I have been working on this computer for over a week now trying to remove some bad mojo. The Zone Alarm went down at some point and PC was overrun with problems. I have completed the steps suggested in the "read this" memo as far as I could, but ran into a couple of problems.
The Panda ActiveScan was never able to complete removal of the problems it found. Ran it a couple of times and got the "Oops Sorry" message both tries. I am running it again to get the log which I did not save the last couple of times.
I also tried to install the windows service pack 1, but got an error telling me that I already had a newer version installed.
I appreciate any assistance you might be able to provide. I am going nuts trying to get cleaned up. I will post the logs I have. (The Panda ActiveScan is still running. I will post it later if its needed.)
Not sure exactly the type of information that you need but here is some system info.
/Windows XP Home Addition - version 5.1.2600 SP2 Build 2600
Internet Explorer - version 7.0.573011
Here are the logs that I have collected so far.:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 2:02:55 PM, on 4/26/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Boot mode: Safe mode with network support
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft....k/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://red.clientapp...//www.yahoo.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Adobe Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: (no name) - {4E7BD74F-2B8D-469E-CCB0-B130EEDBE97C} - (no file)
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [VAIO Update 2] "C:\Program Files\Sony\VAIO Update 2\VAIOUpdt.exe" /Stationary
O4 - HKLM\..\Run: [VAIO Recovery] C:\WINDOWS\Sonysys\VAIO Recovery\PartSeal.exe
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb01.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] HDAudPropShortcut.exe
O4 - HKLM\..\Run: [AlcWzrd] ALCWZRD.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [SsAAD.exe] C:\PROGRA~1\Sony\SONICS~1\SsAAD.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
O4 - HKLM\..\Run: [Malwarebytes Anti-Malware Reboot] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKCU\..\Run: [khfcolif] c:\documents and settings\edward mack.533034b8a6df4d9\local settings\application data\khfcolif.exe khfcolif
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Adobe Acrobat 6.0\Distillr\acrotray.exe
O4 - Global Startup: Remocon Driver.lnk = ?
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: PalTalk - {4EAFEF58-EEFA-4116-983D-03B49BCBFFFE} - C:\WINDOWS\system32\shdocvw.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.sony.com/vaiopeople
O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zon...kr.cab31267.cab
O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - http://a1540.g.akama...ex/qtplugin.cab
O16 - DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} (Office Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=58813
O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - http://zone.msn.com/...UI.cab34120.cab
O16 - DPF: {14B87622-7E19-4EA8-93B3-97215F77A6BC} (MessengerStatsClient Class) - http://messenger.zon...nt.cab31267.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=39204
O16 - DPF: {1A1F56AA-3401-46F9-B277-D57F3421F821} (FunGamesLoader Object) - http://www.worldwinn...GamesLoader.cab
O16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://acs.pandasoft...s/as2stubie.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (ZoneBuddy Class) - http://zone.msn.com/...dy.cab32846.cab
O16 - DPF: {3DA5D23B-EFE1-4181-ADB7-7D457567AACA} (TGOnlineCtrl Class) - http://zone.msn.com/...pandaonline.cab
O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} (MySpace Uploader Control) - http://lads.myspace....ploader1006.cab
O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - http://zone.msn.com/...at.cab32846.cab
O16 - DPF: {64D01C7F-810D-446E-A07E-16C764235644} (AtlAtomadersCtlAttrib Class) - http://zone.msn.com/...t/atomaders.cab
O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} (DivXBrowserPlugin Object) - http://download.divx...owserPlugin.cab
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.micros...b?1149555650322
O16 - DPF: {7E980B9B-8AE5-466A-B6D6-DA8CF814E78A} (MJLauncherCtrl Class) - http://www.shockwave...mjolauncher.cab
O16 - DPF: {8A94C905-FF9D-43B6-8708-F0F22D22B1CB} - http://www.worldwinn...ed/wwlaunch.cab
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zon...nt.cab31267.cab
O16 - DPF: {9AA73F41-EC64-489E-9A73-9CD52E528BC4} (ZoneAxRcMgr Class) - http://messenger.zon...ry/ZAxRcMgr.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn...pDownloader.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://cdn2.zone.msn...ro.cab56649.cab
O16 - DPF: {BCF9A64D-1440-4404-863C-F5DF2B99F798} (Catan Online Game) - http://zone.msn.com/...an.cab36308.cab
O16 - DPF: {CAC181B0-4D70-402D-B571-C596A47D0CE0} (CBankshotZoneCtrl Class) - http://zone.msn.com/...ol.cab36107.cab
O16 - DPF: {D77EF652-9A6B-40C8-A4B9-1C0697C6CF41} (TikGames Online Control) - http://zone.msn.com/.../default/gf.cab
O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (StadiumProxy Class) - http://zone.msn.com/...xy.cab35645.cab
O16 - DPF: {DA758BB1-5F89-4465-975F-8D7179A4BCF3} (WheelofFortune Object) - http://messenger.zon...oF.cab31267.cab
O16 - DPF: {DAF5D9A2-D982-4671-83E4-0398706A5F6A} (SCEWebLauncherCtl Object) - http://zone.msn.com/...WebLauncher.cab
O16 - DPF: {E5D419D6-A846-4514-9FAD-97E826C84822} (HeartbeatCtl Class) - http://fdl.msn.com/z...s/heartbeat.cab
O16 - DPF: {EF0DBA6F-43CE-4B26-9808-2AB38FA0DB29} (MSN Money Ticker) - http://fdl.msn.com/p.../v13/ticker.cab
O16 - DPF: {F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6} (MSN Chat Control 4.5) - http://chat.msn.com/bin/msnchat45.cab
O16 - DPF: {FE0BD779-44EE-4A4B-AA2E-743C63F2E5E6} (IWinAmpActiveX Class) - http://pdl.stream.ao.../ampx_en_dl.cab
O21 - SSODL: AlrtAvp - {3d017764-ed33-4df5-9a0c-91bc1addf3ea} - (no file)
O21 - SSODL: RunOnceVolume - {2f678595-603f-447c-b814-8939c0b76731} - (no file)
O22 - SharedTaskScheduler: {7b1eeccd-0a6d-4ad5-8ac1-4af5722b3885} - hubbsi - (no file)
O23 - Service: AdobeVersionCue - Adobe Sytems - C:\Program Files\Adobe\Adobe Version Cue\service\VersionCue.exe
O23 - Service: Ares Chatroom server (AresChatServer) - Ares Development Group - C:\Program Files\Ares\chatServer.exe
O23 - Service: Capture Device Service - InterVideo Inc. - C:\Program Files\Common Files\InterVideo\DeviceService\DevSvc.exe
O23 - Service: Giga Pocket Hardware Detector - Sony Corporation - C:\Program Files\Sony\Giga Pocket\shwserv.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: MSCSPTISRV - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Sony TV Tuner Controller - Sony Corporation - C:\Program Files\Sony\Giga Pocket\halsv.exe
O23 - Service: Sony TV Tuner Manager - Sony Corporation - C:\Program Files\Sony\Giga Pocket\RM_SV.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: SonicStage SCSI Service (SSScsiSV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SSScsiSV.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: VAIO Entertainment Aggregation and Control Service - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment\VzRs\VzRs.exe
O23 - Service: VAIO Entertainment File Import Service - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment\VzCdb\VzFw.exe
O23 - Service: VAIO Entertainment TV Device Arbitration Service - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment\VzCs\VzHardwareResourceManager\VzHardwareResourceManager.exe
O23 - Service: VAIO Entertainment UPnP Client Adapter - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment\VCSW\VCSW.exe
O23 - Service: VAIO Media Integrated Server (VAIOMediaPlatform-IntegratedServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\VMISrv.exe
O23 - Service: VAIO Media Integrated Server (HTTP) (VAIOMediaPlatform-IntegratedServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
O23 - Service: VAIO Media Integrated Server (UPnP) (VAIOMediaPlatform-IntegratedServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
O23 - Service: VAIO Media Gateway Server (VAIOMediaPlatform-Mobile-Gateway) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\VmGateway.exe
O23 - Service: VAIO Media Video Server (VAIOMediaPlatform-VideoServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Video\GPVSvr.exe
O23 - Service: VAIO Media Video Server (HTTP) (VAIOMediaPlatform-VideoServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
O23 - Service: VAIO Media Video Server (UPnP) (VAIOMediaPlatform-VideoServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
O24 - Desktop Component 0: Privacy Protection - file:///C:\WINDOWS\privacy_danger\index.htm
--
End of file - 13231 bytes
Malwarebytes' Anti-Malware 1.11
Database version: 667
Scan type: Full Scan (C:\|)
Objects scanned: 150669
Time elapsed: 1 hour(s), 10 minute(s), 27 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 2
Registry Keys Infected: 13
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 4
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
c:\WINDOWS\system32\tuvWqNFw.dll (Trojan.Vundo) -> Unloaded module successfully.
C:\WINDOWS\system32\ddcArpqN.dll (Trojan.Vundo) -> Unloaded module successfully.
Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{f50b3f5e-856e-4757-9bb1-b35d46ca7719} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{f50b3f5e-856e-4757-9bb1-b35d46ca7719} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\tuvwqnfw (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1f80bf95-624b-4488-8634-3365071b3b96} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1f80bf95-624b-4488-8634-3365071b3b96} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affltid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{f50b3f5e-856e-4757-9bb1-b35d46ca7719} (Trojan.Vundo) -> Quarantined and deleted successfully.
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
c:\WINDOWS\system32\tuvWqNFw.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\ddcArpqN.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\NqprAcdd.ini (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\NqprAcdd.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully.
SUPERAntiSpyware Scan Log
Generated 04/22/2008 at 00:13 AM
Application Version : 3.6.1000
Core Rules Database Version : 3444
Trace Rules Database Version: 1436
Scan type : Complete Scan
Total Scan Time : 03:12:36
Memory items scanned : 406
Memory threats detected : 0
Registry items scanned : 6402
Registry threats detected : 99
File items scanned : 109977
File threats detected : 91
Adware.Tracking Cookie
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\Cookies\[email protected][1].txt
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\My Documents\Edward Mack\Cookies\edward mack@2o7[2].txt
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\My Documents\Edward Mack\Cookies\edward mack@advertising[1].txt
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\My Documents\Edward Mack\Cookies\edward mack@atdmt[2].txt
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\My Documents\Edward Mack\Cookies\edward [email protected][1].txt
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\My Documents\Edward Mack\Cookies\edward mack@doubleclick[2].txt
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\My Documents\Edward Mack\Cookies\edward [email protected][2].txt
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\My Documents\Edward Mack\Cookies\edward mack@hitbox[2].txt
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\My Documents\Edward Mack\Cookies\edward mack@insightexpress[2].txt
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\My Documents\Edward Mack\Cookies\edward mack@maxserving[1].txt
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\My Documents\Edward Mack\Cookies\edward mack@mediaplex[1].txt
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\My Documents\Edward Mack\Cookies\edward mack@questionmarket[2].txt
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\My Documents\Edward Mack\Cookies\edward [email protected][2].txt
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\My Documents\Edward Mack\Cookies\edward mack@serving-sys[1].txt
Adware.MovieLand/MediaPipe
HKLM\Software\MediaPipe
HKLM\Software\MediaPipe\Prefs
HKLM\Software\MediaPipe\Prefs#GUID
C:\Program Files\moviepass Terms.html
C:\Program Files\MediaPipe\ItBill_terms.txt
C:\Program Files\MediaPipe\register.dll
C:\Program Files\MediaPipe
Adware.HotBar/SpamBlockerUtility (Low Risk)
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\Application Data\SpamBlocker
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\Application Data\SpamBlockerUtility\v3.0\SpamBlockerUtility\static\1\btntrans.idx
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\Application Data\SpamBlockerUtility\v3.0\SpamBlockerUtility\static\1
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\Application Data\SpamBlockerUtility\v3.0\SpamBlockerUtility\static
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\Application Data\SpamBlockerUtility\v3.0\SpamBlockerUtility
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\Application Data\SpamBlockerUtility\v3.0
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\Application Data\SpamBlockerUtility
Browser Hijacker.Internet Explorer Settings Hijack
HKU\S-1-5-21-640180339-3460185986-3248242493-1006\Software\Microsoft\Internet Explorer\Main#Start Page [ http://softwarerefer...=...6Ojg5&lid=2 ]
Malware.SpywareQuake
C:\Program Files\SpyQuake2.com\ignored.lst
C:\Program Files\SpyQuake2.com
HKCR\TypeLib\{5E05EA9F-1EA7-4D0B-A09B-D5E29EC758B9}
HKCR\TypeLib\{5E05EA9F-1EA7-4D0B-A09B-D5E29EC758B9}\1.0
HKCR\TypeLib\{5E05EA9F-1EA7-4D0B-A09B-D5E29EC758B9}\1.0\0
HKCR\TypeLib\{5E05EA9F-1EA7-4D0B-A09B-D5E29EC758B9}\1.0\0\win32
HKCR\TypeLib\{5E05EA9F-1EA7-4D0B-A09B-D5E29EC758B9}\1.0\FLAGS
HKCR\TypeLib\{5E05EA9F-1EA7-4D0B-A09B-D5E29EC758B9}\1.0\HELPDIR
HKCR\Interface\{2DD8D482-8F1C-4180-AA8E-9D5819E5F2EA}
HKCR\Interface\{2DD8D482-8F1C-4180-AA8E-9D5819E5F2EA}\ProxyStubClsid
HKCR\Interface\{2DD8D482-8F1C-4180-AA8E-9D5819E5F2EA}\ProxyStubClsid32
HKCR\Interface\{2DD8D482-8F1C-4180-AA8E-9D5819E5F2EA}\TypeLib
HKCR\Interface\{2DD8D482-8F1C-4180-AA8E-9D5819E5F2EA}\TypeLib#Version
HKCR\Interface\{411F83B1-A0EC-4155-AF99-0137F5EFB270}
HKCR\Interface\{411F83B1-A0EC-4155-AF99-0137F5EFB270}\ProxyStubClsid
HKCR\Interface\{411F83B1-A0EC-4155-AF99-0137F5EFB270}\ProxyStubClsid32
HKCR\Interface\{411F83B1-A0EC-4155-AF99-0137F5EFB270}\TypeLib
HKCR\Interface\{411F83B1-A0EC-4155-AF99-0137F5EFB270}\TypeLib#Version
HKCR\Interface\{4E3645AF-7A81-4F83-9B8C-1E4F930D873F}
HKCR\Interface\{4E3645AF-7A81-4F83-9B8C-1E4F930D873F}\ProxyStubClsid
HKCR\Interface\{4E3645AF-7A81-4F83-9B8C-1E4F930D873F}\ProxyStubClsid32
HKCR\Interface\{4E3645AF-7A81-4F83-9B8C-1E4F930D873F}\TypeLib
HKCR\Interface\{4E3645AF-7A81-4F83-9B8C-1E4F930D873F}\TypeLib#Version
HKCR\Interface\{61032A65-2371-4C89-B5BB-DF73090FB5EA}
HKCR\Interface\{61032A65-2371-4C89-B5BB-DF73090FB5EA}\ProxyStubClsid
HKCR\Interface\{61032A65-2371-4C89-B5BB-DF73090FB5EA}\ProxyStubClsid32
HKCR\Interface\{61032A65-2371-4C89-B5BB-DF73090FB5EA}\TypeLib
HKCR\Interface\{61032A65-2371-4C89-B5BB-DF73090FB5EA}\TypeLib#Version
HKCR\Interface\{66189AF2-7726-46E8-8628-0F95AB854792}
HKCR\Interface\{66189AF2-7726-46E8-8628-0F95AB854792}\ProxyStubClsid
HKCR\Interface\{66189AF2-7726-46E8-8628-0F95AB854792}\ProxyStubClsid32
HKCR\Interface\{66189AF2-7726-46E8-8628-0F95AB854792}\TypeLib
HKCR\Interface\{66189AF2-7726-46E8-8628-0F95AB854792}\TypeLib#Version
HKCR\Interface\{7A2F6251-6C99-4DA5-9827-954EB45DCB82}
HKCR\Interface\{7A2F6251-6C99-4DA5-9827-954EB45DCB82}\ProxyStubClsid
HKCR\Interface\{7A2F6251-6C99-4DA5-9827-954EB45DCB82}\ProxyStubClsid32
HKCR\Interface\{7A2F6251-6C99-4DA5-9827-954EB45DCB82}\TypeLib
HKCR\Interface\{7A2F6251-6C99-4DA5-9827-954EB45DCB82}\TypeLib#Version
HKCR\Interface\{82C6C396-DD7B-4CE5-B668-C0087D1F3A1F}
HKCR\Interface\{82C6C396-DD7B-4CE5-B668-C0087D1F3A1F}\ProxyStubClsid
HKCR\Interface\{82C6C396-DD7B-4CE5-B668-C0087D1F3A1F}\ProxyStubClsid32
HKCR\Interface\{82C6C396-DD7B-4CE5-B668-C0087D1F3A1F}\TypeLib
HKCR\Interface\{82C6C396-DD7B-4CE5-B668-C0087D1F3A1F}\TypeLib#Version
HKCR\Interface\{853E0D78-F4C2-47CB-A3F5-A774DA60DFCD}
HKCR\Interface\{853E0D78-F4C2-47CB-A3F5-A774DA60DFCD}\ProxyStubClsid
HKCR\Interface\{853E0D78-F4C2-47CB-A3F5-A774DA60DFCD}\ProxyStubClsid32
HKCR\Interface\{853E0D78-F4C2-47CB-A3F5-A774DA60DFCD}\TypeLib
HKCR\Interface\{853E0D78-F4C2-47CB-A3F5-A774DA60DFCD}\TypeLib#Version
HKCR\Interface\{94786C47-EB3F-4BD5-A66B-0D49E2C90541}
HKCR\Interface\{94786C47-EB3F-4BD5-A66B-0D49E2C90541}\ProxyStubClsid
HKCR\Interface\{94786C47-EB3F-4BD5-A66B-0D49E2C90541}\ProxyStubClsid32
HKCR\Interface\{94786C47-EB3F-4BD5-A66B-0D49E2C90541}\TypeLib
HKCR\Interface\{94786C47-EB3F-4BD5-A66B-0D49E2C90541}\TypeLib#Version
HKCR\Interface\{9989A9BC-9828-467E-AF06-E3B279E6E97B}
HKCR\Interface\{9989A9BC-9828-467E-AF06-E3B279E6E97B}\ProxyStubClsid
HKCR\Interface\{9989A9BC-9828-467E-AF06-E3B279E6E97B}\ProxyStubClsid32
HKCR\Interface\{9989A9BC-9828-467E-AF06-E3B279E6E97B}\TypeLib
HKCR\Interface\{9989A9BC-9828-467E-AF06-E3B279E6E97B}\TypeLib#Version
HKCR\Interface\{B2B3702A-5425-489E-A3AF-EDCCAFEBA019}
HKCR\Interface\{B2B3702A-5425-489E-A3AF-EDCCAFEBA019}\ProxyStubClsid
HKCR\Interface\{B2B3702A-5425-489E-A3AF-EDCCAFEBA019}\ProxyStubClsid32
HKCR\Interface\{B2B3702A-5425-489E-A3AF-EDCCAFEBA019}\TypeLib
HKCR\Interface\{B2B3702A-5425-489E-A3AF-EDCCAFEBA019}\TypeLib#Version
HKCR\Interface\{C1C56112-2B2E-4D3C-8CFC-7E10C77FACEF}
HKCR\Interface\{C1C56112-2B2E-4D3C-8CFC-7E10C77FACEF}\ProxyStubClsid
HKCR\Interface\{C1C56112-2B2E-4D3C-8CFC-7E10C77FACEF}\ProxyStubClsid32
HKCR\Interface\{C1C56112-2B2E-4D3C-8CFC-7E10C77FACEF}\TypeLib
HKCR\Interface\{C1C56112-2B2E-4D3C-8CFC-7E10C77FACEF}\TypeLib#Version
HKCR\Interface\{D01D4AAB-22C5-427F-A941-C4B65A3D8A23}
HKCR\Interface\{D01D4AAB-22C5-427F-A941-C4B65A3D8A23}\ProxyStubClsid
HKCR\Interface\{D01D4AAB-22C5-427F-A941-C4B65A3D8A23}\ProxyStubClsid32
HKCR\Interface\{D01D4AAB-22C5-427F-A941-C4B65A3D8A23}\TypeLib
HKCR\Interface\{D01D4AAB-22C5-427F-A941-C4B65A3D8A23}\TypeLib#Version
HKCR\Interface\{DDB0D689-FAE0-4165-9F7C-877602F9DD66}
HKCR\Interface\{DDB0D689-FAE0-4165-9F7C-877602F9DD66}\ProxyStubClsid
HKCR\Interface\{DDB0D689-FAE0-4165-9F7C-877602F9DD66}\ProxyStubClsid32
HKCR\Interface\{DDB0D689-FAE0-4165-9F7C-877602F9DD66}\TypeLib
HKCR\Interface\{DDB0D689-FAE0-4165-9F7C-877602F9DD66}\TypeLib#Version
HKCR\Interface\{E5AD5BD5-C710-45E0-ABD3-E770FE85DAE8}
HKCR\Interface\{E5AD5BD5-C710-45E0-ABD3-E770FE85DAE8}\ProxyStubClsid
HKCR\Interface\{E5AD5BD5-C710-45E0-ABD3-E770FE85DAE8}\ProxyStubClsid32
HKCR\Interface\{E5AD5BD5-C710-45E0-ABD3-E770FE85DAE8}\TypeLib
HKCR\Interface\{E5AD5BD5-C710-45E0-ABD3-E770FE85DAE8}\TypeLib#Version
HKCR\Interface\{EB5CA3AF-26C1-467B-9A55-2820E0451AAB}
HKCR\Interface\{EB5CA3AF-26C1-467B-9A55-2820E0451AAB}\ProxyStubClsid
HKCR\Interface\{EB5CA3AF-26C1-467B-9A55-2820E0451AAB}\ProxyStubClsid32
HKCR\Interface\{EB5CA3AF-26C1-467B-9A55-2820E0451AAB}\TypeLib
HKCR\Interface\{EB5CA3AF-26C1-467B-9A55-2820E0451AAB}\TypeLib#Version
Trojan.Media-Codec
HKCR\EMediaCodek.Chl
HKCR\EMediaCodek.Chl\CLSID
Adware.Zango Toolbar/Hb
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\Application Data\Zango\IESkins
C:\Documents and Settings\Edward Mack.533034B8A6DF4D9\Application Data\Zango
Trojan.DNSChanger-Codec
HKLM\Software\NetProjft
HKLM\Software\NetProjft\Windows
HKLM\Software\NetProjft\Windows\ectntVersion
HKLM\Software\NetProjft\Windows\ectntVersion\Explorer
HKLM\Software\NetProjft\Windows\ectntVersion\Explorer\Browser Helper Objects
HKLM\Software\NetProjft\Windows\ectntVersion\Explorer\Browser Helper Objects\{7C109800-A5D5-438F-9640-18D17E168B88}
HKU\S-1-5-21-640180339-3460185986-3248242493-1006\Software\uninstall
Trojan.Media-Codec/V5
C:\Program Files\NetProject\sbmdl.dll
C:\Program Files\NetProject\wamdl.dll
C:\Program Files\NetProject
Rogue.VirusIsolator
C:\DOCUMENTS AND SETTINGS\EDWARD MACK.533034B8A6DF4D9\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\6FLAWCTQ\VIRUSISOLATOR[1].EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP889\A0302793.EXE
Rogue.NetProject-Installer
C:\DOCUMENTS AND SETTINGS\EDWARD MACK.533034B8A6DF4D9\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\BS2M80ZN\SETUP[1].EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP881\A0301208.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP882\A0301221.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP885\A0302480.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP885\A0302530.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP885\A0302547.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP885\A0302665.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP885\A0302691.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP886\A0302719.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP888\A0302732.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP888\A0302742.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP889\A0302761.EXE
Trojan.NewDotNet
C:\DOCUMENTS AND SETTINGS\EDWARD MACK.533034B8A6DF4D9\MY DOCUMENTS\CLEANUP SOFTWARE\NNUNINSTALL.EXE
Adware.180solutions/Seekmo
C:\PROGRAM FILES\MOZILLA FIREFOX\PLUGINS\NPCLNTAX_SEEKMOSA.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP889\A0302774.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP889\A0302775.DLL
Unclassified.Unknown Origin/System
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP842\A0281224.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP842\A0281226.EXE
Trojan.Unclassified/GTS
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP842\A0281230.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP875\A0292353.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP877\A0294644.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP889\A0302797.DLL
Adware.SXGAdvisor-A
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP842\A0281232.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP875\A0292351.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP877\A0294642.DLL
C:\WINDOWS\QNMARGOLXPG.DLL
Malware.MalwareStopper
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP881\A0301172.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP881\A0301173.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP881\A0301174.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP882\A0301280.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP882\A0301281.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP882\A0301282.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP885\A0302516.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP885\A0302517.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP885\A0302518.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP889\A0302778.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP889\A0302779.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP889\A0302780.DLL
Malware.VirusRanger
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP882\A0301225.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP882\A0301238.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP882\A0301243.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP885\A0302495.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP885\A0302504.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP889\A0302772.DLL
Rogue.VirusHeat
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP882\A0301244.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP882\A0301255.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP885\A0302508.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP885\A0302514.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP889\A0302791.EXE
Trojan.Smitfraud Variant
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP882\A0301257.DLL
C:\WINDOWS\SYSTEM32\BUBBJ.DLL
Trojan.Unknown Origin
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP882\A0301258.ICO
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP882\A0301259.ICO
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP889\A0302760.ICO
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP889\A0302764.ICO
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP889\A0302789.ICO
C:\SYSTEM VOLUME INFORMATION\_RESTORE{159753DE-EE53-486D-B525-FCDDC8F0A2EB}\RP889\A0302790.ICO
Thanks again for any assitance,
V