I ran Malwarebytes and SuperAntiSpyware below are the logs.
Malwarebytes' Anti-Malware 1.19
Database version: 926
Windows 5.1.2600 Service Pack 2
3:12:23 AM 7/6/2008
mbam-log-7-6-2008 (03-12-23).txt
Scan type: Quick Scan
Objects scanned: 51450
Time elapsed: 13 minute(s), 52 second(s)
Memory Processes Infected: 7
Memory Modules Infected: 4
Registry Keys Infected: 46
Registry Values Infected: 6
Registry Data Items Infected: 5
Folders Infected: 8
Files Infected: 98
Memory Processes Infected:
C:\WINDOWS\RE9NSU5JS1VF\command.exe (AdWare.CommAd) -> Failed to unload process.
C:\WINDOWS\SYSTEM32\pphcn6bj0ec3t.exe (Trojan.FakeAlert) -> Unloaded process successfully.
C:\WINDOWS\SYSTEM32\pcntotdm.exe (Adware.Agent) -> Unloaded process successfully.
C:\Program Files\GetModule\GetModule19.exe (Trojan.Agent) -> Unloaded process successfully.
C:\Documents and Settings\DOMINIKUE\Application Data\Microsoft\dtsc\10314.exe (Trojan.Agent) -> Unloaded process successfully.
C:\WINDOWS\SYSTEM32\uoyzsydz.exe (Trojan.Agent) -> Unloaded process successfully.
C:\WINDOWS\SYSTEM32\lphcn6bj0ec3t.exe (Trojan.FakeAlert) -> Unloaded process successfully.
Memory Modules Infected:
C:\WINDOWS\RE9NSU5JS1VF\asappsrv.dll (AdWare.CommAd) -> Unloaded module successfully.
C:\Program Files\webHancer\Programs\webhdll.dll (Adware.WebHancer) -> Unloaded module successfully.
C:\software\dell softwarewb.dll (Keylogger) -> Unloaded module successfully.
C:\WINDOWS\SYSTEM32\blphcn6bj0ec3t.scr (Trojan.FakeAlert) -> Unloaded module successfully.
Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\cmdservice (AdWare.CommAd) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\cmdservice (AdWare.CommAd) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\cmdservice (AdWare.CommAd) -> Delete on reboot.
HKEY_CLASSES_ROOT\TypeLib\{1e1b286c-88ff-11d3-8d96-d7acac95951a} (Keylogger) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1e1b2879-88ff-11d3-8d96-d7acac95951a} (Keylogger) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1e1b2879-88ff-11d3-8d96-d7acac95951a} (Keylogger) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5321e378-ffad-4999-8c62-03ca8155f0b3} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{1e1b2878-88ff-11d3-8d96-d7acac95951a} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\pk.ie (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\pk.ie.1 (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00110011-4b0b-44d5-9718-90c88817369b} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{086ae192-23a6-48d6-96ec-715f53797e85} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{150fa160-130d-451f-b863-b655061432ba} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{17da0c9e-4a27-4ac5-bb75-5d24b8cdb972} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1f48aa48-c53a-4e21-85e7-ac7cc6b5ffb1} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1f48aa48-c53a-4e21-85e7-ac7cc6b5ffb2} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2d38a51a-23c9-48a1-a33c-48675aa2b494} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2e9caff6-30c7-4208-8807-e79d4ec6f806} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{467faeb2-5f5b-4c81-bae0-2a4752ca7f4e} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{587dbf2d-9145-4c9e-92c2-1f953da73773} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6cc1c91a-ae8b-4373-a5b4-28ba1851e39a} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{79369d5c-2903-4b7a-ade2-d5e0dee14d24} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{799a370d-5993-4887-9df7-0a4756a77d00} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{98dbbf16-ca43-4c33-be80-99e6694468a4} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a55581dc-2cdb-4089-8878-71a080b22342} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b847676d-72ac-4393-bfff-43a1eb979352} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bc97b254-b2b9-4d40-971d-78e0978f5f26} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{cf021f40-3e14-23a5-cba2-717765721306} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e2ddf680-9905-4dee-8c64-0a5de7fe133c} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e3eebbe8-9cab-4c76-b26a-747e25ebb4c6} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e7afff2a-1b57-49c7-bf6b-e5123394c970} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{fcaddc14-bd46-408a-9842-cdbe1c6d37eb} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{fd9bc004-8331-4457-b830-4759ff704c22} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ff1bf4c7-4e08-4a28-a43f-9d60a9f7a880} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\icheck (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\GetModule (Adware.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\iCheck (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MsSecurity1.209.4 (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\targetedbanner (Adware.BHO) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\uninstall (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\mwc (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Deewoo Network Manager (Adware.Radio) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\WR (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\wkey (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Network Monitor (Trojan.Service) -> Quarantined and deleted successfully.
Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ExploreUpdSched (Adware.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Extensions\{59a40ac9-e67d-4155-b31d-4b7330fcd2d6} (Adware.PurityScan) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GetModule19 (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Installer (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lphcn6bj0ec3t (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\General\Wallpaper (Hijack.Desktop) -> Quarantined and deleted successfully.
Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.Agent) -> Data: c:\windows\system32\uoyzsydz.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\uoyzsydz.exe,) Good: (userinit.exe) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispBackgroundPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispScrSavPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Folders Infected:
C:\Program Files\Network Monitor (Trojan.DNSChanger) -> Quarantined and deleted successfully.
C:\Program Files\webHancer (Adware.Webhancer) -> Delete on reboot.
C:\Program Files\webHancer\Programs (Adware.Webhancer) -> Delete on reboot.
C:\Program Files\iCheck (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\GetModule (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008 (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Application Data\NetMon (Trojan.NetMon) -> Quarantined and deleted successfully.
C:\Documents and Settings\DOMINIKUE\Application Data\Microsoft\dtsc (Trojan.Agent) -> Delete on reboot.
Files Infected:
C:\WINDOWS\RE9NSU5JS1VF\asappsrv.dll (AdWare.CommAd) -> Delete on reboot.
C:\Program Files\webHancer\Programs\webhdll.dll (Adware.WebHancer) -> Delete on reboot.
C:\WINDOWS\RE9NSU5JS1VF\command.exe (AdWare.CommAd) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\pphcn6bj0ec3t.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\pcntotdm.exe (Adware.Agent) -> Quarantined and deleted successfully.
C:\software\dell softwarewb.dll (Keylogger) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\DRIVERS\MOUNTMGRR.SYS (Rootkit.Agent) -> Delete on reboot.
C:\WINDOWS\mrofinu1000106.exe (Trojan.DownLoader) -> Quarantined and deleted successfully.
C:\WINDOWS\mrofinu72.exe (Trojan.DownLoader) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\11A.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\DOMINIKUE\Local Settings\Temp\~tmp143 (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Program Files\iCheck\iCheck.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\iCheck\Uninstall.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\GetModule\dicik.gz (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\GetModule\GetModule19.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\GetModule\kwdik.gz (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\GetModule\pckik.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008\License Agreement.lnk (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008\Uninstall.lnk (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Application Data\NetMon\domains.txt (Trojan.NetMon) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Application Data\NetMon\log.txt (Trojan.NetMon) -> Quarantined and deleted successfully.
C:\Documents and Settings\DOMINIKUE\Application Data\Microsoft\dtsc\10314.exe (Trojan.Agent) -> Delete on reboot.
