Manager) (User: )
Description: The ASUS HM Com Service service terminated unexpectedly.  It has done this 1 time(s).
 
Error: (12/11/2013 05:12:24 PM) (Source: Service Control Manager) (User: )
Description: The ASUS Com Service service terminated unexpectedly.  It has done this 1 time(s).
 
Error: (12/11/2013 05:12:24 PM) (Source: Service Control Manager) (User: )
Description: The Adobe Acrobat Update Service service terminated unexpectedly.  It has done this 1 time(s).
 
Error: (12/11/2013 07:43:23 AM) (Source: Service Control Manager) (User: )
Description: A timeout (30000 milliseconds) was reached while waiting for a transaction response from the ShellHWDetection service.
 
Error: (12/11/2013 07:42:53 AM) (Source: Service Control Manager) (User: )
Description: A timeout (30000 milliseconds) was reached while waiting for a transaction response from the ShellHWDetection service.
 
Error: (12/11/2013 07:42:23 AM) (Source: Service Control Manager) (User: )
Description: A timeout (30000 milliseconds) was reached while waiting for a transaction response from the ShellHWDetection service.
 
Error: (12/11/2013 07:41:53 AM) (Source: Service Control Manager) (User: )
Description: A timeout (30000 milliseconds) was reached while waiting for a transaction response from the ShellHWDetection service.
 
 
Microsoft Office Sessions:
=========================
Error: (12/12/2013 00:31:24 AM) (Source: SideBySide)(User: )
Description: Microsoft.VC80.DebugCRT,processorArchitecture="x86",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50608.0"c:\program files (x86)\ASUS\ai suite ii\asus mobilink\simulator\killproc.exe
 
Error: (12/11/2013 00:30:22 AM) (Source: SideBySide)(User: )
Description: Microsoft.VC80.DebugCRT,processorArchitecture="x86",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50608.0"c:\program files (x86)\ASUS\ai suite ii\asus mobilink\simulator\killproc.exe
 
Error: (12/10/2013 00:30:18 AM) (Source: SideBySide)(User: )
Description: Microsoft.VC80.DebugCRT,processorArchitecture="x86",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50608.0"c:\program files (x86)\ASUS\ai suite ii\asus mobilink\simulator\killproc.exe
 
Error: (12/09/2013 01:12:10 PM) (Source: SideBySide)(User: )
Description: Microsoft.VC80.DebugCRT,processorArchitecture="x86",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50608.0"c:\program files (x86)\ASUS\ai suite ii\asus mobilink\simulator\killproc.exe
 
Error: (12/09/2013 00:32:22 PM) (Source: Bonjour Service)(User: )
Description: AbortUnlinkAndFree: ERROR: Attempt to abort operation 01E50048 not in list
 
Error: (12/09/2013 00:32:22 PM) (Source: Bonjour Service)(User: )
Description: abort_request: ERROR: Attempt to abort operation 01E50048 with req->terminate FFFFFFFF
 
Error: (12/09/2013 00:32:22 PM) (Source: Bonjour Service)(User: )
Description: -1: ERROR: read_msg errno 0 (The operation completed successfully.)
 
Error: (12/09/2013 00:32:22 PM) (Source: Bonjour Service)(User: )
Description: 568: DNSServiceQueryRecord      Plague-PC.local. (Addr)
 
Error: (12/09/2013 00:32:22 PM) (Source: Bonjour Service)(User: )
Description: 568: Could not write data to client because of error - aborting connection
 
Error: (12/09/2013 00:32:22 PM) (Source: Bonjour Service)(User: )
Description: send_msg ERROR: failed to write 71 of 71 bytes to fd 568 errno 10054 (An existing connection was forcibly closed by the remote host.)
 
 
=========================== Installed Programs ============================
 
Acrobat.com (Version: 1.6.65)
Adobe After Effects CS4 Presets (Version: 9)
Adobe AIR (Version: 3.7.0.2090)
Adobe Anchor Service CS4 (Version: 2.0)
Adobe Anchor Service x64 CS4 (Version: 2.0)
Adobe Asset Services CS4 (Version: 4)
Adobe Bridge CS4 (Version: 3)
Adobe CMaps CS4 (Version: 2.0)
Adobe CMaps x64 CS4 (Version: 2.0)
Adobe Color - Photoshop Specific CS4 (Version: 2.0)
Adobe Color EU Extra Settings CS4 (Version: 2.0)
Adobe Color JA Extra Settings CS4 (Version: 2.0)
Adobe Color NA Recommended Settings CS4 (Version: 2.0)
Adobe Color Video Profiles AE CS4 (Version: 2.0)
Adobe Color Video Profiles CS CS4 (Version: 2.0)
Adobe Creative Suite 4 Master Collection (Version: 4.0)
Adobe CS4 American English Speech Analysis Models (Version: 1)
Adobe CSI CS4 (Version: 1)
Adobe CSI CS4 x64 (Version: 1)
Adobe Default Language CS4 (Version: 2.0)
Adobe Device Central CS4 (Version: 2)
Adobe Dreamweaver CS4 (Version: 10.0)
Adobe Drive CS4 (Version: 1)
Adobe Drive CS4 x64 (Version: 1)
Adobe Dynamiclink Support (Version: 1)
Adobe ExtendScript Toolkit CS4 (Version: 3.0.0)
Adobe Extension Manager CS4 (Version: 2.0)
Adobe Flash CS4 Extension - Flash Lite STI en (Version: 3.0)
Adobe Flash CS4 STI-en (Version: 10.0)
Adobe Flash Player 11 ActiveX (Version: 11.9.900.170)
Adobe Flash Player 11 Plugin (Version: 11.9.900.170)
Adobe Fonts All (Version: 2.0)
Adobe Fonts All x64 (Version: 2.0)
Adobe InDesign CS4 Application Feature Set Files (Roman) (Version: 6.0)
Adobe InDesign CS4 Common Base Files (Version: 6.0)
Adobe Linguistics CS4 (Version: 4.0.0)
Adobe Linguistics CS4 x64 (Version: 4.0.0)
Adobe Media Encoder CS4 (Version: 1.0)
Adobe Media Encoder CS4 Additional Exporter (Version: 1.0)
Adobe Media Encoder CS4 Dolby (Version: 1.0)
Adobe Media Player (Version: 0.0.0)
Adobe Media Player (Version: 1.1)
Adobe Output Module (Version: 2.0)
Adobe PDF Library Files CS4 (Version: 9.0)
Adobe PDF Library Files x64 CS4 (Version: 9.0)
Adobe Photoshop CS4 (64 Bit) (Version: 11.0)
Adobe Photoshop CS4 Support (Version: 11.0)
Adobe Photoshop Lightroom 4.4 64-bit (Version: 4.4.1)
Adobe Reader X (10.1.7) (Version: 10.1.7)
Adobe Search for Help (Version: 1.0)
Adobe Service Manager Extension (Version: 1.0)
Adobe Setup (Version: 2.0)
Adobe Shockwave Player 11.6 (Version: 11.6.4.634)
Adobe Type Support CS4 (Version: 9.0)
Adobe Type Support x64 CS4 (Version: 9.0)
Adobe Update Manager CS4 (Version: 6.0.0)
Adobe WinSoft Linguistics Plugin (Version: 1.1)
Adobe WinSoft Linguistics Plugin x64 (Version: 1.1)
Adobe XMP Panels CS4 (Version: 2.0)
AdobeColorCommonSetCMYK (Version: 2.0)
AdobeColorCommonSetRGB (Version: 2.0)
AI Suite II (Version: 1.01.34)
AntiLogger SDK version 1.6.6.296 (Version: 1.6.6.296)
ASUS ROG Connect Plus (Version: 1.00.14)
Bluetooth Stack for Windows by Toshiba (Version: v7.10.01)
Bonjour (Version: 2.0.4.0)
Connect (Version: 1.0.0.1)
Constant Guard Protection Suite (Version: 1.13.1030.3)
Coupon Printer for Windows (Version: 5.0.0.3)
CPUID ROG CPU-Z 1.57.2 (Version: 1.57.2)
Definition Update for Microsoft Office 2010 (KB982726) 64-Bit Edition
Diablo III (Version: 1.0.8.16603)
Dishonored (Version: 1.0)
EPSON Printer Software
EPSON Scan
FileZilla Client 3.5.3 (Version: 3.5.3)
Futuremark SystemInfo (Version: 3.16.2.1)
Google Chrome (Version: 31.0.1650.63)
Google Talk (remove only)
Google Talk Plugin (Version: 4.9.1.16010)
Google Update Helper (Version: 1.3.22.3)
ImgBurn (Version: 2.5.6.0)
Intel® Control Center (Version: 1.2.1.1007)
Intel® Management Engine Components (Version: 7.0.0.1144)
Intel® Network Connections 16.1.53.0 (Version: 16.1.53.0)
Intel® Rapid Storage Technology (Version: 10.5.0.1026)
Intel® Watchdog Timer Driver (Intel® WDT)
Java 7 Update 45 (Version: 7.0.450)
Java Auto Updater (Version: 2.1.9.8)
K-Lite Codec Pack 8.4.0 (Full) (Version: 8.4.0)
kuler (Version: 2.0)
LeapFrog Connect (Version: 5.0.20.17316)
LeapFrog LeapPad Explorer Plugin (Version: 5.0.19.17305)
Malwarebytes Anti-Malware version 1.75.0.1300 (Version: 1.75.0.1300)
marvell 91xx driver (Version: 1.0.0.1051)
marvell 91xx lite driver (Version: 1.0.0.0014)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319)
Microsoft .NET Framework 4 Extended (Version: 4.0.30319)
Microsoft Corporation (Version: 9.1.0.0)
Microsoft LifeCam (Version: 3.22.270.0)
Microsoft Office Access MUI (English) 2010 (Version: 14.0.7015.1000)
Microsoft Office Access Setup Metadata MUI (English) 2010 (Version: 14.0.7015.1000)
Microsoft Office Excel MUI (English) 2010 (Version: 14.0.7015.1000)
Microsoft Office Groove MUI (English) 2010 (Version: 14.0.7015.1000)
Microsoft Office InfoPath MUI (English) 2010 (Version: 14.0.7015.1000)
Microsoft Office Office 32-bit Components 2010 (Version: 14.0.7015.1000)
Microsoft Office OneNote MUI (English) 2010 (Version: 14.0.7015.1000)
Microsoft Office Outlook MUI (English) 2010 (Version: 14.0.7015.1000)
Microsoft Office PowerPoint MUI (English) 2010 (Version: 14.0.7015.1000)
Microsoft Office Professional Plus 2010 (Version: 14.0.7015.1000)
Microsoft Office Proof (English) 2010 (Version: 14.0.7015.1000)
Microsoft Office Proof (French) 2010 (Version: 14.0.7015.1000)
Microsoft Office Proof (Spanish) 2010 (Version: 14.0.7015.1000)
Microsoft Office Proofing (English) 2010 (Version: 14.0.7015.1000)
Microsoft Office Publisher MUI (English) 2010 (Version: 14.0.7015.1000)
Microsoft Office Shared 32-bit MUI (English) 2010 (Version: 14.0.7015.1000)
Microsoft Office Shared MUI (English) 2010 (Version: 14.0.7015.1000)
Microsoft Office Shared Setup Metadata MUI (English) 2010 (Version: 14.0.7015.1000)
Microsoft Office Word MUI (English) 2010 (Version: 14.0.7015.1000)
Microsoft Silverlight (Version: 5.1.20913.0)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.61001)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (Version: 9.0.30729)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.4148 (Version: 9.0.30729.4148)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 (Version: 9.0.30729.6161)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (Version: 9.0.30729)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (Version: 9.0.30729.4148)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (Version: 9.0.30729.6161)
Music Manager
Norton Security Suite (Version: 20.4.0.40)
Notepad++ (Version: 5.9.8)
NVIDIA 3D Vision Controller Driver 320.18 (Version: 320.18)
NVIDIA 3D Vision Driver 320.18 (Version: 320.18)
NVIDIA Control Panel 320.18 (Version: 320.18)
NVIDIA GeForce Experience 1.5 (Version: 1.5)
NVIDIA Graphics Driver 320.18 (Version: 320.18)
NVIDIA HD Audio Driver 1.3.24.2 (Version: 1.3.24.2)
NVIDIA Install Application (Version: 2.1002.124.810)
NVIDIA PhysX (Version: 9.12.1031)
NVIDIA PhysX System Software 9.12.1031 (Version: 9.12.1031)
NVIDIA Stereoscopic 3D Driver (Version: 7.17.13.2018)
NVIDIA Update 4.11.9 (Version: 4.11.9)
NVIDIA Update Components (Version: 4.11.9)
Ontrack EasyRecovery Professional (Version: 6.22.01)
Pandora (Version: 2.0.8)
PDF Settings CS4 (Version: 9.0)
Photoshop Camera Raw (Version: 5.0)
Photoshop Camera Raw_x64 (Version: 5.0)
Pixel Bender Toolkit (Version: 1.0)
Plex Media Server (Version: 0.9.728)
PuTTY version 0.62 (Version: 0.62)
Realtek High Definition Audio Driver (Version: 6.0.1.6363)
Renesas Electronics USB 3.0 Host Controller Driver (Version: 2.0.32.0)
SABnzbd 0.7.12 (Version: 0.7.12)
Service Pack 2 for Microsoft Office 2010 (KB2687455) 64-Bit Edition
Skype™ 6.5 (Version: 6.5.158)
Steam
Suite Shared Configuration CS4 (Version: 1.0)
swMSM (Version: 12.0.0.1)
System Requirements Lab
TeamViewer 7 (Version: 7.0.12799)
theRenamer 7.63
tools-freebsd (Version: 8.8.2.703057)
tools-linux (Version: 8.8.2.703057)
tools-netware (Version: 8.8.2.703057)
tools-solaris (Version: 8.8.2.703057)
tools-windows (Version: 8.8.2.703057)
tools-winPre2k (Version: 8.8.2.703057)
Update for Microsoft .NET Framework 4 Client Profile (KB2468871) (Version: 1)
Update for Microsoft .NET Framework 4 Client Profile (KB2533523) (Version: 1)
Update for Microsoft .NET Framework 4 Client Profile (KB2600217) (Version: 1)
Update for Microsoft .NET Framework 4 Client Profile (KB2836939) (Version: 1)
Update for Microsoft .NET Framework 4 Client Profile (KB2836939v3) (Version: 3)
Update for Microsoft .NET Framework 4 Extended (KB2468871) (Version: 1)
Update for Microsoft .NET Framework 4 Extended (KB2533523) (Version: 1)
Update for Microsoft .NET Framework 4 Extended (KB2600217) (Version: 1)
Update for Microsoft .NET Framework 4 Extended (KB2836939) (Version: 1)
Update for Microsoft .NET Framework 4 Extended (KB2836939v3) (Version: 3)
Update for Microsoft Access 2010 (KB2553446) 64-Bit Edition
Update for Microsoft Filter Pack 2.0 (KB2810071) 64-Bit Edition
Update for Microsoft Office 2010 (KB2494150)
Update for Microsoft Office 2010 (KB2589298) 64-Bit Edition
Update for Microsoft Office 2010 (KB2589352) 64-Bit Edition
Update for Microsoft Office 2010 (KB2589375) 64-Bit Edition
Update for Microsoft Office 2010 (KB2597087) 64-Bit Edition
Update for Microsoft Office 2010 (KB2760598) 64-Bit Edition
Update for Microsoft Office 2010 (KB2760631) 64-Bit Edition
Update for Microsoft Office 2010 (KB2794737) 64-Bit Edition
Update for Microsoft Office 2010 (KB2825640) 64-Bit Edition
Update for Microsoft Office 2010 (KB2826026) 64-Bit Edition
Update for Microsoft Office 2010 (KB2850079) 64-Bit Edition
Update for Microsoft OneNote 2010 (KB2810072) 64-Bit Edition
Update for Microsoft PowerPoint 2010 (KB2553145) 64-Bit Edition
Update for Microsoft Visio Viewer 2010 (KB2810066) 64-Bit Edition
Update for Microsoft Word 2010 (KB2837593) 64-Bit Edition
Use the entry named LeapFrog Connect to uninstall (LeapFrog LeapPad Explorer Plugin)
VirtualCloneDrive
VLC media player 2.0.0 (Version: 2.0.0)
VmciSockets (Version: 9.1.54.1)
VMware vCenter Converter Standalone (Version: 5.0.0.470252)
VMware Workstation (Version: 8.0.3.29699)
Windows Driver Package - Leapfrog (Leapfrog-USBLAN) Net  (09/10/2009 02.03.05.012) (Version: 09/10/2009 02.03.05.012)
Windows Media Player Firefox Plugin (Version: 1.0.0.8)
WinRAR 4.11 (64-bit) (Version: 4.11.0)
 
