It took forever for me to even get to the forum page but here is my log from superantispyware and now I going to try to download Malwarebytes but it is making it hard for me to even pull up the website.
SUPERAntiSpyware Scan Log
http://www.superantispyware.comGenerated 05/05/2008 at 11:34 AM
Application Version : 4.0.1154
Core Rules Database Version : 3452
Trace Rules Database Version: 1444
Scan type : Complete Scan
Total Scan Time : 01:17:51
Memory items scanned : 163
Memory threats detected : 2
Registry items scanned : 4501
Registry threats detected : 83
File items scanned : 83147
File threats detected : 177
Trojan.Vundo-Variant/F
C:\WINDOWS\SYSTEM32\VTUONGWX.DLL
C:\WINDOWS\SYSTEM32\VTUONGWX.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BC7D8DE8-EF3D-4F44-8B54-03759FAC1367}
HKCR\CLSID\{BC7D8DE8-EF3D-4F44-8B54-03759FAC1367}
HKCR\CLSID\{BC7D8DE8-EF3D-4F44-8B54-03759FAC1367}\InprocServer32
HKCR\CLSID\{BC7D8DE8-EF3D-4F44-8B54-03759FAC1367}\InprocServer32#ThreadingModel
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks#{BC7D8DE8-EF3D-4F44-8B54-03759FAC1367}
Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\vtUoNGwX
C:\WINDOWS\SYSTEM32\JCQDWRMQ.DLL
Adware.Vundo Variant/Resident
C:\WINDOWS\SYSTEM32\AWTSRIHG.DLL
C:\WINDOWS\SYSTEM32\AWTSRIHG.DLL
Trojan.Unclassified/SVCHost-Fake
[Host Process] C:\DOCUMENTS AND SETTINGS\OWNER\SVCHOST.EXE
C:\DOCUMENTS AND SETTINGS\OWNER\SVCHOST.EXE
C:\WINDOWS\Prefetch\SVCHOST.EXE-0B78B776.pf
Adware.Crystalys Media
HKLM\Software\Classes\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}
HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}
HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}
HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\Control
HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\Implemented Categories
HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\InprocServer32
HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\InprocServer32#ThreadingModel
HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\Insertable
HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\MiscStatus
HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\MiscStatus\1
HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\ProgID
HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\Programmable
HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\ToolboxBitmap32
HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\TypeLib
HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\Version
HKCR\CLSID\{159C2E51-9823-11D2-8DDC-D84A1B4ACD4D}\VersionIndependentProgID
C:\PROGRAM FILES\CRYSTALYS MEDIA\CM.DLL
Adware.Vundo-Variant/M
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{55c6bfd1-79b6-4b67-b814-1573351cecbe}
HKCR\CLSID\{55C6BFD1-79B6-4B67-B814-1573351CECBE}
HKCR\CLSID\{55C6BFD1-79B6-4B67-B814-1573351CECBE}\InprocServer32
HKCR\CLSID\{55C6BFD1-79B6-4B67-B814-1573351CECBE}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\ITBHUFCM.DLL
Adware.Vundo-Variant
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{984AF1DD-385F-40A6-A03F-6F92B787BAA8}
HKCR\CLSID\{984AF1DD-385F-40A6-A03F-6F92B787BAA8}
HKCR\CLSID\{984AF1DD-385F-40A6-A03F-6F92B787BAA8}\InprocServer32
HKCR\CLSID\{984AF1DD-385F-40A6-A03F-6F92B787BAA8}\InprocServer32#ThreadingModel
C:\DOCUMENTS AND SETTINGS\ERIC\LOCAL SETTINGS\TEMP\OPNNOPQG.DLL
Rootkit.TNCore-Variant/A
HKLM\System\ControlSet002\Services\serscann
C:\WINDOWS\SYSTEM32\DRIVERS\SERSCANN.SYS
HKLM\System\ControlSet002\Enum\Root\LEGACY_serscann
HKLM\System\ControlSet003\Services\serscann
HKLM\System\ControlSet003\Enum\Root\LEGACY_serscann
HKLM\System\CurrentControlSet\Services\serscann
HKLM\System\CurrentControlSet\Enum\Root\LEGACY_serscann
Adware.Tracking Cookie
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][2].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\owner@winanonymous[2].txt
C:\Documents and Settings\Owner\Cookies\owner@advertising[2].txt
C:\Documents and Settings\Owner\Cookies\owner@imrworldwide[2].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\owner@azjmp[2].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][2].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\owner@media6degrees[1].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\owner@tacoda[2].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\owner@tribalfusion[1].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][2].txt
C:\Documents and Settings\Owner\Cookies\owner@adportmedia[2].txt
C:\Documents and Settings\Owner\Cookies\owner@statcounter[2].txt
C:\Documents and Settings\Owner\Cookies\owner@clickbank[3].txt
C:\Documents and Settings\Owner\Cookies\owner@2o7[1].txt
C:\Documents and Settings\Owner\Cookies\owner@antispywaremaster[2].txt
C:\Documents and Settings\Owner\Cookies\owner@specificclick[1].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\owner@zedo[1].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\owner@adlegend[2].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][2].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\owner@atdmt[2].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\owner@adnetserver[2].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][2].txt
C:\Documents and Settings\Owner\Cookies\owner@statsgod[1].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\owner@burstnet[2].txt
C:\Documents and Settings\Owner\Cookies\owner@trustedantivirus[1].txt
C:\Documents and Settings\Owner\Cookies\owner@trafficmp[2].txt
C:\Documents and Settings\Owner\Cookies\owner@precisionclick[1].txt
C:\Documents and Settings\Owner\Cookies\owner@mediaplex[1].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][2].txt
C:\Documents and Settings\Owner\Cookies\owner@atwola[1].txt
C:\Documents and Settings\Owner\Cookies\owner@doubleclick[1].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][2].txt
C:\Documents and Settings\Owner\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\eric@adbrite[1].txt
C:\Documents and Settings\Eric\Cookies\eric@adecn[1].txt
C:\Documents and Settings\Eric\Cookies\eric@adinterax[1].txt
C:\Documents and Settings\Eric\Cookies\eric@adlegend[1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\eric@adrevolver[1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\eric@adultadworld[1].txt
C:\Documents and Settings\Eric\Cookies\eric@adultdvdemart[2].txt
C:\Documents and Settings\Eric\Cookies\eric@adultfriendfinder[1].txt
C:\Documents and Settings\Eric\Cookies\eric@advertising[2].txt
C:\Documents and Settings\Eric\Cookies\eric@allaxxxesspass[1].txt
C:\Documents and Settings\Eric\Cookies\eric@ananovaxxx[1].txt
C:\Documents and Settings\Eric\Cookies\eric@atdmt[2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\eric@casalemedia[2].txt
C:\Documents and Settings\Eric\Cookies\eric@clickbank[1].txt
C:\Documents and Settings\Eric\Cookies\eric@clicksor[1].txt
C:\Documents and Settings\Eric\Cookies\eric@clicktorrent[1].txt
C:\Documents and Settings\Eric\Cookies\eric@collective-media[2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\eric@doubleclick[1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\eric@eroticlick[2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\eric@eyewonder[2].txt
C:\Documents and Settings\Eric\Cookies\eric@freeadultmedia[2].txt
C:\Documents and Settings\Eric\Cookies\eric@fuckaroo[2].txt
C:\Documents and Settings\Eric\Cookies\eric@hardsextube[2].txt
C:\Documents and Settings\Eric\Cookies\eric@hitbox[2].txt
C:\Documents and Settings\Eric\Cookies\eric@hornyandhappy[4].txt
C:\Documents and Settings\Eric\Cookies\eric@hornyandhappy[5].txt
C:\Documents and Settings\Eric\Cookies\eric@hornymatches[1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\eric@insightexpressai[1].txt
C:\Documents and Settings\Eric\Cookies\eric@interclick[1].txt
C:\Documents and Settings\Eric\Cookies\eric@kinxxx[1].txt
C:\Documents and Settings\Eric\Cookies\eric@kinxxx[2].txt
C:\Documents and Settings\Eric\Cookies\eric@kinxxx[3].txt
C:\Documents and Settings\Eric\Cookies\eric@maxporn[1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][3].txt
C:\Documents and Settings\Eric\Cookies\eric@mediaplex[2].txt
C:\Documents and Settings\Eric\Cookies\eric@nakedonthestreets[2].txt
C:\Documents and Settings\Eric\Cookies\eric@pimpsexposed[2].txt
C:\Documents and Settings\Eric\Cookies\eric@pornhub[1].txt
C:\Documents and Settings\Eric\Cookies\eric@pornotube[2].txt
