hi dbreeze,
I completed the custom scan and this is the report I received.
I am now onto step 2. I will post the log when that one is done.
Thanks for all your help.
Log from step 1:
<?xml version="1.0" encoding="UTF-16"?>
-<mbam-log>-<header><date>2015/01/31 21:05:03 -0500</date><logfile>mbam-log-2015-01-31 (21-03-29).xml</logfile><isadmin>yes</isadmin></header>-<engine><version>2.00.4.1028</version><malware-database>v2015.01.31.06</malware-database><rootkit-database>v2015.01.14.01</rootkit-database><license>premium</license><file-protection>enabled</file-protection><web-protection>enabled</web-protection><self-protection>disabled</self-protection></engine>-<system><osversion>Windows 8</osversion><arch>x64</arch><username>Pat</username><filesys>NTFS</filesys></system>-<summary><type>custom</type><result>completed</result><objects>518214</objects><time>3554</time><processes>0</processes><modules>0</modules><keys>0</keys><values>0</values><datas>0</datas><folders>0</folders><files>2</files><sectors>0</sectors></summary>-<options><memory>enabled</memory><startup>enabled</startup><filesystem>enabled</filesystem><archives>enabled</archives><rootkits>enabled</rootkits><deeprootkit>disabled</deeprootkit><heuristics>enabled</heuristics><pup>enabled</pup><pum>enabled</pum></options>-<items>-<file><path>C:\FRST\Quarantine\C\ProgramData\Windows Genuine Advantage\{423FD05E-1233-4B3E-8C91-534CD32F94F0}\msiexec.exe</path><vendor>Trojan.Dropper</vendor><action>success</action><hash>232e33c494f55dd9163f29cb58aa758b</hash></file>-<file><path>C:\Users\Pat\AppData\LocalLow\iyhwihh.dll</path><vendor>Trojan.Chrome.INJ</vendor><action>success</action><hash>2e238d6a2168d561e7ddba378f723dc3</hash></file></items></mbam-log>