========================= Devices: ================================
 
 
========================= Memory info: ===================================
 
Percentage of memory in use: 25%
Total physical RAM: 16351.14 MB
Available physical RAM: 12164.45 MB
Total Pagefile: 32700.46 MB
Available Pagefile: 27850.14 MB
Total Virtual: 4095.88 MB
Available Virtual: 3948.59 MB
 
========================= Partitions: =====================================
 
1 Drive c: () (Fixed) (Total:119.14 GB) (Free:9.12 GB) NTFS
3 Drive e: (Media) (Fixed) (Total:931.51 GB) (Free:549.87 GB) NTFS
5 Drive g: (Movies) (Fixed) (Total:931.51 GB) (Free:135.38 GB) NTFS
7 Drive z: (Main) (Fixed) (Total:1863.01 GB) (Free:1808.5 GB) NTFS
 
========================= Users: ========================================
 
User accounts for \\PLAGUE-PC
 
___VMware_Conv_SA___     Administrator            Guest                    
Leanne                   Plague                   UpdatusUser              
 
 
**** End of log ****

 

MBAM:

Malwarebytes Anti-Malware (Trial) 1.75.0.1300
www.malwarebytes.org
 
Database version: v2013.12.12.01
 
Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 11.0.9600.16476
Plague :: PLAGUE-PC [administrator]
 
Protection: Enabled
 
12/12/2013 5:37:27 PM
mbam-log-2013-12-12 (17-37-27).txt
 
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 257157
Time elapsed: 1 minute(s), 30 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 0
(No malicious items detected)
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 0
(No malicious items detected)
 
Files Detected: 0
(No malicious items detected)
 
(end)
 
 
Breaking post here to restart system. Will post rest of results following...


#4 lowvoltage

lowvoltage
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:54 PM

Posted 12 December 2013 - 06:02 PM

Interesting note, after restarting the system WinRAR attempts to extract something to C:\Windows\system32. Ive cancelled it, but havent seen that before.

Here are the rest of the logs:

 

MBAR:

Malwarebytes Anti-Rootkit BETA 1.07.0.1008
www.malwarebytes.org
 
Database version: v2013.12.12.08
 
Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 11.0.9600.16476
Plague :: PLAGUE-PC [administrator]
 
12/12/2013 5:50:51 PM
mbar-log-2013-12-12 (17-50-51).txt
 
Scan type: Quick scan
Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken
Scan options disabled: 
Objects scanned: 284380
Time elapsed: 3 minute(s), 42 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 0
(No malicious items detected)
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 0
(No malicious items detected)
 
Files Detected: 0
(No malicious items detected)
 
Physical Sectors Detected: 0
(No malicious items detected)
 
(end)
 
---------------------------------------
Malwarebytes Anti-Rootkit BETA 1.07.0.1008
 
© Malwarebytes Corporation 2011-2012
 
OS version: 6.1.7601 Windows 7 Service Pack 1 x64
 
Account is Administrative
 
Internet Explorer version: 11.0.9600.16476
 
File system is: NTFS
Disk drives: C:\ DRIVE_FIXED, E:\ DRIVE_FIXED, G:\ DRIVE_FIXED, Z:\ DRIVE_FIXED
CPU speed: 3.411000 GHz
Memory total: 17145413632, free: 13490270208
 
---------------------------------------
Malwarebytes Anti-Rootkit BETA 1.07.0.1008
 
© Malwarebytes Corporation 2011-2012
 
OS version: 6.1.7601 Windows 7 Service Pack 1 x64
 
Account is Administrative
 
Internet Explorer version: 11.0.9600.16476
 
File system is: NTFS
Disk drives: C:\ DRIVE_FIXED, E:\ DRIVE_FIXED, G:\ DRIVE_FIXED, Z:\ DRIVE_FIXED
CPU speed: 3.411000 GHz
Memory total: 17145413632, free: 13526999040
 
