Virus Extraction => BSOD

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by shiftlessatol, Jul 9, 2011.

  1. shiftlessatol

    shiftlessatol Private E-2

    after extracting a virus from this windows 7 machine, the computer bsod occurs when activating the ksthunk.sys driver

    it's been a while since i've been on here so i'll attach the MGlogs first and wait for instruction.

    thanks,

    -dave-
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I might well end up referring you to the software forum however, to rule out malware you need to run our procedures, all of them. You missed out a great deal of the R&R and further more, you are using outdated copies of TDSSKiller and MGTools. When you run Combofix you need to make sure you are running the current version. (Same with MBAM and SAS) I'll link to the procedures below and then you can attach all of the requested logs.

    Please read ALL of this message including the notes before doing anything.

    Pleases follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.
    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.

    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:

    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware and Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     
  3. shiftlessatol

    shiftlessatol Private E-2

    ok, well that yielded about total worthlessness, the only thing that ran successfully was MGlogs

    SAS cleared the logs when i closed the program before i could extract it

    combofix is included, also a tdsskiller log that i ran a while back.

    RR wouldn't run

    and mbam when stupid when i tried to update it, so i'll have to try it. let me know if you want/need the log for mbam, and i'll try it again on reboot


    here is what i got
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    What is this file?

    c:\users\Simmons\Desktop\Windows.exe

    • What are you using for antivirus?
    • Is everything as it should be with your Startup, Program Files, Desktop, and Quick Launch? Is anything hidden from you, nothing unusual?

    Conduit Engine <--- uninstall this.

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
    O23 - Service: ASP.NET State Service (aspnet_state) - Unknown owner - (no file)
    O23 - Service: WMPNetworkSvc - Unknown owner - (no file)

    After clicking Fix exit HJT.



    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    DirLook::
    C:\Users\Simmons\AppData\Local\{0A6D64BA-5B83-41DC-828A-2C3B6B7C1FBB}
    C:\Users\Simmons\AppData\Local\{0C5713EC-B201-4E73-9A88-5C083C73BE10}
    C:\Users\Simmons\AppData\Local\{0DEA0E5A-A865-4DC0-AF0B-7A15620CF935}
    C:\Users\Simmons\AppData\Local\{26929F2C-5F2A-4FD9-820A-212EB04E7E1E}
    C:\Users\Simmons\AppData\Local\{28703118-55B9-4CF7-8F9D-A8D38F2A819F}
    C:\Users\Simmons\AppData\Local\{2C4D1DFF-D8B8-43F7-BA8D-699DDF293A35}
    C:\Users\Simmons\AppData\Local\{2E5E1AE3-7666-4CEA-9440-1389D22A9011}
    C:\Users\Simmons\AppData\Local\{2F22FE4D-BC5D-4826-8332-7C13A91D81F1}
    C:\Users\Simmons\AppData\Local\{310E4D03-975C-4794-A01C-ABD33D6DB9BD}
    C:\Users\Simmons\AppData\Local\{31BAF4AA-C501-465C-919C-9FFD6590799A}
    C:\Users\Simmons\AppData\Local\{324F8F22-0A5A-4E04-95C5-66013F6F9647}
    C:\Users\Simmons\AppData\Local\{344BE62E-9B37-46CC-A5E9-582A93D3B02D}
    C:\Users\Simmons\AppData\Local\{34D659BD-408D-4F99-BC2B-564744779DFD}
    C:\Users\Simmons\AppData\Local\{36A218C9-D604-4A3F-95A1-ED8157277E5D}
    C:\Users\Simmons\AppData\Local\{399F4F5B-15A3-4203-A1F2-F00AC73C13AD}
    C:\Users\Simmons\AppData\Local\{4262C676-0295-445C-AB08-FD45A22D08B4}
    C:\Users\Simmons\AppData\Local\{42AC74A8-B0A5-4FB5-B578-4E39948E6C42}
    C:\Users\Simmons\AppData\Local\{50A7D4FD-F7BE-495F-9107-76A2D5FA3E1C}
    C:\Users\Simmons\AppData\Local\{602243AD-9CD4-40AB-9DBC-CE3F8E6C8D1A}
    C:\Users\Simmons\AppData\Local\{6A9B91BE-950C-412B-A5CB-F062AAA6D1BB}
    C:\Users\Simmons\AppData\Local\{6C7E0F2A-ABB4-4A3F-9ECE-FE74F312DAC1}
    C:\Users\Simmons\AppData\Local\{6C82CE1C-B204-411B-9592-E99C06F632B7}
    C:\Users\Simmons\AppData\Local\{7FDB39E6-B2BF-47D4-B5AF-4DC2DC44FA79}
    C:\Users\Simmons\AppData\Local\{819D4DE8-8189-4686-8301-E92DCFFBFFE9}
    C:\Users\Simmons\AppData\Local\{90A528D1-B36A-44C1-B595-C37703F9E7AD}
    C:\Users\Simmons\AppData\Local\{9AF7A16D-032A-485A-8A5D-B985F2F8D96A}
    C:\Users\Simmons\AppData\Local\{9C1DC15C-8EA6-432E-A826-290F81CC137E}
    C:\Users\Simmons\AppData\Local\{A349F5AC-45F7-4DB7-AF58-91D713C9FD4D}
    C:\Users\Simmons\AppData\Local\{A407A3BB-AEF7-4FA5-958D-AD41E3D98A3D}
    C:\Users\Simmons\AppData\Local\{AAC68A37-729C-464C-A4D8-FDEC83F568A6}
    C:\Users\Simmons\AppData\Local\{B5ABE676-30FB-4AE9-B302-1B40EE430247}
    C:\Users\Simmons\AppData\Local\{CCBE1CF6-C6DC-4D5C-9AA5-266EECA1E65E}
    C:\Users\Simmons\AppData\Local\{D2E8427A-0DAA-4300-A8C7-3F6AA27D87AC}
    C:\Users\Simmons\AppData\Local\{D5FFF808-CDBA-4BBC-9BDA-CE95AE73AEC6}
    C:\Users\Simmons\AppData\Local\{DB619972-5A27-45E5-934E-1A271BD4F404}
    C:\Users\Simmons\AppData\Local\{DD09913F-DCE2-4DC5-BC41-F5BDCB4DAFE9}
    C:\Users\Simmons\AppData\Local\{E1868B88-EAF7-49DB-9847-73D1E123BA7F}
    C:\Users\Simmons\AppData\Local\{E2C09DC2-92B6-465D-BF46-10ACFB5E150E}
    C:\Users\Simmons\AppData\Local\{E63B0742-214F-4C64-BD4A-AA25074D8929}
    C:\Users\Simmons\AppData\Local\{F2034231-BEDE-4FC5-80B9-CDC5A3811F1D}
    C:\Users\Simmons\AppData\Local\{F579401F-2D34-4798-B5F3-17D1957E6AD0}
    C:\Users\Simmons\AppData\Local\{F96C760F-7943-41AD-A71E-36AC22AF549D}
    C:\Users\Simmons\AppData\Local\{FBA0FF33-C8D8-44A8-A0A5-07ED47E87F44}
    C:\Users\Simmons\AppData\Local\{FC9BCE3A-450B-4111-A291-EEE65F171B4F}
    C:\Users\Simmons\AppData\Local\{FD6BB90B-0AC3-4CD8-B765-631F9C76ED49}
    C:\Users\Simmons\AppData\Local\{FFC4F5B9-3EAA-4A3A-8613-5A85623F560D}
    C:\Users\Simmons\AppData\Local\{FFF96F0E-B54A-4996-B28F-FA6CD90CE3EF}
    