C:\Documents and Settings\DOMINIKUE\Application Data\Microsoft\dtsc\s (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\explore.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\iexplorer.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\x.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\y.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\xxxvideo.hta (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\lfn.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\default.htm (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\svchost32.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\loader.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\internet.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\rwwnw64d.exe (Adware.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\uoyzsydz.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\winpfz33.sys (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\accesss.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\astctl32.ocx (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\avpcc.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\clrssn.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\cpan.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\ctfmon32.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\ctrlpan.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\directx32.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\dnsrelay.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\editpad.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\Explorer32.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\funniest.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\funny.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\gfmnaaa.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\helpcvs.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\iedll.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\inetinf.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\msconfd.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\msspi.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\mssys.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\msupdate.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\mswsc10.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\mswsc20.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\mtwirl32.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\notepad32.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\olehelp.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\qttasks.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\quicken.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\rundll16.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\{dcbfc57b-0283-4516-2d6b-be70d8c9844f}.dll-uninst.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\{dcbfc57b-0283-4516-2d6b-be70d8c9844f}.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\000070.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\000080.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\pac.txt (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\rundll32.vbe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\searchword.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\sistem.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\svcinit.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\systeem.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\systemcritical.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\time.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\users32.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\waol.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\win32e.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\win64.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\winajbm.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\window.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\winmgnt.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\xplugin.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\msnav32.ax (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\zxdnt3d.cfg (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\atmtd.dll.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\blphcn6bj0ec3t.scr (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\lphcn6bj0ec3t.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\phcn6bj0ec3t.bmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Program Files\Common Files\Yazzle1552OinAdmin.exe (Adware.PurityScan) -> Quarantined and deleted successfully.