Downloaded database version: v2013.12.12.08
Downloaded database version: v2013.10.11.02
=======================================
Initializing...
------------ Kernel report ------------
     12/12/2013 17:50:48
------------ Loaded modules -----------
\SystemRoot\system32\ntoskrnl.exe
\SystemRoot\system32\hal.dll
\SystemRoot\system32\kdcom.dll
\SystemRoot\system32\mcupdate_GenuineIntel.dll
\SystemRoot\system32\PSHED.dll
\SystemRoot\system32\CLFS.SYS
\SystemRoot\system32\CI.dll
\SystemRoot\system32\drivers\Wdf01000.sys
\SystemRoot\system32\drivers\WDFLDR.SYS
\SystemRoot\system32\drivers\ACPI.sys
\SystemRoot\system32\drivers\WMILIB.SYS
\SystemRoot\system32\drivers\msisadrv.sys
\SystemRoot\system32\drivers\pci.sys
\SystemRoot\system32\drivers\vdrvroot.sys
\SystemRoot\System32\drivers\partmgr.sys
\SystemRoot\system32\drivers\volmgr.sys
\SystemRoot\System32\drivers\volmgrx.sys
\SystemRoot\system32\DRIVERS\vmci.sys
\SystemRoot\system32\drivers\pciide.sys
\SystemRoot\system32\drivers\PCIIDEX.SYS
\SystemRoot\System32\drivers\mountmgr.sys
\SystemRoot\system32\drivers\vmbus.sys
\SystemRoot\system32\drivers\winhv.sys
\SystemRoot\system32\DRIVERS\iaStor.sys
\SystemRoot\system32\drivers\atapi.sys
\SystemRoot\system32\drivers\ataport.SYS
\SystemRoot\system32\drivers\msahci.sys
\SystemRoot\system32\drivers\amdxata.sys
\SystemRoot\system32\drivers\fltmgr.sys
\SystemRoot\system32\drivers\N360x64\1404000.028\SYMDS64.SYS
\SystemRoot\system32\drivers\fileinfo.sys
\SystemRoot\system32\drivers\N360x64\1404000.028\SYMEFA64.SYS
\SystemRoot\System32\Drivers\Ntfs.sys
\SystemRoot\System32\Drivers\msrpc.sys
\SystemRoot\System32\Drivers\ksecdd.sys
\SystemRoot\System32\Drivers\cng.sys
\SystemRoot\System32\drivers\pcw.sys
\SystemRoot\System32\Drivers\Fs_Rec.sys
\SystemRoot\system32\drivers\ndis.sys
\SystemRoot\system32\drivers\NETIO.SYS
\SystemRoot\System32\Drivers\ksecpkg.sys
\SystemRoot\System32\drivers\tcpip.sys
\SystemRoot\System32\drivers\fwpkclnt.sys
\SystemRoot\system32\drivers\vmstorfl.sys
\SystemRoot\system32\drivers\volsnap.sys
\SystemRoot\System32\Drivers\spldr.sys
\SystemRoot\System32\drivers\rdyboost.sys
\SystemRoot\System32\Drivers\mup.sys
\SystemRoot\System32\drivers\hwpolicy.sys
\SystemRoot\System32\DRIVERS\fvevol.sys
\SystemRoot\system32\DRIVERS\disk.sys
\SystemRoot\system32\DRIVERS\CLASSPNP.SYS
\SystemRoot\system32\drivers\cdrom.sys
\SystemRoot\system32\drivers\N360x64\1404000.028\ccSetx64.sys
\SystemRoot\system32\drivers\N360x64\1404000.028\Ironx64.SYS
\SystemRoot\System32\Drivers\Null.SYS
\SystemRoot\System32\Drivers\Beep.SYS
\SystemRoot\System32\drivers\vga.sys
\SystemRoot\System32\drivers\VIDEOPRT.SYS
\SystemRoot\System32\drivers\watchdog.sys
\SystemRoot\System32\DRIVERS\RDPCDD.sys
\SystemRoot\system32\drivers\rdpencdd.sys
\SystemRoot\system32\drivers\rdprefmp.sys
\SystemRoot\System32\Drivers\Msfs.SYS
\SystemRoot\System32\Drivers\Npfs.SYS
\SystemRoot\system32\DRIVERS\tdx.sys
\SystemRoot\system32\DRIVERS\TDI.SYS
\SystemRoot\system32\drivers\afd.sys
\SystemRoot\System32\DRIVERS\netbt.sys
\SystemRoot\system32\drivers\ws2ifsl.sys
\SystemRoot\system32\DRIVERS\wfplwf.sys
\SystemRoot\system32\DRIVERS\pacer.sys
\SystemRoot\system32\DRIVERS\netbios.sys
\SystemRoot\System32\Drivers\tosrfcom.sys
\SystemRoot\system32\DRIVERS\wanarp.sys
\SystemRoot\system32\drivers\termdd.sys
\SystemRoot\System32\Drivers\N360x64\1404000.028\SYMNETS.SYS
\??\C:\Windows\system32\Drivers\SYMEVENT64x86.SYS
\SystemRoot\system32\drivers\N360x64\1404000.028\SRTSPX64.SYS
\SystemRoot\system32\DRIVERS\rdbss.sys
\SystemRoot\system32\drivers\nsiproxy.sys
\SystemRoot\system32\drivers\mssmbios.sys
\??\C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\IPSDefs\20131210.001\IDSvia64.sys
\SystemRoot\System32\Drivers\ElbyCDIO.sys
\??\C:\Program Files (x86)\Common Files\Symantec Shared\EENGINE\eeCtrl64.sys
\??\C:\Program Files (x86)\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys
\SystemRoot\System32\drivers\discache.sys
\SystemRoot\system32\drivers\csc.sys
\SystemRoot\System32\Drivers\dfsc.sys
\SystemRoot\system32\DRIVERS\blbdrive.sys
\??\C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\BASHDefs\20131203.001\BHDrvx64.sys
\SystemRoot\SysWow64\drivers\AsUpIO.sys
\SystemRoot\SysWow64\drivers\AsIO.sys
\??\C:\Windows\system32\drivers\AntiLog64.sys
\SystemRoot\system32\DRIVERS\tunnel.sys
\SystemRoot\system32\DRIVERS\nvlddmkm.sys
\SystemRoot\System32\drivers\dxgkrnl.sys
\SystemRoot\System32\drivers\dxgmms1.sys
\SystemRoot\system32\drivers\HDAudBus.sys
\SystemRoot\system32\DRIVERS\HECIx64.sys
\SystemRoot\system32\DRIVERS\e1c62x64.sys
\SystemRoot\system32\drivers\usbehci.sys
\SystemRoot\system32\drivers\USBPORT.SYS
\SystemRoot\system32\DRIVERS\nusb3xhc.sys
\SystemRoot\system32\DRIVERS\USBD.SYS
\SystemRoot\system32\DRIVERS\e1q62x64.sys
\SystemRoot\system32\DRIVERS\ICCWDT.sys
\SystemRoot\system32\drivers\wmiacpi.sys
\SystemRoot\system32\DRIVERS\intelppm.sys
\SystemRoot\system32\drivers\CompositeBus.sys
\SystemRoot\system32\DRIVERS\AgileVpn.sys
\SystemRoot\system32\DRIVERS\rasl2tp.sys
\SystemRoot\system32\DRIVERS\ndistapi.sys
\SystemRoot\system32\DRIVERS\ndiswan.sys
\SystemRoot\system32\DRIVERS\raspppoe.sys
\SystemRoot\system32\DRIVERS\raspptp.sys
\SystemRoot\system32\DRIVERS\rassstp.sys
\SystemRoot\system32\DRIVERS\rdpbus.sys
\SystemRoot\system32\DRIVERS\kbdclass.sys
\SystemRoot\system32\DRIVERS\mouclass.sys
\SystemRoot\system32\DRIVERS\VClone.sys
\SystemRoot\system32\DRIVERS\SCSIPORT.SYS
\SystemRoot\system32\drivers\swenum.sys
\SystemRoot\system32\drivers\ks.sys
\SystemRoot\system32\drivers\umbus.sys
\SystemRoot\system32\DRIVERS\vmnetadapter.sys
\SystemRoot\system32\DRIVERS\VMNET.SYS
\SystemRoot\system32\DRIVERS\usbhub.sys
\SystemRoot\system32\DRIVERS\nusb3hub.sys
\SystemRoot\System32\Drivers\NDProxy.SYS
\SystemRoot\system32\drivers\nvhda64v.sys
\SystemRoot\system32\drivers\portcls.sys
\SystemRoot\system32\drivers\drmk.sys
\SystemRoot\system32\drivers\ksthunk.sys
\SystemRoot\system32\drivers\RTKVHD64.sys
\SystemRoot\system32\DRIVERS\tosporte.sys
\SystemRoot\System32\win32k.sys
\SystemRoot\System32\drivers\Dxapi.sys
\SystemRoot\System32\Drivers\crashdmp.sys
\SystemRoot\System32\Drivers\dump_iaStor.sys
\SystemRoot\System32\Drivers\dump_dumpfve.sys
\SystemRoot\system32\DRIVERS\monitor.sys
\SystemRoot\System32\TSDDD.dll
\SystemRoot\System32\cdd.dll
\SystemRoot\System32\ATMFD.DLL
\SystemRoot\system32\drivers\luafv.sys
\??\C:\Windows\system32\drivers\mbam.sys
\SystemRoot\system32\DRIVERS\vmnetbridge.sys
\SystemRoot\system32\DRIVERS\lltdio.sys
\SystemRoot\system32\DRIVERS\rspndr.sys
\SystemRoot\system32\drivers\HTTP.sys
\SystemRoot\system32\DRIVERS\bowser.sys
\SystemRoot\System32\drivers\mpsdrv.sys
\SystemRoot\system32\DRIVERS\mrxsmb.sys
\SystemRoot\system32\DRIVERS\usbccgp.sys
\SystemRoot\system32\DRIVERS\mrxsmb10.sys
\SystemRoot\system32\DRIVERS\mrxsmb20.sys
\SystemRoot\system32\drivers\hidusb.sys
\SystemRoot\system32\drivers\HIDCLASS.SYS
\SystemRoot\system32\drivers\HIDPARSE.SYS
\??\C:\Windows\system32\drivers\hcmon.sys
\??\C:\Windows\system32\drivers\vmx86.sys
\SystemRoot\system32\DRIVERS\kbdhid.sys
\SystemRoot\System32\Drivers\adfs.SYS
\SystemRoot\system32\DRIVERS\KeyCrypt64.sys
\SystemRoot\system32\DRIVERS\mouhid.sys
\SystemRoot\system32\DRIVERS\tosrfusb.sys
\SystemRoot\System32\Drivers\nx6000.sys
\SystemRoot\System32\Drivers\usbvideo.sys
\SystemRoot\system32\drivers\usbaudio.sys
\??\C:\Windows\system32\drivers\cpuz135_x64.sys
\SystemRoot\system32\drivers\usbscan.sys
\SystemRoot\system32\DRIVERS\usbprint.sys
\SystemRoot\system32\DRIVERS\USBSTOR.SYS
\SystemRoot\system32\drivers\peauth.sys
\SystemRoot\System32\Drivers\secdrv.SYS
\SystemRoot\System32\DRIVERS\srvnet.sys
\SystemRoot\System32\drivers\tcpipreg.sys
\??\C:\Windows\system32\drivers\vmnetuserif.sys
\SystemRoot\SysWOW64\drivers\vstor2-mntapi10-shared.sys
\SystemRoot\System32\DRIVERS\srv2.sys
\SystemRoot\System32\DRIVERS\srv.sys
\SystemRoot\system32\drivers\WudfPf.sys
\SystemRoot\system32\DRIVERS\WUDFRd.sys
\SystemRoot\System32\Drivers\N360x64\1404000.028\SRTSP64.SYS
\??\C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\VirusDefs\20131211.032\EX64.SYS
\??\C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\VirusDefs\20131211.032\ENG64.SYS
\SystemRoot\system32\DRIVERS\asyncmac.sys
\??\C:\Windows\system32\drivers\mbamchameleon.sys
\??\C:\Windows\system32\drivers\MBAMSwissArmy.sys
\Windows\System32\ntdll.dll
\Windows\System32\smss.exe
\Windows\System32\apisetschema.dll
\Windows\System32\autochk.exe
\Windows\System32\shlwapi.dll
\Windows\System32\ws2_32.dll
\Windows\System32\nsi.dll
\Windows\System32\shell32.dll
\Windows\System32\setupapi.dll
\Windows\System32\advapi32.dll
\Windows\System32\iertutil.dll
\Windows\System32\normaliz.dll
\Windows\System32\msctf.dll
\Windows\System32\wininet.dll
\Windows\System32\Wldap32.dll
\Windows\System32\imagehlp.dll
\Windows\System32\kernel32.dll
\Windows\System32\ole32.dll
\Windows\System32\imm32.dll
\Windows\System32\oleaut32.dll
\Windows\System32\gdi32.dll
\Windows\System32\user32.dll
\Windows\System32\usp10.dll
\Windows\System32\sechost.dll
\Windows\System32\msvcrt.dll
\Windows\System32\rpcrt4.dll
\Windows\System32\difxapi.dll
\Windows\System32\psapi.dll
\Windows\System32\clbcatq.dll
\Windows\System32\lpk.dll
\Windows\System32\comdlg32.dll
\Windows\System32\urlmon.dll
\Windows\System32\api-ms-win-downlevel-ole32-l1-1-0.dll
\Windows\System32\api-ms-win-downlevel-user32-l1-1-0.dll
\Windows\System32\cfgmgr32.dll
\Windows\System32\api-ms-win-downlevel-normaliz-l1-1-0.dll
\Windows\System32\KernelBase.dll
\Windows\System32\comctl32.dll
\Windows\System32\devobj.dll
\Windows\System32\api-ms-win-downlevel-shlwapi-l1-1-0.dll
\Windows\System32\api-ms-win-downlevel-version-l1-1-0.dll
\Windows\System32\api-ms-win-downlevel-advapi32-l1-1-0.dll
\Windows\System32\crypt32.dll
\Windows\System32\wintrust.dll
\Windows\System32\msasn1.dll
\Windows\SysWOW64\normaliz.dll
----------- End -----------
Done!
<<<1>>>
Upper Device Name: \Device\Harddisk4\DR4
Upper Device Object: 0xfffffa80111853d0
Upper Device Driver Name: \Driver\Disk\
Lower Device Name: \Device\000000c5\
Lower Device Object: 0xfffffa8011181660
Lower Device Driver Name: \Driver\USBSTOR\
<<<1>>>
Upper Device Name: \Device\Harddisk3\DR3
Upper Device Object: 0xfffffa800f2c7060
Upper Device Driver Name: \Driver\Disk\
Lower Device Name: \Device\Ide\IAAStorageDevice-4\
Lower Device Object: 0xfffffa800cdf7050
Lower Device Driver Name: \Driver\iaStor\
<<<1>>>
Upper Device Name: \Device\Harddisk2\DR2
Upper Device Object: 0xfffffa800f2c6060
Upper Device Driver Name: \Driver\Disk\
Lower Device Name: \Device\Ide\IAAStorageDevice-3\
Lower Device Object: 0xfffffa800cdf3050
Lower Device Driver Name: \Driver\iaStor\
<<<1>>>
Upper Device Name: \Device\Harddisk1\DR1
Upper Device Object: 0xfffffa800f2c5060
Upper Device Driver Name: \Driver\Disk\
Lower Device Name: \Device\Ide\IAAStorageDevice-2\
Lower Device Object: 0xfffffa800cdef050
Lower Device Driver Name: \Driver\iaStor\
<<<1>>>
Upper Device Name: \Device\Harddisk0\DR0
Upper Device Object: 0xfffffa800f2a7790
Upper Device Driver Name: \Driver\Disk\
Lower Device Name: \Device\Ide\IAAStorageDevice-1\
Lower Device Object: 0xfffffa800cdeb050
Lower Device Driver Name: \Driver\iaStor\
<<<2>>>
Physical Sector Size: 512
Drive: 0, DevicePointer: 0xfffffa800f2a7790, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
--------- Disk Stack ------
DevicePointer: 0xfffffa800f2a72c0, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xfffffa800f2a7790, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
DevicePointer: 0xfffffa800cdece40, DeviceName: Unknown, DriverName: \Driver\ACPI\
DevicePointer: 0xfffffa800cdeb050, DeviceName: \Device\Ide\IAAStorageDevice-1\, DriverName: \Driver\iaStor\
------------ End ----------
Alternate DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
Upper DeviceData: 0x0, 0x0, 0x0
Lower DeviceData: 0x0, 0x0, 0x0
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Scanning drivers directory: C:\WINDOWS\SYSTEM32\drivers...
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Done!
Drive 0
Scanning MBR on drive 0...
Inspecting partition table:
MBR Signature: 55AA
Disk Signature: 28209544
 
Partition information:
 
    Partition 0 type is Primary (0x7)
    Partition is ACTIVE.
    Partition starts at LBA: 2048  Numsec = 204800
    Partition file system is NTFS
    Partition is bootable
 
    Partition 1 type is Primary (0x7)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 206848  Numsec = 249860096
 
    Partition 2 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
    Partition 3 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
Disk Size: 128035676160 bytes
Sector size: 512 bytes
 
Scanning physical sectors of unpartitioned space on drive 0 (1-2047-250049680-250069680)...
Done!
Physical Sector Size: 512
Drive: 1, DevicePointer: 0xfffffa800f2c5060, DeviceName: \Device\Harddisk1\DR1\, DriverName: \Driver\Disk\
--------- Disk Stack ------
DevicePointer: 0xfffffa800f2c5b90, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xfffffa800f2c5060, DeviceName: \Device\Harddisk1\DR1\, DriverName: \Driver\Disk\
DevicePointer: 0xfffffa800cde3db0, DeviceName: Unknown, DriverName: \Driver\ACPI\
DevicePointer: 0xfffffa800cdef050, DeviceName: \Device\Ide\IAAStorageDevice-2\, DriverName: \Driver\iaStor\
------------ End ----------
Alternate DeviceName: \Device\Harddisk1\DR1\, DriverName: \Driver\Disk\
Upper DeviceData: 0x0, 0x0, 0x0
Lower DeviceData: 0x0, 0x0, 0x0
Drive 1
Scanning MBR on drive 1...
Inspecting partition table:
MBR Signature: 55AA
Disk Signature: 5A314AE2
 
Partition information:
 
    Partition 0 type is Primary (0x7)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 2048  Numsec = 3907024896
 
    Partition 1 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
    Partition 2 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
    Partition 3 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
Disk Size: 2000398934016 bytes
Sector size: 512 bytes
 
Done!
Physical Sector Size: 512
Drive: 2, DevicePointer: 0xfffffa800f2c6060, DeviceName: \Device\Harddisk2\DR2\, DriverName: \Driver\Disk\
--------- Disk Stack ------
DevicePointer: 0xfffffa800f2c6b90, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xfffffa800f2c6060, DeviceName: \Device\Harddisk2\DR2\, DriverName: \Driver\Disk\
DevicePointer: 0xfffffa800cde84b0, DeviceName: Unknown, DriverName: \Driver\ACPI\
DevicePointer: 0xfffffa800cdf3050, DeviceName: \Device\Ide\IAAStorageDevice-3\, DriverName: \Driver\iaStor\
------------ End ----------
Alternate DeviceName: \Device\Harddisk2\DR2\, DriverName: \Driver\Disk\
Upper DeviceData: 0x0, 0x0, 0x0
Lower DeviceData: 0x0, 0x0, 0x0
Drive 2
Scanning MBR on drive 2...
Inspecting partition table:
MBR Signature: 55AA
Disk Signature: 7CF22337
 
Partition information:
 
    Partition 0 type is Primary (0x7)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 2048  Numsec = 1953519616
 
    Partition 1 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
    Partition 2 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
    Partition 3 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
Disk Size: 1000204886016 bytes
Sector size: 512 bytes
 
Done!
Physical Sector Size: 512
Drive: 3, DevicePointer: 0xfffffa800f2c7060, DeviceName: \Device\Harddisk3\DR3\, DriverName: \Driver\Disk\
--------- Disk Stack ------
DevicePointer: 0xfffffa800f2c7b90, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xfffffa800f2c7060, DeviceName: \Device\Harddisk3\DR3\, DriverName: \Driver\Disk\
DevicePointer: 0xfffffa800cdecc40, DeviceName: Unknown, DriverName: \Driver\ACPI\
DevicePointer: 0xfffffa800cdf7050, DeviceName: \Device\Ide\IAAStorageDevice-4\, DriverName: \Driver\iaStor\
------------ End ----------
Alternate DeviceName: \Device\Harddisk3\DR3\, DriverName: \Driver\Disk\
Upper DeviceData: 0x0, 0x0, 0x0
Lower DeviceData: 0x0, 0x0, 0x0
Drive 3
Scanning MBR on drive 3...
Inspecting partition table:
MBR Signature: 55AA
Disk Signature: DE241B0A
 
Partition information:
 
    Partition 0 type is Primary (0x7)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 2048  Numsec = 1953519616
 
    Partition 1 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
    Partition 2 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
    Partition 3 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
Disk Size: 1000203804160 bytes
Sector size: 512 bytes
 
Done!
Physical Sector Size: 0
Drive: 4, DevicePointer: 0xfffffa80111853d0, DeviceName: \Device\Harddisk4\DR4\, DriverName: \Driver\Disk\
--------- Disk Stack ------
DevicePointer: 0xfffffa801114d040, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xfffffa80111853d0, DeviceName: \Device\Harddisk4\DR4\, DriverName: \Driver\Disk\
DevicePointer: 0xfffffa8011181660, DeviceName: \Device\000000c5\, DriverName: \Driver\USBSTOR\
------------ End ----------
Scan finished
=======================================
 
 
Removal queue found; removal started
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR_0_i.mbam...
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\Bootstrap_0_0_2048_i.mbam...
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR_0_r.mbam...
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR_1_i.mbam...
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR_1_r.mbam...
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR_2_i.mbam...
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR_2_r.mbam...
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR_3_i.mbam...
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR_3_r.mbam...
Removal finished
 
rKill:
Rkill 2.6.3 by Lawrence Abrams (Grinler)
Copyright 2008-2013 BleepingComputer.com
More Information about Rkill can be found at this link:
 
Program started at: 12/12/2013 06:00:50 PM in x64 mode.
Windows Version: Windows 7 Professional Service Pack 1
 
Checking for Windows services to stop:
 
 * No malware services found to stop.
 
Checking for processes to terminate:
 
 * C:\Users\Plague\AppData\Local\Programs\Google\MusicManager\MusicManager.exe (PID: 4048) [UP-HEUR]
 
1 proccess terminated!
 
Checking Registry for malware related settings:
 
 * No issues found in the Registry.
 
Resetting .EXE, .COM, & .BAT associations in the Windows Registry.
  * HKLM\Software\Classes\exefile\shell\runas\command\\IsolatedCommand was changed. It was reset to "%1" %*!
 
 
Performing miscellaneous checks:
 
 * Windows Defender Disabled
 
   [HKLM\SOFTWARE\Microsoft\Windows Defender]
   "DisableAntiSpyware" = dword:00000001
 
Checking Windows Service Integrity: 
 
 * Windows Defender (WinDefend) is not Running.
   Startup Type set to: Manual
 
Searching for Missing Digital Signatures: 
 
 * No issues found.
 
Checking HOSTS File: 
 
 * No issues found.
 
Program finished at: 12/12/2013 06:01:22 PM
Execution time: 0 hours(s), 0 minute(s), and 31 seconds(s)
 


#5 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,696 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:08:54 PM

Posted 12 December 2013 - 06:04 PM

What is the exact message from Norton?