    Driver::
    aspnet_state
    WMPNetworkSvc
    
    File::
    C:\Users\Simmons\Local Settings\TEMP\80f5eu40cy322lpsuua0224
    C:\Windows\system32\tmp.txt
    C:\Windows\SysWOW64\tmp.txt
    C:\ProgramData\rebootpending.txt
    C:\ProgramData\7y6774w28t81a
    C:\ProgramData\80f5eu40cy322lpsuua0224
    C:\Users\Simmons\AppData\Roaming\GetValue.vbs
    C:\Users\Simmons\AppData\Roaming\SetValue.bat
    C:\Users\Simmons\AppData\Local\7y6774w28t81a
    C:\Users\Simmons\AppData\Local\80f5eu40cy322lpsuua0224
    C:\Users\Simmons\AppData\Roaming\Microsoft\Windows\Templates\7y6774w28t81a
    C:\Users\Simmons\AppData\Roaming\Microsoft\Windows\Templates\80f5eu40cy322lpsuua0224
    
    Folder::
    C:\Users\Simmons\Local Settings\TEMP\7zSA208.tmp
    
    Registry::
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{171DEBEB-C3D4-40b7-AC73-056A5EBA4A7E}]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670}]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670}\NoExplorer]
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    If after running Combofix you discover none of your programs will open up, and you recieve the following error: "Illegal operation attempted on a registry key that has been marked for deletion". Then the answer is to REBOOT the machine, and all will be corrected.



    I want you to run TDSSKiller so refer to the below for how to do so.

    TDSSkiller - How to run

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!

    Please answer any questions that I asked you.
     
  5. shiftlessatol

    shiftlessatol Private E-2

    it is a teamviewer quicksupport app. it's safe.

    i'll be running your post this evening, and will get back to you when it's complete

    AVG 2011 Free
    everything is normal, except for skype or anything that activates the ksthunk.sys driver. other than that, it is good. nothing unusual.
    except for a Cannon printer, that won't seem to install - but may be a windows 7 issue. not clear on it yet.
     
