Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

Presumed Spyware infections, that keeps playin music,


  • Please log in to reply

#1
big j

big j

    New Member

  • Member
  • Pip
  • 3 posts
This is the Deal, I have Windows XP, I keep hearing music whenever i close out certain websites,
Now when i do that it plays the whole song of either Rap or garbage head banging Music even tho the site was closed and it just keeps on playing and playing, now i know it isnt coming from my Media Player cause i dont listen to that junk, I presumed Spyware or Trojans and i was Correct, cause after i followed the Scan Guide that you had to read before posting, it found alot of stuff but i would like to have someone read those logs to see if the Infection is gone after the Scans i did, I have the Hijack this Log, Panda Scan Log and the Super anit spyware Log, I am only gonna post the Hijack this and will post the others if asked to,


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:49:26 AM, on 11/18/2007
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2600.0000)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\Common Files\AOL\Loader\aolload.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.myspace.com/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = ;<local>
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.1.615.5858\swg.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [Verizon Custom Uninstall Tracking] C:\DOCUME~1\GATEWA~1\LOCALS~1\Temp\InstallHelper.exe /uninstalltrackingvendor=Verizon
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O15 - Trusted Zone: http://www.captialone.com
O15 - Trusted Zone: http://www.lesbianpayperview.com
O15 - Trusted Zone: http://www.msn.com
O15 - Trusted Zone: http://www.myspace.com
O15 - Trusted Zone: http://www.tracfone.com
O15 - Trusted Zone: http://www.verizon.net
O15 - Trusted Zone: *.avsystemcare.com (HKLM)
O15 - Trusted Zone: *.gomyhit.com (HKLM)
O15 - Trusted Zone: *.imageservr.com (HKLM)
O15 - Trusted Zone: *.onerateld.com (HKLM)
O15 - Trusted Zone: *.trustedantivirus.com (HKLM)
O15 - Trusted Zone: *.virusschlacht.com (HKLM)
O16 - DPF: {01113300-3E00-11D2-8470-0060089874ED} (Support.com Configuration Class) - https://activatemyds...DSL/tgctlcm.cab
O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} (MySpace Uploader Control) - http://lads.myspace....ploader1005.cab
O16 - DPF: {50BD5CDA-4BA8-4048-8FAA-763F222E41D8} - ms-its:mhtml:file://c:\\nores.mht!http://adxrnet.net/c...::/xpreload.ocx
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.r...ip/RdxIE601.cab
O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebo...otoUploader.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O24 - Desktop Component 0: (no name) - C:\Program Files\Common Files\rteke.html

--
End of file - 4537 bytes
  • 0

Advertisements


#2
big j

big j

    New Member

  • Topic Starter
  • Member
  • Pip
  • 3 posts
This is My Super anit-spyware log



SUPERAntiSpyware Scan Log
Generated 11/18/2007 at 10:50 AM

Application Version : 3.6.1000

Core Rules Database Version : 3346
Trace Rules Database Version: 1347

Scan type : Complete Scan
Total Scan Time : 00:55:10

Memory items scanned : 296
Memory threats detected : 0
Registry items scanned : 4361
Registry threats detected : 108
File items scanned : 17124
File threats detected : 35

Trojan.Bronto/V1
HKLM\Software\Classes\CLSID\{D27987B8-7244-4DE0-AE10-39B826B492F1}
HKCR\CLSID\{D27987B8-7244-4DE0-AE10-39B826B492F1}
HKCR\CLSID\{D27987B8-7244-4DE0-AE10-39B826B492F1}\InprocServer32
HKCR\CLSID\{D27987B8-7244-4DE0-AE10-39B826B492F1}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\MSXML9R.DLL

Browser Hijacker.Internet Explorer Zone Hijack
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\amaena.com
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\amaena.com#*
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\imagesrvr.com
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\imagesrvr.com#*