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#6 lowvoltage

lowvoltage
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:54 PM

Posted 12 December 2013 - 06:13 PM

Here is the recent log from Norton
 
Category: Scan Results
Date & Time,Risk,Activity,Status,Scan Time (d:h:m:s),Total items scanned,Files & Directories,Registry Entries,Processes & Start-Up Items,Network & Browser Items,Other,Trusted Files,Skipped Files,Total Security Risks Detected,Total Security Risks Resolved,Total Security Risks Requiring Attention
12/6/2013 4:06:43 PM,Info,Quick Scan results,Completed,0:00:00:43,"6,003","2,890",760,"1,696",648,9,638,5,0,0,0
12/9/2013 8:41:05 PM,Info,Quick Scan results,Completed,0:00:01:01,"5,965","2,889",760,"1,657",650,9,635,0,0,0,0
12/10/2013 3:06:37 PM,Info,Quick Scan results,Completed,0:00:00:40,"6,120","2,890",760,"1,811",650,9,637,0,0,0,0
12/9/2013 2:13:43 PM,Info,Quick Scan results,Completed,0:00:01:04,"6,044","2,889",760,"1,736",650,9,633,0,0,0,0
12/12/2013 4:55:01 AM,Info,Quick Scan results,Completed,0:00:00:52,"5,254","2,415",776,"1,469",585,9,620,0,0,0,0
12/11/2013 4:12:10 AM,Info,Quick Scan results,Completed,0:00:01:01,"5,988","2,891",760,"1,678",650,9,638,0,0,0,0
12/7/2013 5:51:45 PM,Info,Quick Scan results,Completed,0:00:00:44,"6,006","2,891",760,"1,698",648,9,639,0,0,0,0
12/6/2013 4:13:13 AM,Info,Quick Scan results,Completed,0:00:00:43,"6,017","2,890",760,"1,710",648,9,638,0,0,0,0
12/6/2013 11:43:46 PM,Info,Quick Scan results,Completed,0:00:00:51,"6,007","2,890",760,"1,700",648,9,638,0,0,0,0
12/10/2013 9:10:01 PM,Info,Quick Scan results,Completed,0:00:00:54,"5,989","2,891",760,"1,679",650,9,638,0,0,0,0
12/11/2013 10:51:12 PM,Info,Quick Scan results,Completed,0:00:00:48,"6,057","2,894",764,"1,740",650,9,640,0,0,0,0
12/8/2013 7:05:07 PM,Info,Quick Scan results,Completed,0:00:00:57,"6,033","2,892",760,"1,724",648,9,640,0,0,0,0
12/5/2013 9:09:52 PM,Info,Quick Scan results,Completed,0:00:00:42,"6,017","2,890",760,"1,710",648,9,638,0,0,0,0
12/11/2013 2:50:45 PM,Info,Quick Scan results,Completed,0:00:01:04,"6,100","2,891",760,"1,790",650,9,638,0,0,0,0
 
 
Category: Firewall - Network and Connections
Date & Time,Risk,Activity,Status,Recommended Action,Category,Gateway Physical Address,Subnet Identifier
12/12/2013 5:43:21 PM,Info,"Protecting your connection to a newly detected network on adapter \"Software Loopback Interface 1\" (IP address: 127.0.0.1).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 5:43:21 PM,Info,"Protecting your connection to a newly detected network on adapter \"Software Loopback Interface 1\" (IP address: ::1).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 5:43:21 PM,Info,"Protecting your connection to a newly detected network on adapter \"VMware Virtual Ethernet Adapter for VMnet8\" (IP address: fe80::4974:60a5:6bf8:220b%17).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 5:43:21 PM,Info,"Protecting your connection to a newly detected network on adapter \"Intel® 82583V Gigabit Network Connection\" (IP address: fe80::30b2:68eb:6727:2a11%13).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 5:43:21 PM,Info,"Protecting your connection to a newly detected network on adapter \"VMware Virtual Ethernet Adapter for VMnet1\" (IP address: fe80::8176:eec2:1165:8177%16).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 5:43:27 PM,Info,"Protecting your connection to a newly detected network on adapter \"VMware Virtual Ethernet Adapter for VMnet8\" (IP address: 169.254.34.11).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 5:43:27 PM,Info,"Protecting your connection to a newly detected network on adapter \"Intel® 82583V Gigabit Network Connection\" (IP address: 169.254.42.17).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 5:43:27 PM,Info,"Protecting your connection to a newly detected network on adapter \"VMware Virtual Ethernet Adapter for VMnet1\" (IP address: 169.254.129.119).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 5:43:32 PM,Info,"IP address has disappeared from adapter Intel® 82583V Gigabit Network Connection and is no longer being protected (IP address: 169.254.42.17).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 5:43:32 PM,Info,"Protecting your connection to a newly detected network on adapter \"Intel® 82583V Gigabit Network Connection\" (IP address: 10.1.88.145).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 5:44:50 PM,Info,Connected to a shared network. (58 6D 8F 78 44 52),Shared,No Action Required,,58 6D 8F 78 44 52,
12/12/2013 5:44:50 PM,Info,Connected to a protected network. (169.254.0.0/255.255.0.0),Protected,No Action Required,,,169.254.0.0/255.255.0.0
12/12/2013 5:44:50 PM,Info,Connected to a protected network. (169.254.0.0/255.255.0.0),Protected,No Action Required,,,169.254.0.0/255.255.0.0
12/12/2013 5:44:50 PM,Info,Connected to a protected network. (127.0.0.0/255.0.0.0),Protected,No Action Required,,,127.0.0.0/255.0.0.0
12/12/2013 3:17:58 AM,Info,"Protecting your connection to a newly detected network on adapter \"Software Loopback Interface 1\" (IP address: 127.0.0.1).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 3:17:58 AM,Info,"Protecting your connection to a newly detected network on adapter \"Software Loopback Interface 1\" (IP address: ::1).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 3:17:58 AM,Info,"Protecting your connection to a newly detected network on adapter \"VMware Virtual Ethernet Adapter for VMnet8\" (IP address: fe80::4974:60a5:6bf8:220b%17).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 3:17:58 AM,Info,"Protecting your connection to a newly detected network on adapter \"Intel® 82583V Gigabit Network Connection\" (IP address: fe80::30b2:68eb:6727:2a11%13).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 3:17:58 AM,Info,"Protecting your connection to a newly detected network on adapter \"VMware Virtual Ethernet Adapter for VMnet1\" (IP address: fe80::8176:eec2:1165:8177%16).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 3:18:04 AM,Info,"Protecting your connection to a newly detected network on adapter \"VMware Virtual Ethernet Adapter for VMnet8\" (IP address: 169.254.34.11).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 3:18:04 AM,Info,"Protecting your connection to a newly detected network on adapter \"Intel® 82583V Gigabit Network Connection\" (IP address: 169.254.42.17).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 3:18:04 AM,Info,"Protecting your connection to a newly detected network on adapter \"VMware Virtual Ethernet Adapter for VMnet1\" (IP address: 169.254.129.119).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 3:18:09 AM,Info,"IP address has disappeared from adapter Intel® 82583V Gigabit Network Connection and is no longer being protected (IP address: 169.254.42.17).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 3:18:09 AM,Info,"Protecting your connection to a newly detected network on adapter \"Intel® 82583V Gigabit Network Connection\" (IP address: 10.1.88.145).",Detected,No Action Required,Firewall - Network and Connections,,
12/12/2013 3:19:15 AM,Info,Connected to a shared network. (58 6D 8F 78 44 52),Shared,No Action Required,,58 6D 8F 78 44 52,
12/12/2013 3:19:15 AM,Info,Connected to a protected network. (169.254.0.0/255.255.0.0),Protected,No Action Required,,,169.254.0.0/255.255.0.0
12/12/2013 3:19:15 AM,Info,Connected to a protected network. (169.254.0.0/255.255.0.0),Protected,No Action Required,,,169.254.0.0/255.255.0.0
12/12/2013 3:19:15 AM,Info,Connected to a protected network. (127.0.0.0/255.0.0.0),Protected,No Action Required,,,127.0.0.0/255.0.0.0
 
 
Category: Firewall - Activities
Date & Time,Risk,Activity,Status,Recommended Action,Category,Program Name,Program Path,Default Action,Action Taken,Local Computer,Traffic Description
12/12/2013 5:23:58 PM,Info,Firewall configuration updated: 141 rules.,Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 5:23:58 PM,Info,You allowed Notepad++ : a free (GNU) source code editor to access your network resources.,Allowed,No Action Required,,Notepad++ : a free (GNU) source code editor,C:\Program Files (x86)\Notepad++\notepad++.exe,No Action Required,Allow,"PLAGUE-PC (10.1.88.145), 53263","Outbound TCP, www-http"
12/12/2013 5:34:46 PM,Info,Firewall configuration updated: 142 rules.,Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 5:34:46 PM,Info,You allowed nslookup to access your network resources.,Allowed,No Action Required,,nslookup,C:\Windows\SysWOW64\nslookup.exe,No Action Required,Allow,"PLAGUE-PC (10.1.88.145), 56852","Outbound UDP, Port 53"
12/12/2013 5:42:24 PM,Info,No user is logged in.  ,Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 5:43:15 PM,Info,Firewall has been enabled.  ,Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 5:43:15 PM,Info,Firewall configuration updated: 142 rules.,Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 5:44:47 PM,Info,"Firewall setting \"AlertThreadEnable\" changed.",Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 5:44:47 PM,Info,Firewall configuration updated: 143 rules.,Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 5:43:26 PM,Info,You allowed Services and Controller app to access your network resources.,Allowed,No Action Required,,Services and Controller app,C:\Windows\System32\services.exe,No Action Required,Allow,"0.0.0.0, 49155","Inbound TCP, Port 49155"
12/12/2013 5:43:26 PM,Info,You allowed Services and Controller app to access your network resources.,Allowed,No Action Required,,Services and Controller app,C:\Windows\System32\services.exe,No Action Required,Allow,"::0, 49155","Inbound TCP, Port 49155"
12/12/2013 5:44:47 PM,Info,Firewall configuration updated: 144 rules.,Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 5:43:32 PM,Info,You allowed Local Security Authority Process to access your network resources.,Allowed,No Action Required,,Local Security Authority Process,C:\Windows\System32\lsass.exe,No Action Required,Allow,"::0, 49163","Inbound TCP, Port 49163"
12/12/2013 5:43:32 PM,Info,You allowed Local Security Authority Process to access your network resources.,Allowed,No Action Required,,Local Security Authority Process,C:\Windows\System32\lsass.exe,No Action Required,Allow,"0.0.0.0, 49163","Inbound TCP, Port 49163"
12/12/2013 5:44:47 PM,Info,User logged in.  ,Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 5:49:41 PM,Info,Firewall configuration updated: 146 rules.,Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 5:49:40 PM,Info,Firewall rules were automatically created for Malwarebytes Anti-Rootkit.,Protected,No Action Required,,Malwarebytes Anti-Rootkit,C:\Users\Plague\Desktop\mbar\mbar.exe,No Action Required,Automatically create rules,"PLAGUE-PC (10.1.88.145), 49323","Outbound TCP, https"
12/12/2013 5:49:46 PM,Info,Firewall configuration updated: 146 rules.,Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 5:49:46 PM,Info,Firewall rules were automatically created for Malwarebytes Anti-Rootkit.,Protected,No Action Required,,Malwarebytes Anti-Rootkit,C:\Users\Plague\Desktop\mbar\mbar.exe,No Action Required,Automatically create rules,"PLAGUE-PC (10.1.88.145), 49326","Outbound TCP, www-http"
12/12/2013 6:00:55 PM,Info,Firewall configuration updated: 148 rules.,Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 6:00:55 PM,Info,Firewall rules were automatically created for rkill64.,Protected,No Action Required,,rkill64,C:\Users\Plague\Desktop\rkill64.exe,No Action Required,Automatically create rules,"PLAGUE-PC (10.1.88.145), 49396","Outbound TCP, www-http"
12/12/2013 3:17:52 AM,Info,Firewall configuration updated: 140 rules.,Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 3:19:11 AM,Info,"Firewall setting \"AlertThreadEnable\" changed.",Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 3:19:12 AM,Info,Firewall configuration updated: 141 rules.,Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 3:18:09 AM,Info,You allowed Services and Controller app to access your network resources.,Allowed,No Action Required,,Services and Controller app,C:\Windows\System32\services.exe,No Action Required,Allow,"0.0.0.0, 49155","Inbound TCP, Port 49155"
12/12/2013 3:18:09 AM,Info,You allowed Services and Controller app to access your network resources.,Allowed,No Action Required,,Services and Controller app,C:\Windows\System32\services.exe,No Action Required,Allow,"::0, 49155","Inbound TCP, Port 49155"
12/12/2013 3:19:12 AM,Info,Firewall configuration updated: 142 rules.,Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 3:18:14 AM,Info,You allowed Local Security Authority Process to access your network resources.,Allowed,No Action Required,,Local Security Authority Process,C:\Windows\System32\lsass.exe,No Action Required,Allow,"0.0.0.0, 49157","Inbound TCP, Port 49157"
12/12/2013 3:18:14 AM,Info,You allowed Local Security Authority Process to access your network resources.,Allowed,No Action Required,,Local Security Authority Process,C:\Windows\System32\lsass.exe,No Action Required,Allow,"::0, 49157","Inbound TCP, Port 49157"
12/12/2013 4:55:56 AM,Info,Firewall configuration updated: 140 rules.,Detected,No Action Required,Firewall - Activities,,,,,,
12/12/2013 7:14:21 AM,Info,User logged in.  ,Detected,No Action Required,Firewall - Activities,,,,,,
 