    Last edited: Jul 10, 2011
  6. shiftlessatol

    shiftlessatol Private E-2

    check

    check

    check


    check

    attached are the logs

    i'm going to attempt skype to see what happens at this point.

    so far the machine is stable. the printer is not at my location but i will attempt the intall of it when i bring the machine back to it's original location and i'll update you with the results of activating ksthunk.sys

    thanks
     

    Attached Files:

  7. shiftlessatol

    shiftlessatol Private E-2

    Skype worked!!!! you fixed it!

    thanks again
     
  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You did not follow my fix according to those logs. :( Everything is still as it was. So you need to do everything in my post # 4 again. (Except for the analyse.exe step) DO NOT rename logs/zipped files.
     
  9. shiftlessatol

    shiftlessatol Private E-2

    what do you mean? i did exactly as you said and i didn't rename anything. what was i suppose to do that i didn't? or what did i do that i shouldn't have?
     
  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Should just be MGlogs.zip it should not be renamed like you have it. I cannot see evidence of that fix working or even being carried out so I shall give you another fix in a moment using a different tool.
     
  11. shiftlessatol

    shiftlessatol Private E-2

    oh i didn't rename it, i added all the logs related to what you had me do, i just now checked to see that those logs were located in the same zip folder. regardless, i'm running it again, if you check the mglogs.zip you'll find all you need - this next one will probably be useless as nothing will change from this time to last time. just open mglogs.zip located in goods2.zip and you'll have what you're wanting.

    i put them all in their own archive so i wouldn't have to upload 5 files, not realizing the batch file would pull the other logs.
     
    Last edited: Jul 11, 2011
  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    SystemLook

    Please download SystemLook from one of the links below and save it to your Desktop.
    Download Mirror #1
    Download Mirror #2