C:\Documents and Settings\Eric\Cookies\eric@questionmarket[1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\eric@secretxxxvideo[2].txt
C:\Documents and Settings\Eric\Cookies\eric@sexlist[1].txt
C:\Documents and Settings\Eric\Cookies\eric@sexure[1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\eric@sexyescortads[1].txt
C:\Documents and Settings\Eric\Cookies\eric@specificclick[2].txt
C:\Documents and Settings\Eric\Cookies\eric@statcounter[1].txt
C:\Documents and Settings\Eric\Cookies\eric@tacoda[1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\eric@tribalfusion[1].txt
C:\Documents and Settings\Eric\Cookies\eric@vidisex[1].txt
C:\Documents and Settings\Eric\Cookies\eric@webpower[2].txt
C:\Documents and Settings\Eric\Cookies\eric@wegcash[2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][3].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][1].txt
C:\Documents and Settings\Eric\Cookies\eric@xiti[1].txt
C:\Documents and Settings\Eric\Cookies\eric@xxxdump[2].txt
C:\Documents and Settings\Eric\Cookies\eric@xxxstash[1].txt
C:\Documents and Settings\Eric\Cookies\
[email protected][2].txt
C:\Documents and Settings\Eric\Cookies\eric@yadro[1].txt
C:\Documents and Settings\Eric\Cookies\eric@youporn[1].txt
C:\Documents and Settings\Eric\Cookies\eric@zedo[1].txt
C:\Documents and Settings\Eric\Cookies\eric@ziporn[2].txt
C:\Documents and Settings\Owner\Cookies\owner@adnetserver[1].txt
C:\Documents and Settings\Owner\Cookies\owner@clickbank[1].txt
Trojan.NetMon/DNSChange
HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor
HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor#Type
HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor#Start
HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor#ErrorControl
HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor#ImagePath
HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor#DisplayName
HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor#ObjectName
HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor\Security
HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor\Security#Security
HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor\Enum
HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor\Enum#0
HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor\Enum#Count
HKLM\SYSTEM\CurrentControlSet\Services\Network Monitor\Enum#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#DeviceDesc
C:\Program Files\Network Monitor
Trojan.cmdService
HKLM\SYSTEM\CurrentControlSet\Services\cmdService
HKLM\SYSTEM\CurrentControlSet\Services\cmdService#Type
HKLM\SYSTEM\CurrentControlSet\Services\cmdService#Start
HKLM\SYSTEM\CurrentControlSet\Services\cmdService#ErrorControl
HKLM\SYSTEM\CurrentControlSet\Services\cmdService#ImagePath
HKLM\SYSTEM\CurrentControlSet\Services\cmdService#DisplayName
HKLM\SYSTEM\CurrentControlSet\Services\cmdService#ObjectName
HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Security
HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Security#Security
HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum
HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum#0
HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum#Count
HKLM\SYSTEM\CurrentControlSet\Services\cmdService\Enum#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#DeviceDesc
Trojan.ZenoSearch
C:\WINDOWS\system32\msnav32.ax
Trojan.PestTrap
HKU\S-1-5-21-3706819324-1418787935-3679095545-1003\Software\SNO2
Trojan.Media-Codec
C:\Documents and Settings\Owner\Favorites\Online Security Test.url
Adware.180solutions/Seekmo
C:\Program Files\Seekmo Programs\Seekmo Toolbar
C:\Program Files\Seekmo Programs
Trojan.Media-Codec/V2
C:\Program Files\Video AX Object
HKU\S-1-5-21-3706819324-1418787935-3679095545-1003\Software\Protection Tools
RootKit.TnCore/Trace
C:\WINDOWS\system32\drivers\core.cache.dsk
Trojan.Downloader-Gen/MROFIN
C:\WINDOWS\MROFINU1000106.EXE
C:\WINDOWS\MROFINU1188.EXE
Rootkit.TNCore-Installer
C:\WINDOWS\SYSTEM32\KN3\COMSDIRP3.EXE
Adware.Vundo Variant/Rel
C:\WINDOWS\SYSTEM32\MCRH.TMP
Adware.DeeWoo/ThinkAdz
C:\WINDOWS\SYSTEM32\SCNTQKDM.EXE
C:\WINDOWS\Prefetch\SCNTQKDM.EXE-373E1EB7.pf
Trojan.Unclassified/BrowserDriver
C:\WINDOWS\SYSTEM32\SWTMP\HBNX12.EXE