 
Category: Intrusion Prevention
Date & Time,Risk,Activity,Status,Recommended Action,IPS Alert Name,Default Action,Action Taken,Attacking Computer,Attacker URL,Destination Address,Source Address,Traffic Description,Category
12/12/2013 8:41:46 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50017)",69.197.18.179,"TCP, www-http",
12/12/2013 8:47:49 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50038)",69.197.18.178,"TCP, www-http",
12/12/2013 8:48:49 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50040)",69.197.18.178,"TCP, www-http",
12/12/2013 8:49:49 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50045)",69.197.18.178,"TCP, www-http",
12/12/2013 8:50:49 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50048)",69.197.18.179,"TCP, www-http",
12/12/2013 8:51:50 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50050)",69.197.18.179,"TCP, www-http",
12/12/2013 8:52:50 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50052)",69.197.18.179,"TCP, www-http",
12/12/2013 8:58:53 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50075)",69.197.18.178,"TCP, www-http",
12/12/2013 8:59:53 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50080)",69.197.18.178,"TCP, www-http",
12/12/2013 9:00:53 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50087)",69.197.18.178,"TCP, www-http",
12/12/2013 9:01:53 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50089)",69.197.18.179,"TCP, www-http",
12/12/2013 9:02:53 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50091)",69.197.18.179,"TCP, www-http",
12/12/2013 9:03:54 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50093)",69.197.18.179,"TCP, www-http",
12/12/2013 9:09:57 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50115)",69.197.18.178,"TCP, www-http",
12/12/2013 9:10:57 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50118)",69.197.18.178,"TCP, www-http",
12/12/2013 9:11:57 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50120)",69.197.18.178,"TCP, www-http",
12/12/2013 9:12:57 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50122)",69.197.18.179,"TCP, www-http",
12/12/2013 9:13:57 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50126)",69.197.18.179,"TCP, www-http",
12/12/2013 9:14:57 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50133)",69.197.18.179,"TCP, www-http",
12/12/2013 9:21:01 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50163)",69.197.18.178,"TCP, www-http",
12/12/2013 9:22:01 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50165)",69.197.18.178,"TCP, www-http",
12/12/2013 9:23:01 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50167)",69.197.18.178,"TCP, www-http",
12/12/2013 9:24:01 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50169)",69.197.18.179,"TCP, www-http",
12/12/2013 9:25:01 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50174)",69.197.18.179,"TCP, www-http",
12/12/2013 9:26:01 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50181)",69.197.18.179,"TCP, www-http",
12/12/2013 9:32:05 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50198)",69.197.18.178,"TCP, www-http",
12/12/2013 9:33:05 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50200)",69.197.18.178,"TCP, www-http",
12/12/2013 9:34:05 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50202)",69.197.18.178,"TCP, www-http",
12/12/2013 9:43:08 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50235)",69.197.18.178,"TCP, www-http",
12/12/2013 9:44:08 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50237)",69.197.18.178,"TCP, www-http",
12/12/2013 9:45:08 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50242)",69.197.18.178,"TCP, www-http",
12/12/2013 8:29:42 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 49977)",69.197.18.179,"TCP, www-http",
12/12/2013 8:30:42 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 49980)",69.197.18.179,"TCP, www-http",
12/12/2013 8:36:45 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 49999)",69.197.18.178,"TCP, www-http",
12/12/2013 8:37:45 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50001)",69.197.18.178,"TCP, www-http",
12/12/2013 8:38:45 AM,High,An intrusion attempt by 69.197.18.178 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.178, 80",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50003)",69.197.18.178,"TCP, www-http",
12/12/2013 8:39:45 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50008)",69.197.18.179,"TCP, www-http",
12/12/2013 8:40:46 AM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 50015)",69.197.18.179,"TCP, www-http",
12/12/2013 5:44:47 PM,Info,Intrusion Prevention is monitoring 3133 signatures. Driver version: 12.0.3.2,Detected,No Action Required,,No Action Required,No Action Required,,,,,,Intrusion Prevention
12/12/2013 5:44:47 PM,Info,Intrusion Prevention has been enabled,Detected,No Action Required,,No Action Required,No Action Required,,,,,,Intrusion Prevention
12/12/2013 5:44:47 PM,Info,Intrusion Prevention Engine version: 6.0.0.265 Definitions Set version: 20131210.001,Detected,No Action Required,,No Action Required,No Action Required,,,,,,Intrusion Prevention
 
 
Category: Download Insight
Date & Time,Risk,Activity,Status,Path - Filename
12/11/2013 5:23:28 PM,Low,Download Insight detected launch of plex-media-server-0.9.814.263-139ddbc-en-us.exe,Blocked,c:\users\plague\downloads\plex-media-server-0.9.814.263-139ddbc-en-us.exe
12/11/2013 5:23:09 PM,Low,Download Insight analyzed Plex-Media-Server-0.9.814.263-139ddbc-en-US.exe,Access allowed,c:\Users\Plague\Downloads\Plex-Media-Server-0.9.814.263-139ddbc-en-US.exe
12/11/2013 5:11:29 PM,Info,Download Insight detected launch of stinger32.exe,Access allowed,c:\users\plague\downloads\stinger32.exe
12/11/2013 5:17:24 PM,Info,Download Insight detected launch of mbam-setup-1.75.0.1300.exe,Access allowed,c:\users\plague\downloads\mbam-setup-1.75.0.1300.exe
12/11/2013 5:32:02 PM,Info,Download Insight detected launch of hijackthis.exe,Access allowed,c:\users\plague\downloads\hijackthis.exe
12/12/2013 5:22:29 PM,Info,Download Insight detected launch of securitycheck.exe,Access allowed,c:\users\plague\desktop\securitycheck.exe
12/12/2013 5:32:08 PM,Info,Download Insight detected launch of fss.exe,Access allowed,c:\users\plague\desktop\fss.exe
12/12/2013 5:34:11 PM,Info,Download Insight detected launch of minitoolbox.exe,Access allowed,c:\users\plague\desktop\minitoolbox.exe
12/12/2013 5:49:10 PM,Info,Download Insight detected launch of mbar-1.07.0.1008.exe,Access allowed,c:\users\plague\desktop\mbar-1.07.0.1008.exe
12/12/2013 6:00:50 PM,Info,Download Insight detected launch of rkill.exe,Access allowed,c:\users\plague\desktop\rkill.exe
12/11/2013 5:10:59 PM,Info,Download Insight analyzed stinger32.exe,Access allowed,c:\Users\Plague\Downloads\stinger32.exe
12/11/2013 5:16:53 PM,Info,Download Insight analyzed HijackThis.exe,Access allowed,c:\Users\Plague\Downloads\HijackThis.exe
12/11/2013 5:17:22 PM,Info,Download Insight analyzed mbam-setup-1.75.0.1300.exe,Access allowed,c:\Users\Plague\Downloads\mbam-setup-1.75.0.1300.exe
12/12/2013 5:22:07 PM,Info,Download Insight analyzed SecurityCheck.exe,Access allowed,c:\Users\Plague\Downloads\SecurityCheck.exe
12/12/2013 5:32:08 PM,Info,Download Insight analyzed FSS.exe,Access allowed,c:\Users\Plague\Desktop\FSS.exe
12/12/2013 5:33:59 PM,Info,Download Insight analyzed MiniToolBox.exe,Access allowed,c:\Users\Plague\Downloads\MiniToolBox.exe
12/12/2013 5:48:46 PM,Info,Download Insight analyzed mbar-1.07.0.1008.exe,Access allowed,c:\Users\Plague\Downloads\mbar-1.07.0.1008.exe
12/12/2013 5:58:36 PM,Info,Download Insight analyzed rkill.exe,Access allowed,c:\Users\Plague\Downloads\rkill.exe
 
 
Category: AntiSpam
Date & Time,Risk,Activity,Status,Recommended Action
12/12/2013 4:53:49 AM,Info,AntiSpam definitions version 20131212.004 downloaded,Detected,No action required
 
 
Category: Norton Product Tamper Protection
Date & Time,Risk,Activity,Status,Recommended Action,Date,Actor,Actor PID,Target,Target PID,Action,Reaction,Terminal Session
12/11/2013 5:12:24 PM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/11/2013 5:12:24 PM,C:\USERS\PLAGUE\DOWNLOADS\STINGER32.EXE,14252,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,2124,Access Process Data,Unauthorized access blocked,1
12/11/2013 5:19:22 PM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/11/2013 5:19:22 PM,C:\PROGRAM FILES (X86)\MALWAREBYTES' ANTI-MALWARE\MBAM.EXE,11812,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,2124,Access Process Data,Unauthorized access blocked,1
12/11/2013 5:22:35 PM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/11/2013 5:22:35 PM,C:\WINDOWS\SYSWOW64\WBEM\WMIPRVSE.EXE,1584,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,2184,Access Process Data,Unauthorized access blocked,
12/11/2013 5:22:35 PM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/11/2013 5:22:35 PM,C:\WINDOWS\SYSWOW64\WBEM\WMIPRVSE.EXE,1584,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,2184,Access Process Data,Unauthorized access blocked,
12/11/2013 5:24:29 PM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/11/2013 5:24:29 PM,C:\WINDOWS\SYSWOW64\WBEM\WMIPRVSE.EXE,1584,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,2184,Access Process Data,Unauthorized access blocked,
12/11/2013 5:27:35 PM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/11/2013 5:27:35 PM,C:\WINDOWS\SYSTEM32\CONHOST.EXE,3404,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\cltlmh.exe,2780,Access Process Data,Unauthorized access blocked,
12/11/2013 5:36:18 PM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/11/2013 5:36:18 PM,C:\PROGRAM FILES (X86)\MALWAREBYTES' ANTI-MALWARE\MBAM.EXE,7340,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,2184,Access Process Data,Unauthorized access blocked,1
12/12/2013 3:19:11 AM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/12/2013 3:19:11 AM,C:\WINDOWS\SYSWOW64\WBEM\WMIPRVSE.EXE,3436,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,2104,Access Process Data,Unauthorized access blocked,
12/12/2013 3:19:11 AM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/12/2013 3:19:11 AM,C:\WINDOWS\SYSWOW64\WBEM\WMIPRVSE.EXE,3436,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,2104,Access Process Data,Unauthorized access blocked,
12/12/2013 3:20:14 AM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/12/2013 3:20:14 AM,C:\WINDOWS\SYSWOW64\WBEM\WMIPRVSE.EXE,3436,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,2104,Access Process Data,Unauthorized access blocked,
12/12/2013 3:24:11 AM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/12/2013 3:24:11 AM,C:\WINDOWS\SYSTEM32\CONHOST.EXE,2280,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\cltlmh.exe,3144,Access Process Data,Unauthorized access blocked,
12/12/2013 3:39:40 PM,Medium,Unauthorized access blocked (Set Registry Security Key),Blocked,No Action Required,12/12/2013 3:39:40 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,960,HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_BHDRVX64\0000\Control\,0,Set Registry Security Key,Unauthorized access blocked,
12/12/2013 5:23:00 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:00 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\NCW\ncwmrc.db.bak,0,Open File,Unauthorized access blocked,
12/12/2013 5:23:02 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:02 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\AntiSpam\stat.dat,0,Open File,Unauthorized access blocked,
12/12/2013 5:23:04 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:04 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Logs\NasState.dat,0,Open File,Unauthorized access blocked,
12/12/2013 5:23:06 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:06 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Framework\EVT.db,0,Open File,Unauthorized access blocked,
12/12/2013 5:23:07 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:07 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\QBackup\{04979797-89D0-439D-9143-909791C9A2E6}\{052611CC-AC6B-49C4-8B4B-E5C8769D73CD}.qbd",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:10 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:10 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\QBackup\{B59EDB85-AE52-4CBC-9D5A-13AA3231BBD4}\{5529039E-C2AD-48EE-82DC-9AA09D8150FE}.qbi",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:11 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:11 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\5edeae01-e6ba-4548-8b30-5c89c4affde2.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:12 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:12 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\717883ab-8ec3-420c-ad42-73a6b9cd6aaa.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:13 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:13 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\4a6ad647-38fb-4ae3-8efb-d67f280c70cb.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:14 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:14 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\0e01aa6a-60e2-43be-866e-d0ec78b64a7d.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:15 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:15 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\a85b5992-604e-4396-961b-0073110a29d0.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:16 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:16 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\65e54637-2d5a-4263-92bd-fd8fb6190591.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:17 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:17 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\be9a8e1f-f24a-48e6-b8bf-0c97193930af.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:20 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:20 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\35b70189-203e-476d-80d7-d8d2e27dc4f2.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:21 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:21 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\5204c5f5-941b-4ade-97c8-7007d8ba33dc.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:22 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:22 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Product\Layout.dat.log,0,Open File,Unauthorized access blocked,
12/12/2013 5:23:23 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:23 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\013c72d7-1d2e-4ce6-9e88-aeb0db102047.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:24 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:24 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\5ac79445-7ce2-4ebe-b612-98c564fbd73f.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:26 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:26 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\ddc467d6-0822-4554-95b1-59d4bb60e5a1.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:27 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:27 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\13bf48f8-d587-4eae-b4a1-5eea3c1c3cd8.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:29 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:29 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ashelper.dll,0,Open File,Unauthorized access blocked,
12/12/2013 5:23:31 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:31 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\b391cd44-8d67-4254-b56b-520f6293c85b.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:32 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:32 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\VirusDefs\usage.dat,0,Open File,Unauthorized access blocked,
12/12/2013 5:23:33 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:33 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\08eb7109-dc2f-4194-8b1d-ec2d6c3c55c2.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:40 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:40 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\ccSetMgr\7940358a-597a-43f0-8009-cffe1ab4d458.dat",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:49 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:49 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,"C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\CmnClnt\_lck\_ISDATAPR_{E8EFD4CD-DE52-4444-9511-EFF3B158724B}1",0,Open File,Unauthorized access blocked,
12/12/2013 5:23:50 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:50 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\bucomm.dll,0,Open File,Unauthorized access blocked,
12/12/2013 5:23:51 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:51 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,C:\Program Files (x86)\Norton Security Suite\MUI\20.4.0.40\09\01,0,Open File,Unauthorized access blocked,
12/12/2013 5:23:52 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:52 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Temp\musdmys_vmZUB7jD9r8dcrO,0,Open File,Unauthorized access blocked,
12/12/2013 5:23:53 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:53 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\VirusDefs\20131211.032\ERASER.SIG,0,Open File,Unauthorized access blocked,
12/12/2013 5:23:54 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:54 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\IPSDefs\20131210.001\CATALOG.DAT,0,Open File,Unauthorized access blocked,
12/12/2013 5:23:57 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:23:57 PM,C:\WINDOWS\SYSTEM32\SVCHOST.EXE,7912,C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\VirusDefs\20131211.032\ex64.sys,0,Open File,Unauthorized access blocked,
12/12/2013 5:37:35 PM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/12/2013 5:37:35 PM,C:\PROGRAM FILES (X86)\MALWAREBYTES' ANTI-MALWARE\MBAM.EXE,5472,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,2104,Access Process Data,Unauthorized access blocked,1
12/12/2013 5:44:46 PM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/12/2013 5:44:46 PM,C:\WINDOWS\SYSWOW64\WBEM\WMIPRVSE.EXE,3092,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,2180,Access Process Data,Unauthorized access blocked,
12/12/2013 5:44:46 PM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/12/2013 5:44:46 PM,C:\WINDOWS\SYSWOW64\WBEM\WMIPRVSE.EXE,3092,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,2180,Access Process Data,Unauthorized access blocked,
12/12/2013 5:45:33 PM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/12/2013 5:45:33 PM,C:\WINDOWS\SYSWOW64\WBEM\WMIPRVSE.EXE,3092,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,2180,Access Process Data,Unauthorized access blocked,
12/12/2013 5:49:36 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:49:36 PM,C:\USERS\PLAGUE\DESKTOP\MBAR\MBAR.EXE,7884,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,0,Open File,Unauthorized access blocked,1
12/12/2013 5:49:37 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:49:37 PM,C:\USERS\PLAGUE\DESKTOP\MBAR\MBAR.EXE,7884,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,0,Open File,Unauthorized access blocked,1
12/12/2013 5:49:38 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:49:38 PM,C:\USERS\PLAGUE\DESKTOP\MBAR\MBAR.EXE,7884,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,0,Open File,Unauthorized access blocked,1
12/12/2013 5:49:46 PM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/12/2013 5:49:46 PM,C:\WINDOWS\SYSTEM32\CONHOST.EXE,7244,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\cltlmh.exe,6000,Access Process Data,Unauthorized access blocked,
12/12/2013 5:50:54 PM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/12/2013 5:50:54 PM,C:\USERS\PLAGUE\DESKTOP\MBAR\MBAR.EXE,7884,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,2180,Access Process Data,Unauthorized access blocked,1
12/12/2013 5:54:56 PM,Medium,Unauthorized access blocked (Open File),Blocked,No Action Required,12/12/2013 5:54:56 PM,C:\USERS\PLAGUE\DESKTOP\MBAR\MBAR.EXE,7884,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,0,Open File,Unauthorized access blocked,1
12/12/2013 6:00:56 PM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/12/2013 6:00:56 PM,C:\USERS\PLAGUE\DESKTOP\RKILL64.EXE,3208,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,2180,Access Process Data,Unauthorized access blocked,1
12/12/2013 6:01:10 PM,Medium,Unauthorized access blocked (Access Process Data),Blocked,No Action Required,12/12/2013 6:01:10 PM,C:\USERS\PLAGUE\DESKTOP\RKILL64.EXE,3208,C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe,4732,Access Process Data,Unauthorized access blocked,1
 
 
Category: Silent Mode
Date & Time,Risk,Activity,Status
12/12/2013 10:18:38 AM,Info,A program entered full-screen mode. Silent Mode is on.,Completed
12/12/2013 10:23:44 AM,Info,A program exited full-screen mode. Silent Mode is off.,Completed
12/12/2013 10:24:31 AM,Info,A program entered full-screen mode. Silent Mode is on.,Completed
12/12/2013 10:38:43 AM,Info,A program exited full-screen mode. Silent Mode is off.,Completed
12/12/2013 10:39:05 AM,Info,A program entered full-screen mode. Silent Mode is on.,Completed
12/12/2013 10:44:49 AM,Info,A program exited full-screen mode. Silent Mode is off.,Completed
12/12/2013 10:45:12 AM,Info,A program entered full-screen mode. Silent Mode is on.,Completed
12/12/2013 10:51:57 AM,Info,A program exited full-screen mode. Silent Mode is off.,Completed
12/12/2013 10:53:20 AM,Info,A program entered full-screen mode. Silent Mode is on.,Completed
12/12/2013 12:52:00 PM,Info,A program exited full-screen mode. Silent Mode is off.,Completed
 
 
Category: LiveUpdate
Date & Time,Risk,Activity,Status,Recommended Action,Type of Update,Result,Date & Time,Total Updates Applied,Norton Web Protection Definitions,Reboot Required,Risk,Norton 2013 Reputation Revocation List,Norton Smart Virus Definitions X64,Norton Safe Web Statistics,Norton Pulse Updates,Norton Antispam Definitions X64,Norton 2013 Whitelist
12/11/2013 7:05:59 PM,Info,LiveUpdate Session,Completed,No Action Required,Automatic,Norton LiveUpdate has successfully completed. Your Norton product now has the latest protection updates.,12/11/2013 7:05:59 PM,1,Success (9.25KB),No,Info,,,,,,
12/11/2013 9:30:15 PM,Info,LiveUpdate Session,Completed,No Action Required,Automatic,Norton LiveUpdate has successfully completed. Your Norton product now has the latest protection updates.,12/11/2013 9:30:15 PM,1,,No,Info,Success (1.84KB),,,,,
12/11/2013 10:50:05 PM,Info,LiveUpdate Session,Completed,No Action Required,Automatic,Norton LiveUpdate has successfully completed. Your Norton product now has the latest protection updates.,12/11/2013 10:50:05 PM,4,Success (14.18KB),No,Info,Success (2.11KB),Success (130.36KB),Success (2.74KB),,,
12/11/2013 11:50:54 PM,Info,LiveUpdate Session,Completed,No Action Required,Automatic,Norton LiveUpdate has successfully completed. Your Norton product now has the latest protection updates.,12/11/2013 11:50:54 PM,3,Success (11.66KB),No,Info,Success (1.83KB),,,Success (499.00bytes),,
12/12/2013 12:51:16 AM,Info,LiveUpdate Session,Completed,No Action Required,Automatic,Norton LiveUpdate has successfully completed. Your Norton product now has the latest protection updates.,12/12/2013 12:51:16 AM,2,,No,Info,Success (1.79KB),,,Success (449.00bytes),,
12/12/2013 2:51:24 AM,Info,LiveUpdate Session,Completed,No Action Required,Automatic,Norton LiveUpdate has successfully completed. Your Norton product now has the latest protection updates.,12/12/2013 2:51:24 AM,2,,No,Info,Success (1.91KB),,,Success (563.00bytes),,
12/12/2013 3:53:11 AM,Info,LiveUpdate Session,Completed,No Action Required,Automatic,Norton LiveUpdate has successfully completed. Your Norton product now has the latest protection updates.,12/12/2013 3:53:11 AM,2,Success (19.61KB),No,Info,,,,Success (536.00bytes),,
12/12/2013 4:53:49 AM,Info,LiveUpdate Session,Completed,No Action Required,Automatic,Norton LiveUpdate has successfully completed. Your Norton product now has the latest protection updates.,12/12/2013 4:53:49 AM,3,,No,Info,,Success (95.68KB),,Success (549.00bytes),Success (439.92KB),
12/12/2013 5:54:15 AM,Info,LiveUpdate Session,Completed,No Action Required,Automatic,Norton LiveUpdate has successfully completed. Your Norton product now has the latest protection updates.,12/12/2013 5:54:15 AM,3,Success (11.94KB),No,Info,Success (1.80KB),,,Success (595.00bytes),,
12/12/2013 6:54:22 AM,Info,LiveUpdate Session,Completed,No Action Required,Automatic,Norton LiveUpdate has successfully completed. Your Norton product now has the latest protection updates.,12/12/2013 6:54:22 AM,3,Success (13.30KB),No,Info,Success (1.79KB),,,Success (577.00bytes),,
12/12/2013 7:54:32 AM,Info,LiveUpdate Session,Completed,No Action Required,Automatic,Norton LiveUpdate has successfully completed. Your Norton product now has the latest protection updates.,12/12/2013 7:54:32 AM,2,,No,Info,,,,Success (513.00bytes),,Success (13.20KB)
12/12/2013 8:54:39 AM,Info,LiveUpdate Session,Completed,No Action Required,Automatic,Norton LiveUpdate has successfully completed. Your Norton product now has the latest protection updates.,12/12/2013 8:54:39 AM,1,Success (13.02KB),No,Info,,,,,,
12/12/2013 9:55:00 AM,Info,LiveUpdate Session,Completed,No Action Required,Automatic,Norton LiveUpdate has successfully completed. Your Norton product now has the latest protection updates.,12/12/2013 9:55:00 AM,2,,No,Info,Success (1.78KB),,,Success (498.00bytes),,
12/12/2013 1:03:11 PM,Info,LiveUpdate Session,Completed,No Action Required,Automatic,Norton LiveUpdate has successfully completed. Your Norton product now has the latest protection updates.,12/12/2013 1:03:11 PM,2,Success (10.05KB),No,Info,Success (1.88KB),,,,,
12/12/2013 3:04:39 PM,Info,LiveUpdate Session,Completed,No Action Required,Automatic,Norton LiveUpdate has successfully completed. Your Norton product now has the latest protection updates.,12/12/2013 3:04:39 PM,1,Success (16.85KB),No,Info,,,,,,
 
 
IPS Alert Name
System Infected: Trojan.Beta Bot Activity 3
Risk: High
Attacking Computer: 69.197.18.179, 80
Attacker URL: uj8kml21z.com/0r/r0/ba/order.php
Destination Address: PLAGUE-PC (10.1.88.145, 50017)
Source Address: 69.197.18.179
Traffic Description: TCP, www-http


#7 lowvoltage

lowvoltage
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:54 PM

Posted 12 December 2013 - 06:19 PM

Yesterday's Norton log also included 69.197.18.178 (x01rakmtp.com) as well in the IPS section:

 

 
Category: Intrusion Prevention
Date & Time,Risk,Activity,Status,Recommended Action,IPS Alert Name,Default Action,Action Taken,Attacking Computer,Attacker URL,Destination Address,Source Address,Traffic Description,Category
12/11/2013 4:59:40 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60242)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 5:00:40 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60249)",69.197.18.179,"TCP, www-http",
12/11/2013 5:01:41 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60270)",69.197.18.179,"TCP, www-http",
12/11/2013 5:02:41 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60305)",69.197.18.179,"TCP, www-http",
12/11/2013 5:08:44 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60358)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 5:09:44 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60365)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 5:10:44 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60392)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 5:11:44 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60400)",69.197.18.179,"TCP, www-http",
12/11/2013 5:12:44 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60407)",69.197.18.179,"TCP, www-http",
12/11/2013 5:13:44 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60412)",69.197.18.179,"TCP, www-http",
12/11/2013 5:19:47 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60540)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 5:20:48 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60545)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 5:27:49 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 49383)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 5:28:49 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 49416)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 4:13:24 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59623)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 4:14:24 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59629)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 4:15:25 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59637)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 4:16:25 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59640)",69.197.18.179,"TCP, www-http",
12/11/2013 4:17:25 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59643)",69.197.18.179,"TCP, www-http",
12/11/2013 4:18:25 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59646)",69.197.18.179,"TCP, www-http",
12/11/2013 4:24:28 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59673)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 4:25:28 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59679)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 4:26:28 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59687)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 4:27:29 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59705)",69.197.18.179,"TCP, www-http",
12/11/2013 4:28:29 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59740)",69.197.18.179,"TCP, www-http",
12/11/2013 4:29:29 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59781)",69.197.18.179,"TCP, www-http",
12/11/2013 4:35:32 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59923)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 4:36:32 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59955)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 4:37:32 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59963)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 4:38:33 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59966)",69.197.18.179,"TCP, www-http",
12/11/2013 4:39:33 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59972)",69.197.18.179,"TCP, www-http",
12/11/2013 4:40:33 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 59977)",69.197.18.179,"TCP, www-http",
12/11/2013 4:46:36 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60111)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 4:47:36 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60149)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 4:48:36 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60180)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 4:49:36 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60206)",69.197.18.179,"TCP, www-http",
12/11/2013 4:50:37 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60215)",69.197.18.179,"TCP, www-http",
12/11/2013 4:51:37 PM,High,An intrusion attempt by 69.197.18.179 was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"69.197.18.179, 80",uj8kml21z.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60218)",69.197.18.179,"TCP, www-http",
12/11/2013 4:57:40 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60232)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 4:58:40 PM,High,An intrusion attempt by x01rakmtp.com was blocked.,Blocked,No Action Required,System Infected: Trojan.BetaBot Activity 3,No Action Required,No Action Required,"x01rakmtp.com (69.197.18.178, 80)",x01rakmtp.com/0r/r0/ba/order.php,"PLAGUE-PC (10.1.88.145, 60234)",69.197.18.178 (69.197.18.178),"TCP, www-http",
12/11/2013 5:22:35 PM,Info,Intrusion Prevention is monitoring 3133 signatures. Driver version: 12.0.3.2,Detected,No Action Required,,No Action Required,No Action Required,,,,,,Intrusion Prevention
12/11/2013 5:22:35 PM,Info,Intrusion Prevention has been enabled,Detected,No Action Required,,No Action Required,No Action Required,,,,,,Intrusion Prevention
12/11/2013 5:22:35 PM,Info,Intrusion Prevention Engine version: 6.0.0.265 Definitions Set version: 20131210.001,Detected,No Action Required,,No Action Required,No Action Required,,,,,,Intrusion Prevention

Edited by lowvoltage, 12 December 2013 - 06:19 PM.


#8 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,696 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:08:54 PM

Posted 12 December 2013 - 06:28 PM

Does actually Norton creates some warning pop-ups or you found those in Norton's log?


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#9 lowvoltage

lowvoltage
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:54 PM

Posted 12 December 2013 - 06:52 PM

Norton is generating pop-ups. Thats what led me to check the logs and see how far back it went. Activity started yesterday afternoon.



#10 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,696 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:08:54 PM

Posted 12 December 2013 - 07:04 PM

p22002970.gif Download Temp File Cleaner (TFC)
Alternate download: http://www.itxassociates.com/OT-Tools/TFC.exe
Double click on TFC.exe to run the program.
Click on Start button to begin cleaning process.
TFC will close all running programs, and it may ask you to restart computer.

p22002970.gif Please download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.


p22002970.gif Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.


p22002970.gif Please run a free online scan with the ESET Online Scanner

  • Disable your antivirus program
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Click Start
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click on List of found threats
  • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    NOTE. If Eset doesn't find any threats it'll NOT produce any log.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#11 lowvoltage

lowvoltage
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:54 PM

Posted 12 December 2013 - 08:02 PM

TFC run, no reboot required

 

AdwCleaner:

# AdwCleaner v3.015 - Report created 12/12/2013 at 19:49:01
# Updated 10/12/2013 by Xplode
# Operating System : Windows 7 Professional Service Pack 1 (64 bits)
# Username : Plague - PLAGUE-PC
# Running from : C:\Users\Plague\Desktop\adwcleaner.exe
# Option : Clean
 
***** [ Services ] *****
 
 
***** [ Files / Folders ] *****
 
Folder Deleted : C:\ProgramData\boost_interprocess
Folder Deleted : C:\Users\Plague\AppData\Local\unitlayers
 
***** [ Shortcuts ] *****
 
 
***** [ Registry ] *****
 
Value Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Run [Adobe Flash Updater]
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{2C4BA31C-0C15-11E2-90C7-9BFCBEB168B3}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2C4BA31C-0C15-11E2-90C7-9BFCBEB168B3}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2C4BA31C-0C15-11E2-90C7-9BFCBEB168B3}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{2C4BA31C-0C15-11E2-90C7-9BFCBEB168B3}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AFBCB7E0-F91A-4951-9F31-58FEE57A25C4}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{79FB5FC8-44B9-4AF5-BADD-CCE547F953E5}
Key Deleted : HKCU\Software\AppDataLow\Software\Crossrider
Key Deleted : HKLM\Software\InstallIQ
 
***** [ Browsers ] *****
 
-\\ Internet Explorer v11.0.9600.16428
 
 
-\\ Google Chrome v31.0.1650.63
 
[ File : C:\Users\Plague\AppData\Local\Google\Chrome\User Data\Default\preferences ]
 
 
[ File : C:\Users\Leanne\AppData\Local\Google\Chrome\User Data\Default\preferences ]
 
Deleted : icon_url
Deleted : search_url
 
*************************
 
AdwCleaner[R0].txt - [1922 octets] - [12/12/2013 19:45:39]
AdwCleaner[S0].txt - [1756 octets] - [12/12/2013 19:49:01]
 
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [1816 octets] ##########
 
JRT:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.0.8 (11.05.2013:1)
OS: Windows 7 Professional x64
Ran by Plague on Thu 12/12/2013 at 19:55:28.36
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
~~~ Services
 
 
 
~~~ Registry Values
 
 
 
~~~ Registry Keys
 
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\solid savings
 
 
 
~~~ Files
 
 
 
~~~ Folders
 
Failed to delete: [Folder] "C:\ProgramData\boost_interprocess"
Successfully deleted: [Folder] "C:\Program Files (x86)\coupons"
 
 
 
~~~ Event Viewer Logs were cleared
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Thu 12/12/2013 at 20:00:01.74
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


#12 lowvoltage

lowvoltage
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:54 PM

Posted 13 December 2013 - 03:11 PM

ESET report: 

E:\Television\Game of Thrones\Season 3\Game_of_Thrones_S03E08_720p_HDTV_x264_EVOLVE\Game.of.Thrones.S03E08.720p.HDTV.x264-EVOLVE.part01.exe a variant of Win32/Injector.Autoit.MB trojan cleaned by deleting (after the next restart) - quarantined



#13 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,696 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:08:54 PM

Posted 13 December 2013 - 03:16 PM

How are things now?


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#14 lowvoltage

lowvoltage
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:10:54 PM

Posted 14 December 2013 - 11:28 AM

WinRAR is still trying to extract something on startup to C:\Windows\system32, haven't seen any IPS alerts since the ESET scan.

Just some Medium severity - Unauthorized access blocked (Access Process Data):

Actor: C:\WINDOWS\SYSWOW64\WBEM\WMIPRVSE.EXE

Actor PID 3640

Target: C:\Program Files (x86)\Norton Security Suite\Engine\20.4.0.40\ccsvchst.exe

Target PID 2188



#15 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,696 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:08:54 PM

Posted 14 December 2013 - 02:52 PM

Download Autoruns for Windows: http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx
No installation required.
Simply unzip Autoruns.zip file, and double click on autoruns.exe file to run the program.
Go File>Save, and save it as AutoRuns.txt file to know location.
You must select Text from drop-down menu as a file type:

p4436801.gif

Upload the file(s) here: http://www.sendspace.com/
Click on Browse button and navigate to the file you want to upload.
Click on Upload button.
Click on FIRST Copy Link button and paste the link in your next reply.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users