    • Double-click SystemLook.exe to run it.
    • Copy the content of the following codebox into the main textfield:
      Code:
      :dir
      C:\Users\Simmons\AppData\Local\{0A6D64BA-5B83-41DC-828A-2C3B6B7C1FBB}
      C:\Users\Simmons\AppData\Local\{0C5713EC-B201-4E73-9A88-5C083C73BE10}
      C:\Users\Simmons\AppData\Local\{0DEA0E5A-A865-4DC0-AF0B-7A15620CF935}
      C:\Users\Simmons\AppData\Local\{26929F2C-5F2A-4FD9-820A-212EB04E7E1E}
      C:\Users\Simmons\AppData\Local\{28703118-55B9-4CF7-8F9D-A8D38F2A819F}
      C:\Users\Simmons\AppData\Local\{2C4D1DFF-D8B8-43F7-BA8D-699DDF293A35}
      C:\Users\Simmons\AppData\Local\{2E5E1AE3-7666-4CEA-9440-1389D22A9011}
      C:\Users\Simmons\AppData\Local\{2F22FE4D-BC5D-4826-8332-7C13A91D81F1}
      C:\Users\Simmons\AppData\Local\{310E4D03-975C-4794-A01C-ABD33D6DB9BD}
      C:\Users\Simmons\AppData\Local\{31BAF4AA-C501-465C-919C-9FFD6590799A}
      C:\Users\Simmons\AppData\Local\{324F8F22-0A5A-4E04-95C5-66013F6F9647}
      C:\Users\Simmons\AppData\Local\{344BE62E-9B37-46CC-A5E9-582A93D3B02D}
      C:\Users\Simmons\AppData\Local\{34D659BD-408D-4F99-BC2B-564744779DFD}
      C:\Users\Simmons\AppData\Local\{36A218C9-D604-4A3F-95A1-ED8157277E5D}
      C:\Users\Simmons\AppData\Local\{399F4F5B-15A3-4203-A1F2-F00AC73C13AD}
      C:\Users\Simmons\AppData\Local\{4262C676-0295-445C-AB08-FD45A22D08B4}
      C:\Users\Simmons\AppData\Local\{42AC74A8-B0A5-4FB5-B578-4E39948E6C42}
      C:\Users\Simmons\AppData\Local\{50A7D4FD-F7BE-495F-9107-76A2D5FA3E1C}
      C:\Users\Simmons\AppData\Local\{602243AD-9CD4-40AB-9DBC-CE3F8E6C8D1A}
      C:\Users\Simmons\AppData\Local\{6A9B91BE-950C-412B-A5CB-F062AAA6D1BB}
      C:\Users\Simmons\AppData\Local\{6C7E0F2A-ABB4-4A3F-9ECE-FE74F312DAC1}
      C:\Users\Simmons\AppData\Local\{6C82CE1C-B204-411B-9592-E99C06F632B7}
      C:\Users\Simmons\AppData\Local\{7FDB39E6-B2BF-47D4-B5AF-4DC2DC44FA79}
      C:\Users\Simmons\AppData\Local\{819D4DE8-8189-4686-8301-E92DCFFBFFE9}
      C:\Users\Simmons\AppData\Local\{90A528D1-B36A-44C1-B595-C37703F9E7AD}
      C:\Users\Simmons\AppData\Local\{9AF7A16D-032A-485A-8A5D-B985F2F8D96A}
      C:\Users\Simmons\AppData\Local\{9C1DC15C-8EA6-432E-A826-290F81CC137E}
      C:\Users\Simmons\AppData\Local\{A349F5AC-45F7-4DB7-AF58-91D713C9FD4D}
      C:\Users\Simmons\AppData\Local\{A407A3BB-AEF7-4FA5-958D-AD41E3D98A3D}
      C:\Users\Simmons\AppData\Local\{AAC68A37-729C-464C-A4D8-FDEC83F568A6}
      C:\Users\Simmons\AppData\Local\{B5ABE676-30FB-4AE9-B302-1B40EE430247}
      C:\Users\Simmons\AppData\Local\{CCBE1CF6-C6DC-4D5C-9AA5-266EECA1E65E}
      C:\Users\Simmons\AppData\Local\{D2E8427A-0DAA-4300-A8C7-3F6AA27D87AC}
      C:\Users\Simmons\AppData\Local\{D5FFF808-CDBA-4BBC-9BDA-CE95AE73AEC6}
      C:\Users\Simmons\AppData\Local\{DB619972-5A27-45E5-934E-1A271BD4F404}
      C:\Users\Simmons\AppData\Local\{DD09913F-DCE2-4DC5-BC41-F5BDCB4DAFE9}
      C:\Users\Simmons\AppData\Local\{E1868B88-EAF7-49DB-9847-73D1E123BA7F}
      C:\Users\Simmons\AppData\Local\{E2C09DC2-92B6-465D-BF46-10ACFB5E150E}
      C:\Users\Simmons\AppData\Local\{E63B0742-214F-4C64-BD4A-AA25074D8929}
      C:\Users\Simmons\AppData\Local\{F2034231-BEDE-4FC5-80B9-CDC5A3811F1D}
      C:\Users\Simmons\AppData\Local\{F579401F-2D34-4798-B5F3-17D1957E6AD0}
      C:\Users\Simmons\AppData\Local\{F96C760F-7943-41AD-A71E-36AC22AF549D}
      C:\Users\Simmons\AppData\Local\{FBA0FF33-C8D8-44A8-A0A5-07ED47E87F44}
      C:\Users\Simmons\AppData\Local\{FC9BCE3A-450B-4111-A291-EEE65F171B4F}
      C:\Users\Simmons\AppData\Local\{FD6BB90B-0AC3-4CD8-B765-631F9C76ED49}
      C:\Users\Simmons\AppData\Local\{FFC4F5B9-3EAA-4A3A-8613-5A85623F560D}
      C:\Users\Simmons\AppData\Local\{FFF96F0E-B54A-4996-B28F-FA6CD90CE3EF}
      
    • Click the Look button to start the scan.
    • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
    Note: The log can also be found on your Desktop entitled SystemLook.txt


    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    Code:
    :services
    aspnet_state
    WMPNetworkSvc
    
    :reg
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{171DEBEB-C3D4-40b7-AC73-056A5EBA4A7E}]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670}]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670}\NoExplorer]
    
    :files
    C:\Users\Simmons\Local Settings\TEMP\80f5eu40cy322lpsuua0224
    C:\Windows\system32\tmp.txt
    C:\Windows\SysWOW64\tmp.txt
    C:\ProgramData\rebootpending.txt
    C:\ProgramData\7y6774w28t81a
    C:\ProgramData\80f5eu40cy322lpsuua0224
    C:\Users\Simmons\AppData\Roaming\GetValue.vbs
    C:\Users\Simmons\AppData\Roaming\SetValue.bat
    C:\Users\Simmons\AppData\Local\7y6774w28t81a
    C:\Users\Simmons\AppData\Local\80f5eu40cy322lpsuua0224
    C:\Users\Simmons\AppData\Roaming\Microsoft\Windows\Templates\7y6774w28t81a
    C:\Users\Simmons\AppData\Roaming\Microsoft\Windows\Templates\80f5eu40cy322lpsuua0224
    C:\Users\Simmons\Local Settings\TEMP\7zSA208.tmp
    
    :Commands
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into notepad, save it as something appropriate and attach it into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.

    I want you to run TDSSKiller so refer to the below for how to do so.

    TDSSkiller - How to run

    ATTACH the log please.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds