| Answer» Below are my logs i have so far
 Logfile of TREND Micro HijackThis v2.0.2
 Scan SAVED at 12:34:44 AM, on 5/6/2009
 Platform: Windows XP SP3 (WinNT 5.01.2600)
 MSIE: Internet EXPLORER v7.00 (7.00.6000.16827)
 Boot mode: Normal
 
 Running processes:
 C:\WINDOWS\System32\smss.exe
 C:\WINDOWS\system32\winlogon.exe
 C:\WINDOWS\system32\services.exe
 C:\WINDOWS\system32\lsass.exe
 C:\WINDOWS\system32\svchost.exe
 C:\WINDOWS\System32\svchost.exe
 C:\WINDOWS\system32\spoolsv.exe
 C:\Program Files\Java\jre6\bin\jqs.exe
 C:\WINDOWS\Explorer.EXE
 C:\WINDOWS\system32\wscntfy.exe
 C:\Program Files\Java\jre6\bin\jusched.exe
 C:\WINDOWS\svcwinra.exe
 C:\WINDOWS\system32\ctfmon.exe
 C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
 C:\WINDOWS\resfilter32.exe
 C:\Program Files\Internet Explorer\iexplore.exe
 C:\WINDOWS\system32\NOTEPAD.EXE
 C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
 
 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
 O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
 O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
 O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
 O4 - HKLM\..\Run: [CTFMon] C:\WINDOWS\system32\CTF\ctfmon.exe
 O4 - HKLM\..\Run: [tcrinit] C:\WINDOWS\svcwinra.exe
 O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
 O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
 O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
 O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
 O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
 O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
 O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
 O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
 O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
 O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
 
 --
 End of file - 2914 bytes
 Malwarebytes' Anti-Malware 1.36
 Database version: 2079
 Windows 5.1.2600 Service Pack 3
 
 5/5/2009 11:49:59 PM
 mbam-log-2009-05-05 (23-49-59).txt
 
 Scan type: Full Scan (C:\|)
 Objects scanned: 120191
 Time elapsed: 32 minute(s), 21 SECOND(s)
 
 Memory Processes Infected: 0
 Memory Modules Infected: 0
 Registry Keys Infected: 9
 Registry VALUES Infected: 0
 Registry Data Items Infected: 0
 Folders Infected: 2
 Files Infected: 5
 
 Memory Processes Infected:
 (No malicious items detected)
 
 Memory Modules Infected:
 (No malicious items detected)
 
 Registry Keys Infected:
 HKEY_CLASSES_ROOT\xml.xml (Trojan.FakeAlert) -> Quarantined and deleted successfully.
 HKEY_CLASSES_ROOT\xml.xml.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
 HKEY_CLASSES_ROOT\CLSID\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
 HKEY_CLASSES_ROOT\Typelib\{a44b024a-ce32-4bda-0075-c799a4bff141} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
 HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
 HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully.
 HKEY_LOCAL_MACHINE\SOFTWARE\RegTool (Rogue.RegTool) -> Quarantined and deleted successfully.
 HKEY_CURRENT_USER\SOFTWARE\RegTool (Rogue.RegTool) -> Quarantined and deleted successfully.
 
 Registry Values Infected:
 (No malicious items detected)
 
 Registry Data Items Infected:
 (No malicious items detected)
 
 Folders Infected:
 C:\Documents and Settings\topi\Application Data\RegTool (Rogue.RegTool) -> Quarantined and deleted successfully.
 C:\Documents and Settings\topi\Application Data\RegTool\Logs (Rogue.RegTool) -> Quarantined and deleted successfully.
 
 Files Infected:
 C:\Documents and Settings\topi\Local Settings\Temp\5783.exe (Rogue.Installer) -> Quarantined and deleted successfully.
 C:\Documents and Settings\topi\Application Data\RegTool\Logs\2009-03-17 21-20-220.log (Rogue.RegTool) -> Quarantined and deleted successfully.
 C:\WINDOWS\system32\E80Lr441.exe.a_a (Trojan.Agent) -> Quarantined and deleted successfully.
 C:\WINDOWS\Tasks\{5B57CF47-0BFA-43c6-ACF9-3B3653DCADBA}.job (Trojan.FakeAlert) -> Quarantined and deleted successfully.
 C:\WINDOWS\Tasks\RegTool Scan.job (Rogue.RegTool) -> Quarantined and deleted successfully.
 SUPERAntiSpyware Scan Log
 http://www.superantispyware.com
 
 Generated 05/06/2009 at 01:01 AM
 
 Application Version : 4.26.1002
 
 Core Rules Database Version : 3877
 Trace Rules Database Version: 1825
 
 Scan type   : Complete Scan
 Total Scan Time : 00:41:22
 
 Memory items scanned   : 354
 Memory threats detected : 2
 Registry items scanned  : 3541
 Registry threats detected : 1
 File items scanned    : 28626
 File threats detected  : 22
 
 Trojan.SVCWINRA
 C:\WINDOWS\SVCWINRA.EXE
 C:\WINDOWS\SVCWINRA.EXE
 C:\WINDOWS\RESFILTER32.EXE
 C:\WINDOWS\RESFILTER32.EXE
 [tcrinit] C:\WINDOWS\SVCWINRA.EXE
 
 Adware.Tracking Cookie
 C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected]dtech[1].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][2].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt
 C:\Documents and Settings\topi\Cookies\[emailprotected][1].txt
 
 Keylogger.Actual Spy
 C:\WINDOWS\system\actualspystart.lnk
 
 |