C:\Program Files\Common Files\Yazzle1552OinUninstaller.exe (Adware.PurityScan) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\DRIVERS\core.cache.dsk (Malware.Trace) -> Delete on reboot.
C:\Documents and Settings\DOMINIKUE\Start Menu\Programs\Startup\Deewoo.lnk (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\DOMINIKUE\Start Menu\Programs\Startup\DW_Start.lnk (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\DOMINIKUE\Local Settings\Temp\mshtml2.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\DOMINIKUE\Local Settings\Temp\mshtml3.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 07/06/2008 at 04:10 AM
Application Version : 4.15.1000
Core Rules Database Version : 3497
Trace Rules Database Version: 1488
Scan type : Complete Scan
Total Scan Time : 00:45:50
Memory items scanned : 440
Memory threats detected : 8
Registry items scanned : 5831
Registry threats detected : 26
File items scanned : 64812
File threats detected : 131
Trojan.Dropper/Gen-PortSv
C:\WINDOWS\PORTSV.EXE
C:\WINDOWS\PORTSV.EXE
NotHarmful.Sysinternals Bluescreen Screen Saver
C:\WINDOWS\SYSTEM32\BLPHCN6BJ0EC3T.SCR
C:\WINDOWS\SYSTEM32\BLPHCN6BJ0EC3T.SCR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP1032\A0204057.SCR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP1032\A0204073.SCR
C:\WINDOWS\Prefetch\BLPHCN6BJ0EC3T.SCR-2F055C7D.pf
Trojan.Unclassified/BrowserDriver
C:\WINDOWS\SYSTEM32\RWWNW64D.EXE
C:\WINDOWS\SYSTEM32\RWWNW64D.EXE
[{61-16-65-5A-DW}] C:\WINDOWS\SYSTEM32\RWWNW64D.EXE
C:\WINDOWS\SYSTEM32\CREG\BMNDIRD.EXE
C:\WINDOWS\SYSTEM32\RSWNW64N.EXE
Keylogger.PerfectKeyLogger
C:\SOFTWARE\DELL SOFTWARE.EXE
C:\SOFTWARE\DELL SOFTWARE.EXE
[dell software] C:\SOFTWARE\DELL SOFTWARE.EXE
Trojan.Downloader-SMSS/Fake
C:\WINDOWS\SYSTEM32\ICROSO~1.NET\SMSS.EXE
C:\WINDOWS\SYSTEM32\ICROSO~1.NET\SMSS.EXE
[Sen] C:\WINDOWS\SYSTEM32\ICROSO~1.NET\SMSS.EXE
Adware.ClickSpring/Resident
C:\PROGRA~1\COMMON~1\RACLE~1\CANREG~1.EXE
C:\PROGRA~1\COMMON~1\RACLE~1\CANREG~1.EXE
Rogue.MalwareProtector/Variant
C:\WINDOWS\SYSTEM32\PPHCN6BJ0EC3T.EXE
C:\WINDOWS\SYSTEM32\PPHCN6BJ0EC3T.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP1032\A0204049.EXE
Rogue.AntiVirus XP 2008
C:\PROGRAM FILES\RHCJ6BJ0EC3T\RHCJ6BJ0EC3T.EXE
C:\PROGRAM FILES\RHCJ6BJ0EC3T\RHCJ6BJ0EC3T.EXE
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008\Antivirus XP 2008.lnk
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008\How to Register Antivirus XP 2008.lnk
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008\License Agreement.lnk
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008\Register Antivirus XP 2008.lnk
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008\Uninstall.lnk
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008.lnk
C:\Documents and Settings\All Users\Desktop\Antivirus XP 2008.lnk
C:\WINDOWS\Prefetch\RHCJ6BJ0EC3T.EXE-1E9A8A6E.pf
Adware.AdRotate/System
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9e187b49-0a4e-f03b-7ccb-ea9feec6f53d}
HKCR\CLSID\{9E187B49-0A4E-F03B-7CCB-EA9FEEC6F53D}
HKCR\CLSID\{9E187B49-0A4E-F03B-7CCB-EA9FEEC6F53D}
HKCR\CLSID\{9E187B49-0A4E-F03B-7CCB-EA9FEEC6F53D}\InProcServer32
HKCR\CLSID\{9E187B49-0A4E-F03B-7CCB-EA9FEEC6F53D}\InProcServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\PJMBCWRTDIIIT.DLL
Adware.Tracking Cookie
C:\Documents and Settings\DOMINIKUE\Cookies\dominikue@atdmt[3].txt
C:\Documents and Settings\DOMINIKUE\Cookies\[email protected][3].txt
C:\Documents and Settings\DOMINIKUE\Cookies\[email protected][3].txt
C:\Documents and Settings\DOMINIKUE\Cookies\[email protected][3].txt
C:\Documents and Settings\DOMINIKUE\Cookies\dominikue@tribalfusion[2].txt
C:\Documents and Settings\DOMINIKUE\Cookies\dominikue@realmedia[1].txt
C:\Documents and Settings\DOMINIKUE\Cookies\[email protected][1].txt
C:\Documents and Settings\DOMINIKUE\Cookies\[email protected][2].txt
C:\Documents and Settings\DOMINIKUE\Cookies\[email protected][1].txt
C:\Documents and Settings\DOMINIKUE\Cookies\[email protected][1].txt
C:\Documents and Settings\DOMINIKUE\Cookies\dominikue@apmebf[1].txt
C:\Documents and Settings\DOMINIKUE\Cookies\dominikue@atdmt[2].txt
C:\Documents and Settings\DOMINIKUE\Cookies\[email protected][2].txt
C:\Documents and Settings\DOMINIKUE\Cookies\dominikue@mediaplex[1].txt
C:\Documents and Settings\DOMINIKUE\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\family@2o7[2].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\family@adbrite[2].txt
C:\Documents and Settings\FAMILY\Cookies\family@adinterax[1].txt
C:\Documents and Settings\FAMILY\Cookies\family@adlegend[2].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][2].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][2].txt