Adware.Tracking Cookie
C:\Documents and Settings\Gateway User\Cookies\gateway [email protected][1].txt
C:\Documents and Settings\Gateway User\Cookies\gateway user@atdmt[2].txt
C:\Documents and Settings\Gateway User\Cookies\gateway user@findwhat[1].txt
C:\Documents and Settings\Gateway User\Cookies\gateway [email protected][1].txt
C:\Documents and Settings\Gateway User\Cookies\gateway user@doubleclick[1].txt
C:\Documents and Settings\Gateway User\Local Settings\Temp\Cookies\gateway [email protected][1].txt
C:\Documents and Settings\Gateway User\Local Settings\Temp\Cookies\gateway user@atdmt[2].txt
C:\Documents and Settings\Gateway User\Local Settings\Temp\Cookies\gateway user@advertising[1].txt
C:\Documents and Settings\Gateway User\Local Settings\Temp\Cookies\gateway user@atwola[1].txt
C:\Documents and Settings\Gateway User\Local Settings\Temp\Cookies\gateway user@2o7[1].txt
C:\Documents and Settings\Gateway User\Local Settings\Temp\Cookies\gateway [email protected][2].txt
C:\Documents and Settings\Gateway User\Local Settings\Temp\Cookies\gateway user@adrevolver[1].txt
C:\Documents and Settings\Gateway User\Local Settings\Temp\Cookies\gateway user@adrevolver[3].txt
C:\Documents and Settings\Gateway User\Local Settings\Temp\Cookies\gateway user@tribalfusion[1].txt
C:\Documents and Settings\Gateway User\Local Settings\Temp\Cookies\gateway user@mediaplex[2].txt
C:\Documents and Settings\Gateway User\Local Settings\Temp\Cookies\gateway [email protected][2].txt

Malware.AntiVirGear
HKCR\CLSID\{3BC3AC5B-3BBB-9DBE-8166-EC650E3B9B48}
HKCR\CLSID\{3BC3AC5B-3BBB-9DBE-8166-EC650E3B9B48}\bjfgNql
HKCR\CLSID\{3BC3AC5B-3BBB-9DBE-8166-EC650E3B9B48}\cjdifwm
HKCR\CLSID\{3BC3AC5B-3BBB-9DBE-8166-EC650E3B9B48}\InProcServer32
HKCR\CLSID\{3BC3AC5B-3BBB-9DBE-8166-EC650E3B9B48}\InProcServer32#ThreadingModel
HKCR\CLSID\{3BC3AC5B-3BBB-9DBE-8166-EC650E3B9B48}\owaIdzUnF
HKCR\CLSID\{3BC3AC5B-3BBB-9DBE-8166-EC650E3B9B48}\ProgId
HKCR\CLSID\{3BC3AC5B-3BBB-9DBE-8166-EC650E3B9B48}\ptlkYypqoudVb
HKCR\CLSID\{3BC3AC5B-3BBB-9DBE-8166-EC650E3B9B48}\rfiihaGiuwdLO
HKCR\CLSID\{3BC3AC5B-3BBB-9DBE-8166-EC650E3B9B48}\UjTdEnpc
HKCR\CLSID\{3BC3AC5B-3BBB-9DBE-8166-EC650E3B9B48}\VersionIndependentProgId
HKCR\CLSID\{3BC3AC5B-3BBB-9DBE-8166-EC650E3B9B48}\ztnAgvIPum
HKCR\CLSID\{3BC3AC5B-3BBB-9DBE-8166-EC650E3B9B48}\zVgZgjAaj
HKCR\TypeLib\{DE6AE29A-EB7D-4656-9418-26D5FCC9ADF5}
HKCR\TypeLib\{DE6AE29A-EB7D-4656-9418-26D5FCC9ADF5}\1.0
HKCR\TypeLib\{DE6AE29A-EB7D-4656-9418-26D5FCC9ADF5}\1.0\0
HKCR\TypeLib\{DE6AE29A-EB7D-4656-9418-26D5FCC9ADF5}\1.0\0\win32
HKCR\TypeLib\{DE6AE29A-EB7D-4656-9418-26D5FCC9ADF5}\1.0\FLAGS
HKCR\TypeLib\{DE6AE29A-EB7D-4656-9418-26D5FCC9ADF5}\1.0\HELPDIR
HKCR\Interface\{0A0FC1A4-41D4-4793-9AC5-0B55CDC95AE9}
HKCR\Interface\{0A0FC1A4-41D4-4793-9AC5-0B55CDC95AE9}\ProxyStubClsid
HKCR\Interface\{0A0FC1A4-41D4-4793-9AC5-0B55CDC95AE9}\ProxyStubClsid32
HKCR\Interface\{0A0FC1A4-41D4-4793-9AC5-0B55CDC95AE9}\TypeLib
HKCR\Interface\{0A0FC1A4-41D4-4793-9AC5-0B55CDC95AE9}\TypeLib#Version
HKCR\Interface\{14F47CA3-2291-4B3E-9ED4-8C7E6AE80851}
HKCR\Interface\{14F47CA3-2291-4B3E-9ED4-8C7E6AE80851}\ProxyStubClsid
HKCR\Interface\{14F47CA3-2291-4B3E-9ED4-8C7E6AE80851}\ProxyStubClsid32
HKCR\Interface\{14F47CA3-2291-4B3E-9ED4-8C7E6AE80851}\TypeLib
HKCR\Interface\{14F47CA3-2291-4B3E-9ED4-8C7E6AE80851}\TypeLib#Version
HKCR\Interface\{2447284F-3590-4E8C-A869-049BD87CAD07}
HKCR\Interface\{2447284F-3590-4E8C-A869-049BD87CAD07}\ProxyStubClsid
HKCR\Interface\{2447284F-3590-4E8C-A869-049BD87CAD07}\ProxyStubClsid32
HKCR\Interface\{2447284F-3590-4E8C-A869-049BD87CAD07}\TypeLib
HKCR\Interface\{2447284F-3590-4E8C-A869-049BD87CAD07}\TypeLib#Version
HKCR\Interface\{38EEEF46-CA24-4ACA-A90D-540978DF7252}
HKCR\Interface\{38EEEF46-CA24-4ACA-A90D-540978DF7252}\ProxyStubClsid
HKCR\Interface\{38EEEF46-CA24-4ACA-A90D-540978DF7252}\ProxyStubClsid32
HKCR\Interface\{38EEEF46-CA24-4ACA-A90D-540978DF7252}\TypeLib
HKCR\Interface\{38EEEF46-CA24-4ACA-A90D-540978DF7252}\TypeLib#Version
HKCR\Interface\{3D5E5AE1-5DED-4520-BDC2-B9292EA708CA}
HKCR\Interface\{3D5E5AE1-5DED-4520-BDC2-B9292EA708CA}\ProxyStubClsid
HKCR\Interface\{3D5E5AE1-5DED-4520-BDC2-B9292EA708CA}\ProxyStubClsid32
HKCR\Interface\{3D5E5AE1-5DED-4520-BDC2-B9292EA708CA}\TypeLib
HKCR\Interface\{3D5E5AE1-5DED-4520-BDC2-B9292EA708CA}\TypeLib#Version
HKCR\Interface\{409A05EF-1B48-4198-B6BF-993B8B52790C}
HKCR\Interface\{409A05EF-1B48-4198-B6BF-993B8B52790C}\ProxyStubClsid
HKCR\Interface\{409A05EF-1B48-4198-B6BF-993B8B52790C}\ProxyStubClsid32
HKCR\Interface\{409A05EF-1B48-4198-B6BF-993B8B52790C}\TypeLib
HKCR\Interface\{409A05EF-1B48-4198-B6BF-993B8B52790C}\TypeLib#Version
HKCR\Interface\{47A93011-1004-440C-9960-BD3B0348A7C2}
HKCR\Interface\{47A93011-1004-440C-9960-BD3B0348A7C2}\ProxyStubClsid
HKCR\Interface\{47A93011-1004-440C-9960-BD3B0348A7C2}\ProxyStubClsid32
HKCR\Interface\{47A93011-1004-440C-9960-BD3B0348A7C2}\TypeLib
HKCR\Interface\{47A93011-1004-440C-9960-BD3B0348A7C2}\TypeLib#Version
HKCR\Interface\{50B388D5-4A80-4191-8BCC-5DD031D7F3EE}
HKCR\Interface\{50B388D5-4A80-4191-8BCC-5DD031D7F3EE}\ProxyStubClsid
HKCR\Interface\{50B388D5-4A80-4191-8BCC-5DD031D7F3EE}\ProxyStubClsid32
HKCR\Interface\{50B388D5-4A80-4191-8BCC-5DD031D7F3EE}\TypeLib
HKCR\Interface\{50B388D5-4A80-4191-8BCC-5DD031D7F3EE}\TypeLib#Version
HKCR\Interface\{58A1ACE6-0DBA-45D2-8154-E8253A7B87BB}
HKCR\Interface\{58A1ACE6-0DBA-45D2-8154-E8253A7B87BB}\ProxyStubClsid
HKCR\Interface\{58A1ACE6-0DBA-45D2-8154-E8253A7B87BB}\ProxyStubClsid32
HKCR\Interface\{58A1ACE6-0DBA-45D2-8154-E8253A7B87BB}\TypeLib
HKCR\Interface\{58A1ACE6-0DBA-45D2-8154-E8253A7B87BB}\TypeLib#Version
HKCR\Interface\{73D25394-992F-43D1-BF92-48494CC0D1AE}
HKCR\Interface\{73D25394-992F-43D1-BF92-48494CC0D1AE}\ProxyStubClsid
HKCR\Interface\{73D25394-992F-43D1-BF92-48494CC0D1AE}\ProxyStubClsid32
HKCR\Interface\{73D25394-992F-43D1-BF92-48494CC0D1AE}\TypeLib
HKCR\Interface\{73D25394-992F-43D1-BF92-48494CC0D1AE}\TypeLib#Version
HKCR\Interface\{7D2A83A4-0687-4704-937E-A29045826F77}
HKCR\Interface\{7D2A83A4-0687-4704-937E-A29045826F77}\ProxyStubClsid
HKCR\Interface\{7D2A83A4-0687-4704-937E-A29045826F77}\ProxyStubClsid32
HKCR\Interface\{7D2A83A4-0687-4704-937E-A29045826F77}\TypeLib
HKCR\Interface\{7D2A83A4-0687-4704-937E-A29045826F77}\TypeLib#Version
HKCR\Interface\{A7FE54B2-B167-4017-BCCC-CF73B2F678E3}
HKCR\Interface\{A7FE54B2-B167-4017-BCCC-CF73B2F678E3}\ProxyStubClsid
HKCR\Interface\{A7FE54B2-B167-4017-BCCC-CF73B2F678E3}\ProxyStubClsid32
HKCR\Interface\{A7FE54B2-B167-4017-BCCC-CF73B2F678E3}\TypeLib
HKCR\Interface\{A7FE54B2-B167-4017-BCCC-CF73B2F678E3}\TypeLib#Version
HKCR\Interface\{C183B073-2D7F-45BC-8967-80147CECEE45}
HKCR\Interface\{C183B073-2D7F-45BC-8967-80147CECEE45}\ProxyStubClsid
HKCR\Interface\{C183B073-2D7F-45BC-8967-80147CECEE45}\ProxyStubClsid32
HKCR\Interface\{C183B073-2D7F-45BC-8967-80147CECEE45}\TypeLib
HKCR\Interface\{C183B073-2D7F-45BC-8967-80147CECEE45}\TypeLib#Version
HKCR\Interface\{F6FDBF9A-19A7-4F0A-9F46-6F015A067B44}
HKCR\Interface\{F6FDBF9A-19A7-4F0A-9F46-6F015A067B44}\ProxyStubClsid
HKCR\Interface\{F6FDBF9A-19A7-4F0A-9F46-6F015A067B44}\ProxyStubClsid32
HKCR\Interface\{F6FDBF9A-19A7-4F0A-9F46-6F015A067B44}\TypeLib
HKCR\Interface\{F6FDBF9A-19A7-4F0A-9F46-6F015A067B44}\TypeLib#Version
HKCR\Interface\{F90A7969-20A0-4257-B39D-9C73D64CE3B0}
HKCR\Interface\{F90A7969-20A0-4257-B39D-9C73D64CE3B0}\ProxyStubClsid
HKCR\Interface\{F90A7969-20A0-4257-B39D-9C73D64CE3B0}\ProxyStubClsid32
HKCR\Interface\{F90A7969-20A0-4257-B39D-9C73D64CE3B0}\TypeLib
HKCR\Interface\{F90A7969-20A0-4257-B39D-9C73D64CE3B0}\TypeLib#Version
HKCR\Interface\{FA38F299-57F8-4FEB-9096-715460AE943C}
HKCR\Interface\{FA38F299-57F8-4FEB-9096-715460AE943C}\ProxyStubClsid
HKCR\Interface\{FA38F299-57F8-4FEB-9096-715460AE943C}\ProxyStubClsid32
HKCR\Interface\{FA38F299-57F8-4FEB-9096-715460AE943C}\TypeLib
HKCR\Interface\{FA38F299-57F8-4FEB-9096-715460AE943C}\TypeLib#Version

Trojan.Media-Codec/V4
HKU\S-1-5-21-1614895754-1606980848-1060284298-1004\Software\Online Add-on

Trojan.Unknown Origin
C:\WINDOWS\TTC-4444.EXE
C:\WINDOWS\SYSTEM32\I2\MPER83122.EXE
C:\WINDOWS\UNINSTALL_NMON.VBS

Rootkit.RunTime2
C:\WINDOWS\SYSTEM32\DRIVERS\RUNTIME2.SYS

Adware.Adservs
C:\WINDOWS\SYSTEM32\A1\DNSLOOK11.EXE

Trojan.Rootkit-SpamPoof
C:\WINDOWS\SYSTEM32\KOOS.EXE
C:\WINDOWS\SYSTEM32\KPROF
C:\WINDOWS\SYSTEM32\POOF

Trojan.Downloader-Gen/Burre
C:\WINDOWS\SYSTEM32\SIPOV.DLL

Trojan.ZQuest-Installer
C:\WINDOWS\TK58.EXE

Trojan.Downloader-Gen/MROFIN
C:\WINDOWS\MROFINU1000106.EXE

Trojan.Downloader-Gen/Installer
C:\WINDOWS\B122.EXE

Trojan.ZQuest
C:\PROGRAM FILES\COMMON FILES\QUBA.DLL

Adware.k8l
C:\PROGRAM FILES\COMMON FILES\RTEKE.HTML

Trojan.Downloader-Gen/SnapSNet
C:\DOCUMENTS AND SETTINGS\GATEWAY USER\LOCAL SETTINGS\TEMP\SNAPSNET.EXE

Malware.LocusSoftware Inc/BestSellerAntivirus
C:\DOCUMENTS AND SETTINGS\GATEWAY USER\LOCAL SETTINGS\TEMP\WINTAVSNET.EXE

Trojan.Downloader-CommandDesktop
C:\DOCUMENTS AND SETTINGS\GATEWAY USER\LOCAL SETTINGS\TEMP\CMDINST.EXE

Trace.Known Threat Sources
C:\Documents and Settings\Gateway User\Local Settings\Temporary Internet Files\Content.IE5\KTAJR093\epy[1].htm

  • 0

#3
big j

big j

    New Member

  • Topic Starter
  • Member
  • Pip
  • 3 posts
This is my Panda Live Scan Log it was done right after the super anit-spyware scan



Incident Status Location

Virus:Trj/Downloader.MDW Disinfected C:\WINDOWS\NWAN.DAT
Spyware:Cookie/2o7 Not disinfected C:\Documents and Settings\Gateway User\Cookies\gateway user@2o7[1].txt

  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP