Malwarebytes Anti-Malware
www.malwarebytes.org
Scan Date: 6/8/2014
Scan Time: 3:25:14 PM
Logfile:
Administrator: Yes
Version: 2.00.2.1012
Malware Database: v2014.06.08.06
Rootkit Database: v2014.06.02.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled
OS: Windows XP Service Pack 3
CPU: x86
File System: NTFS
User: Matt
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 241273
Time Elapsed: 24 min, 56 sec
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
Processes: 8
Trojan.Agent.ED, C:\WINDOWS\system32\zouvokn.exe, 288, Delete-on-Reboot, [d333601690eb59dd37e971d0bb4544bc]
Trojan.Agent.ED, C:\WINDOWS\system32\ysaxymaqhe.exe, 436, Delete-on-Reboot, [a75fd3a37b00b086200072cffb0546ba]
Trojan.Agent.ED, C:\WINDOWS\system32\nonuhoi.exe, 460, Delete-on-Reboot, [1bebf5817704270fbf61b889946c2ed2]
Trojan.Agent.ED, C:\WINDOWS\system32\buzeo.exe, 480, Delete-on-Reboot, [f1151462641756e03ee26fd24cb4be42]
Trojan.Agent.ED, C:\WINDOWS\system32\ovezo.exe, 688, Delete-on-Reboot, [fc0a294d6a116dc94bd573cec63ad62a]
Trojan.Agent.ED, C:\WINDOWS\system32\qovuewyr.exe, 960, Delete-on-Reboot, [27dfeb8bc4b775c1ec34d9684eb2758b]
Trojan.Agent.ED, C:\Documents and Settings\Matt\Application Data\Ticasif\afogh.exe, 1812, Delete-on-Reboot, [38ce1363d2a945f1889858e909f735cb]
Trojan.Agent.ED, C:\Documents and Settings\Matt\Application Data\Dyaqyxy\ylelqe.exe, 1520, Delete-on-Reboot, [3ec8c6b0fe7da0969f81c57ce21e619f]
Modules: 0
(No malicious items detected)
Registry Keys: 57
Trojan.Agent.ED, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SecurityCenterServer1721869557, Quarantined, [d333601690eb59dd37e971d0bb4544bc],
Trojan.Agent.ED, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SecurityCenterServer2219215403, Quarantined, [a75fd3a37b00b086200072cffb0546ba],
Trojan.Agent.ED, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SecurityCenterServer2484372270, Quarantined, [1bebf5817704270fbf61b889946c2ed2],
Trojan.Agent.ED, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SecurityCenterServer29711255, Quarantined, [f1151462641756e03ee26fd24cb4be42],
Trojan.Agent.ED, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SecurityCenterServer533481814, Quarantined, [fc0a294d6a116dc94bd573cec63ad62a],
Trojan.Agent.ED, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SecurityCenterServer707576027, Quarantined, [27dfeb8bc4b775c1ec34d9684eb2758b],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\APPID\{35C1605E-438B-4D64-AAB1-8885F097A9B1}, Quarantined, [6c9abdb9097294a27a75e091d42e60a0],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\TYPELIB\{35C1605E-438B-4D64-AAB1-8885F097A9B1}, Quarantined, [6c9abdb9097294a27a75e091d42e60a0],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\TYPELIB\{6E8BF012-2C85-4834-B10A-1B31AF173D70}, Quarantined, [976fd6a0f685d16534bce78af111e51b],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{44C3C1DB-2127-433C-98EC-4C9412B5FC3A}, Quarantined, [976fd6a0f685d16534bce78af111e51b],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{4D5132DD-BB2B-4249-B5E0-D145A8C982E1}, Quarantined, [976fd6a0f685d16534bce78af111e51b],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{706D4A4B-184A-4434-B331-296B07493D2D}, Quarantined, [976fd6a0f685d16534bce78af111e51b],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{8BE10F21-185F-4CA0-B789-9921674C3993}, Quarantined, [976fd6a0f685d16534bce78af111e51b],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{94C0B25D-3359-4B10-B227-F96A77DB773F}, Quarantined, [976fd6a0f685d16534bce78af111e51b],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{B0B75FBA-7288-4FD3-A9EB-7EE27FA65599}, Quarantined, [976fd6a0f685d16534bce78af111e51b],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{B173667F-8395-4317-8DD6-45AD1FE00047}, Quarantined, [976fd6a0f685d16534bce78af111e51b],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{B32672B3-F656-46E0-B584-FE61C0BB6037}, Quarantined, [976fd6a0f685d16534bce78af111e51b],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{C2434722-5C85-4CA0-BA69-1B67E7AB3D68}, Quarantined, [976fd6a0f685d16534bce78af111e51b],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{C2996524-2187-441F-A398-CD6CB6B3D020}, Quarantined, [976fd6a0f685d16534bce78af111e51b],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{E047E227-5342-4D94-80F7-CFB154BF55BD}, Quarantined, [976fd6a0f685d16534bce78af111e51b],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{E3F79BE9-24D4-4F4D-8C13-DF2C9899F82E}, Quarantined, [976fd6a0f685d16534bce78af111e51b],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{E77EEF95-3E83-4BB8-9C0D-4A5163774997}, Quarantined, [976fd6a0f685d16534bce78af111e51b],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{FD8F79A0-D2E2-4FA2-AEAF-393EAC8064F7}, Quarantined, [976fd6a0f685d16534bce78af111e51b],
PUP.Optional.FunMoods.A, HKU\S-1-5-21-117609710-1078081533-725345543-1006-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B}, Quarantined, [a660185e4932072fd7077af4cd3532ce],
PUP.Optional.FunMoods.A, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B}, Quarantined, [a660185e4932072fd7077af4cd3532ce],
Adware.DealCabby, HKU\S-1-5-21-117609710-1078081533-725345543-1006-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{0B4A07CF-45EB-4B10-B6BB-35568A2F89BE}, Quarantined, [81858fe7dd9ee254dbb9ea847e84bb45],
PUP.Optional.FunMoods.A, HKU\S-1-5-21-117609710-1078081533-725345543-1006-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}, Quarantined, [a5615a1c6417132319d3b19aa55dd22e],
PUP.Optional.Funmoods.A, HKU\S-1-5-21-117609710-1078081533-725345543-1006-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3}, Quarantined, [8c7a8de9710a70c646f6d697d230649c],
Trojan.Downloader, HKU\S-1-5-21-117609710-1078081533-725345543-1006-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{CA4520F3-AE13-4FB1-A513-58E23991C86D}, Quarantined, [18ee5d19cfac8caab0cc70e14fb3d32d],
Trojan.Downloader, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{CA4520F3-AE13-4FB1-A513-58E23991C86D}, Quarantined, [18ee5d19cfac8caab0cc70e14fb3d32d],
Adware.GamePlayLab, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{11111111-1111-1111-1111-110011221158}, Quarantined, [8c7a8ee8f289f244683004481ee446ba],
Adware.GamePlayLab, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\PREAPPROVED\{11111111-1111-1111-1111-110011221158}, Quarantined, [8c7a8ee8f289f244683004481ee446ba],
Adware.GamePlayLab, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\PREAPPROVED\{11111111-1111-1111-1111-110011221158}, Quarantined, [8c7a8ee8f289f244683004481ee446ba],
PUP.Optional.Mediabar.A, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{28387537-e3f9-4ed7-860c-11e69af4a8a0}, Quarantined, [14f27ef8304bea4c697d4aeeaf532ad6],
PUP.Optional.Iminent.A, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{68B81CCD-A80C-4060-8947-5AE69ED01199}, Quarantined, [18eee49208731a1cd17c660bf11131cf],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{8375D9C8-634F-4ECB-8CF5-C7416BA5D542}, Quarantined, [6c9ab5c1b1ca2b0bfdf4d29f04fe2cd4],
PUP.Optional.Iminent.A, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{E6B969FB-6D33-48d2-9061-8BBD4899EB08}, Quarantined, [7d89adc99edd9a9c91bdf37e12f0ab55],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\esrv.BabylonESrvc, Quarantined, [3bcb7cfa6a11162041adc4adaf539c64],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\esrv.BabylonESrvc.1, Quarantined, [1de97afc3348ec4aaa4491e0aa58d828],
PUP.Optional.BabylonToolBar.A, HKLM\SOFTWARE\CLASSES\b, Quarantined, [6e98a7cf7b0000363db5205125dd7789],
PUP.Optional.Babylon.A, HKLM\SOFTWARE\BabylonToolbar, Quarantined, [a1657501d6a54beb5ff94d842dd66f91],
PUP.Optional.DataMangr.A, HKLM\SOFTWARE\DataMngr, Quarantined, [a2645521a5d61323f9abe4b7c042dd23],
PUP.Optional.Iminent.A, HKLM\SOFTWARE\Iminent, Quarantined, [b2542e48afcc1b1b7e349921fb074bb5],
PUP.Optional.FunMoods.A, HKLM\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\cjpglkicenollcignonpgiafdgfeehoj, Quarantined, [bc4a482e413a72c49aefd3dc38cbf30d],
PUP.Optional.Funmoods.A, HKLM\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\fdloijijlkoblmigdofommgnheckmaki, Quarantined, [ed19d99d2952ca6cf0cf1676eb1809f7],
PUP.Optional.1ClickDownLoader.A, HKLM\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\jplinpmadfkdgipabgcdchbdikologlh, Quarantined, [e91d93e397e495a1b5d20f921be7768a],
PUP.GamesPlayLab, HKLM\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\mpfapcdfbbledbojijcbcclmlieaoogk, Quarantined, [8c7abbbb502b6fc76d380fb76f938f71],
PUP.Optional.SweetIM.A, HKLM\SOFTWARE\SWEETIM, Quarantined, [56b073034e2d86b0a70cbf11c1422bd5],
PUP.GamesPlayLab, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\mpfapcdfbbledbojijcbcclmlieaoogk, Quarantined, [a363591dcab1f046644031954ab88878],
Trojan.Agent.SCS, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SecurityCenterServer3518234236, Quarantined, [8d79b8bee9922f07f5c102c1e81b02fe],
Trojan.Agent.SCS, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SecurityCenterServer3893759923, Quarantined, [da2c383e1a61ab8bd1e57a49f0137c84],
Trojan.Agent.SCS, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SecurityCenterServer52164496, Quarantined, [83833f37d8a378bec8eea81b0bf81fe1],
PUP.Optional.BabylonToolBar.A, HKU\S-1-5-21-117609710-1078081533-725345543-1006-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\BabylonToolbar, Quarantined, [18ee581efa818da9ed8a9d36847fdf21],
PUP.Optional.DataMngr.A, HKU\S-1-5-21-117609710-1078081533-725345543-1006-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\DataMngr, Quarantined, [75913244710a49edb6eb903f12f1ff01],
PUP.Optional.DataMngr.A, HKU\S-1-5-21-117609710-1078081533-725345543-1006-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\DataMngr_Toolbar, Quarantined, [d333bcba9dde0b2b0c9408c7ce35a45c],
PUP.Optional.FunMoods.A, HKU\S-1-5-21-117609710-1078081533-725345543-1006-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\cjpglkicenollcignonpgiafdgfeehoj, Quarantined, [a561463085f6d5612e5c941b44bf02fe],
PUP.Optional.InstallCore.A, HKU\S-1-5-21-117609710-1078081533-725345543-1006-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\INSTALLCORE, Quarantined, [2fd7c0b6f289c6708243f2dd897aa45c],
Registry Values: 10
Trojan.Agent.ED, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Cewipakaonkeemo, "C:\Documents and Settings\Matt\Application Data\Ticasif\afogh.exe", Quarantined, [38ce1363d2a945f1889858e909f735cb]
Trojan.Agent.ED, HKU\S-1-5-21-117609710-1078081533-725345543-1006-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Cewipakaonkeemo, "C:\Documents and Settings\Matt\Application Data\Ticasif\afogh.exe", Quarantined, [38ce1363d2a945f1889858e909f735cb]
Trojan.Agent.ED, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Exwuqyatamp, "C:\Documents and Settings\Matt\Application Data\Dyaqyxy\ylelqe.exe", Quarantined, [3ec8c6b0fe7da0969f81c57ce21e619f]
Trojan.Agent.ED, HKU\S-1-5-21-117609710-1078081533-725345543-1006-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Exwuqyatamp, "C:\Documents and Settings\Matt\Application Data\Dyaqyxy\ylelqe.exe", Quarantined, [3ec8c6b0fe7da0969f81c57ce21e619f]
Trojan.Agent.ED, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Bebayqbyyvagbu, "C:\Documents and Settings\Matt\Application Data\Haryko\icmyw.exe", Quarantined, [59ad87efdaa112249b85b28f6a96f60a]
Trojan.Agent.ED, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Laymsutoezna, "C:\Documents and Settings\Matt\Application Data\Ilazvuw\egifev.exe", Quarantined, [0afcafc7d8a358def030da67b24ebe42]
Trojan.Agent.ED, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Aqcuabxe, "C:\Documents and Settings\Matt\Application Data\Sewuve\onanxo.exe", Quarantined, [1fe78beb82f9c76f968aaa97bb45768a]
Trojan.Agent.ED, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Hyvalemy, "C:\Documents and Settings\Matt\Application Data\Ydowbu\bycoo.exe", Quarantined, [fb0bf77f403b71c50d13360bd7296a96]
PUP.Optional.SweetIM.A, HKLM\SOFTWARE\SWEETIM|simapp_id, 11111111, Quarantined, [56b073034e2d86b0a70cbf11c1422bd5]
PUP.Optional.InstallCore.A, HKU\S-1-5-21-117609710-1078081533-725345543-1006-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\INSTALLCORE|tb, 0C1F1M1J0K2Y1T1L2U0NtI0J, Quarantined, [2fd7c0b6f289c6708243f2dd897aa45c]
Registry Data: 0
(No malicious items detected)
Folders: 0
(No malicious items detected)
Files: 48
Trojan.Agent.ED, C:\WINDOWS\system32\zouvokn.exe, Delete-on-Reboot, [d333601690eb59dd37e971d0bb4544bc],
Trojan.Agent.ED, C:\WINDOWS\system32\ysaxymaqhe.exe, Delete-on-Reboot, [a75fd3a37b00b086200072cffb0546ba],
Trojan.Agent.ED, C:\WINDOWS\system32\nonuhoi.exe, Delete-on-Reboot, [1bebf5817704270fbf61b889946c2ed2],
Trojan.Agent.ED, C:\WINDOWS\system32\buzeo.exe, Delete-on-Reboot, [f1151462641756e03ee26fd24cb4be42],
Trojan.Agent.ED, C:\WINDOWS\system32\ovezo.exe, Delete-on-Reboot, [fc0a294d6a116dc94bd573cec63ad62a],
Trojan.Agent.ED, C:\WINDOWS\system32\qovuewyr.exe, Delete-on-Reboot, [27dfeb8bc4b775c1ec34d9684eb2758b],
Trojan.Agent.ED, C:\Documents and Settings\Matt\Application Data\Ticasif\afogh.exe, Delete-on-Reboot, [38ce1363d2a945f1889858e909f735cb],
Trojan.Agent.ED, C:\Documents and Settings\Matt\Application Data\Dyaqyxy\ylelqe.exe, Delete-on-Reboot, [3ec8c6b0fe7da0969f81c57ce21e619f],
Trojan.Agent.ED, C:\Documents and Settings\Matt\Application Data\Haryko\icmyw.exe, Quarantined, [59ad87efdaa112249b85b28f6a96f60a],
Trojan.Agent.ED, C:\Documents and Settings\Matt\Application Data\Ilazvuw\egifev.exe, Quarantined, [0afcafc7d8a358def030da67b24ebe42],
Trojan.Agent.ED, C:\Documents and Settings\Matt\Application Data\Sewuve\onanxo.exe, Quarantined, [1fe78beb82f9c76f968aaa97bb45768a],
Trojan.Agent.ED, C:\Documents and Settings\Matt\Application Data\Ydowbu\bycoo.exe, Quarantined, [fb0bf77f403b71c50d13360bd7296a96],
PUP.Optional.InstalleRex, C:\Documents and Settings\Matt\My Documents\Downloads\Downloader_for_Chrono Trigger.exe, Quarantined, [9373e88edba07fb73628046e1fe23ac6],
PUP.Optional.Amonetize, C:\Documents and Settings\Matt\My Documents\Downloads\super mario land 2 gameboy rom__3039_i687494351_il14644679.exe, Quarantined, [b84ebdb9512a8ea81ce0dd66c83810f0],
PUP.Optional.Amonetize, C:\Documents and Settings\Matt\My Documents\Downloads\super mario land 2 gameboy rom__3516_i687493814_il14644553.exe, Quarantined, [d531581e42398ea8ec10fa4920e022de],
PUP.Optional.YourFileDownloader, C:\Documents and Settings\Matt\My Documents\Downloads\Super_Mario_Land_2_Rom_Gameboy_downloader.exe, Quarantined, [50b69ed89ae1181ef41a8d915ba5ab55],
Trojan.Agent.ED, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_16767923.exe, Quarantined, [6c9af28406753afc42de8db4a65a6c94],
Trojan.Agent.ED, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_189f51ac.exe, Quarantined, [07ffd79f3744d46227f957ea6c943ac6],
Spyware.Zbot.ED, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_2c0d072a.exe, Quarantined, [cb3b9cdade9d979f9632d1b2857ccd33],
Trojan.Inject, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_3f2425d2.exe, Quarantined, [75916f076b1040f653df0f775fa2d22e],
Spyware.Zbot.ED, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_45e73756.exe, Quarantined, [e6202650a7d4290daee2e69d54adcd33],
Trojan.Inject, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_466908f2.exe, Quarantined, [877fb7bfaecd92a45ad894f227da39c7],
Trojan.Agent.ED, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_84b43772.exe, Quarantined, [08fea3d3b6c539fd80a0e45dfb057f81],
Spyware.Zbot.ED, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_8954ef83.exe, Quarantined, [5ea803730f6cb086444cc1c25aa7eb15],
Spyware.Zbot.ED, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_b58b4755.exe, Quarantined, [f115027487f44de9ae1ac6bd2bd67888],
Trojan.Agent.ED, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_c382fc2d.exe, Quarantined, [28de83f3fb8091a5bc649fa214ec1de3],
Spyware.Zbot.ED, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_c7f2f438.exe, Quarantined, [6c9a5a1ca8d345f13890740f758cbc44],
Trojan.Agent.ED, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_d91ab8f6.exe, Quarantined, [e125175fb1ca5dd9958b8bb6d12ff20e],
Trojan.Agent.ED, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_da196a06.exe, Quarantined, [60a64e28205b3ef8d14faa978f717789],
Spyware.Zbot.ED, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_e4bde519.exe, Quarantined, [9472d6a0cab1b6800c8499ea61a035cb],
Trojan.Inject, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_e9eaa3cb.exe, Quarantined, [788ee98db1ca7bbbff33186e9c65b64a],
Trojan.Inject, C:\Documents and Settings\Matt\Local Settings\Temp\UpdateFlashPlayer_1a694187.exe, Quarantined, [c5412353116a85b1ae841b6bd8290000],
Trojan.Inject, C:\Documents and Settings\Matt\Local Settings\Application Data\bgnaxboa.exe, Quarantined, [cf37adc91f5ced49ed450c7a8978e31d],
Trojan.Agent.RvGen, C:\WINDOWS\Tasks\Security Center Update - 1721869557.job, Quarantined, [f3139fd7b9c242f46858b209dc27d42c],
Trojan.Agent.RvGen, C:\WINDOWS\Tasks\Security Center Update - 2219215403.job, Quarantined, [6e980373b0cb59dd20a092298083b64a],
Trojan.Agent.RvGen, C:\WINDOWS\Tasks\Security Center Update - 2484372270.job, Quarantined, [2fd75422017a999d4779dfdcd92abb45],
Trojan.Agent.RvGen, C:\WINDOWS\Tasks\Security Center Update - 29711255.job, Quarantined, [32d49fd7592268ce4a76bb009b68e020],
Trojan.Agent.RvGen, C:\WINDOWS\Tasks\Security Center Update - 3518234236.job, Quarantined, [19ed94e2b4c7ac8a2997f6c5f11255ab],
Trojan.Agent.RvGen, C:\WINDOWS\Tasks\Security Center Update - 3893759923.job, Quarantined, [23e3beb89ae1a98de0e0714ac2415fa1],
Trojan.Agent.RvGen, C:\WINDOWS\Tasks\Security Center Update - 52164496.job, Quarantined, [d1356511d8a357df9f21e4d78b786f91],
Trojan.Agent.RvGen, C:\WINDOWS\Tasks\Security Center Update - 533481814.job, Quarantined, [b94dfc7a0675b5818040902bc1420ef2],
Trojan.Agent.RvGen, C:\WINDOWS\Tasks\Security Center Update - 707576027.job, Quarantined, [03038de99cdf5dd9c000e9d20bf87f81],
PUP.Optional.FunMoods.A, C:\Documents and Settings\Matt\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\chrome-extension_cjpglkicenollcignonpgiafdgfeehoj_0.localstorage, Quarantined, [32d4bdb9275464d235cbdd10ff04857b],
Trojan.Agent.SCS, C:\WINDOWS\system32\wioggy.exe, Quarantined, [8d79b8bee9922f07f5c102c1e81b02fe],
Trojan.Agent.SCS, C:\WINDOWS\system32\yclearxu.exe, Quarantined, [da2c383e1a61ab8bd1e57a49f0137c84],
Trojan.Agent.SCS, C:\WINDOWS\system32\awobosi.exe, Quarantined, [83833f37d8a378bec8eea81b0bf81fe1],
PUP.Optional.Babylon.A, C:\Documents and Settings\Matt\Local Settings\Application Data\Google\Chrome\User Data\Default\Preferences, Good: (), Bad: ( "homepage": "
http://search.babylon.com/?affID=11...HP_ss&mntrId=d41f7928000000000000001e902d3d26",), Replaced,[2adce690d5a6280e93904d4f38cc02fe]
PUP.Optional.Babylon.A, C:\Documents and Settings\Matt\Local Settings\Application Data\Google\Chrome\User Data\Default\Preferences, Good: (), Bad: ( "startup_urls": [ "
http://search.babylon.com/?affID=11...HP_ss&mntrId=d41f7928000000000000001e902d3d26" ],), Replaced,[8c7aacca5625e94d91c42d6f3bc949b7]
Physical Sectors: 0
(No malicious items detected)
(end)