C:\Documents and Settings\FAMILY\Cookies\family@adrevolver[1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][2].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][2].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\family@advertising[1].txt
C:\Documents and Settings\FAMILY\Cookies\family@atdmt[2].txt
C:\Documents and Settings\FAMILY\Cookies\family@bluestreak[2].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\family@clickaider[1].txt
C:\Documents and Settings\FAMILY\Cookies\family@clickbank[1].txt
C:\Documents and Settings\FAMILY\Cookies\family@clicktorrent[2].txt
C:\Documents and Settings\FAMILY\Cookies\family@cpvfeed[2].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\family@dealtime[1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\family@discountdressup[1].txt
C:\Documents and Settings\FAMILY\Cookies\family@doubleclick[1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][2].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\family@fastclick[2].txt
C:\Documents and Settings\FAMILY\Cookies\family@hitbox[2].txt
C:\Documents and Settings\FAMILY\Cookies\family@imrworldwide[2].txt
C:\Documents and Settings\FAMILY\Cookies\family@insightexpressai[1].txt
C:\Documents and Settings\FAMILY\Cookies\family@kontera[2].txt
C:\Documents and Settings\FAMILY\Cookies\family@linksynergy[2].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][2].txt
C:\Documents and Settings\FAMILY\Cookies\family@media6degrees[1].txt
C:\Documents and Settings\FAMILY\Cookies\family@mediaplex[1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\family@overture[1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\family@questionmarket[1].txt
C:\Documents and Settings\FAMILY\Cookies\family@realmedia[1].txt
C:\Documents and Settings\FAMILY\Cookies\family@revsci[2].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][3].txt
C:\Documents and Settings\FAMILY\Cookies\family@serving-sys[1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\family@specificclick[1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][2].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][2].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][2].txt
C:\Documents and Settings\FAMILY\Cookies\family@statcounter[1].txt
C:\Documents and Settings\FAMILY\Cookies\family@tacoda[1].txt
C:\Documents and Settings\FAMILY\Cookies\family@trafficmp[2].txt
C:\Documents and Settings\FAMILY\Cookies\family@tribalfusion[1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][2].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][2].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][3].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][4].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][5].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][1].txt
C:\Documents and Settings\FAMILY\Cookies\[email protected][2].txt
C:\Documents and Settings\FAMILY\Cookies\family@xiti[1].txt
C:\Documents and Settings\FAMILY\Cookies\family@zedo[1].txt
Trojan.NetMon/DNSChange
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#DeviceDesc
Trojan.cmdService
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#DeviceDesc
Trojan.ZenoSearch
C:\WINDOWS\system32\msnav32.ax
Adware.Adservs
C:\DOCUMENTS AND SETTINGS\DOMINIKUE\APPLICATION DATA\MALWAREBYTES\MALWAREBYTES' ANTI-MALWARE\QUARANTINE\QUAR1.46505
C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP1033\A0204176.DLL
C:\WINDOWS\SYSTEM32\NET\JVVTMP3.EXE
Unclassified.Unknown Origin
C:\DOCUMENTS AND SETTINGS\DOMINIKUE\APPLICATION DATA\MALWAREBYTES\MALWAREBYTES' ANTI-MALWARE\QUARANTINE\QUAR1.53659
C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP1033\A0204177.EXE
Adware.ClickSpring
C:\Program Files\Common Files\RACLE~1\CANREG~1.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP1032\A0204050.DLL
Adware.webHancer
C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP1032\A0204043.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP1032\A0204051.DLL
Adware.Unknown Origin
C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP1033\A0204159.CFG
C:\WINDOWS\SYSTEM32\ZXDNT3D.CFG
Trojan.Unknown Origin
C:\WINDOWS\RE9NSU5JS1VF\LH6HMOCLMYPI.VBS
Trojan.Downloader-Gen/Suspicious
C:\WINDOWS\SYSTEM32\1030\ICMSETUP.EXE
Rogue.Dropper/Gen
C:\WINDOWS\SYSTEM32\LPHCN6BJ0EC3T.EXE
Adware.DeeWoo/ThinkAdz
C:\WINDOWS\SYSTEM32\PCNTOTDM.EXE
C:\WINDOWS\Prefetch\PCNTOTDM.EXE-0AEBD23E.pf
Rootkit.TNCore-Installer
C:\WINDOWS\SYSTEM32\TFIG\ICHNEWU.EXE
I hope you can help.......Once I clean this computer I will need help on the other computer. Thanks again for any assistance.