hi
i've done everything as requested, here's the results
Malwarebytes' Anti-Malware 1.38
Database version: 2324
Windows 6.0.6001 Service Pack 1
23/06/2009 12:24:52
mbam-log-2009-06-23 (12-24-52).txt
Scan type: Full Scan (C:\|D:\|)
Objects scanned: 280990
Time elapsed: 39 minute(s), 50 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
HKEY_CLASSES_ROOT\Typelib\{56acb669-4139-5611-cbba-f5acb0f4db09} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Registry Values Infected:
(No malicious items detected)
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
d:\applications\winrar-v3.80.beta.4 - sba777\wRAR Slayer v1.1.exe (Malware.Tool) -> Quarantined and deleted successfully.
SUPERAntiSpyware Scan Log
http://www.superantispyware.comGenerated 06/23/2009 at 01:55 PM
Application Version : 4.26.1004
Core Rules Database Version : 3951
Trace Rules Database Version: 1893
Scan type : Complete Scan
Total Scan Time : 01:11:25
Memory items scanned : 303
Memory threats detected : 0
Registry items scanned : 7641
Registry threats detected : 0
File items scanned : 184981
File threats detected : 61
Trojan.Agent/Gen-FSG
C:\PROGRAM FILES\STARDOCK\OBJECTDOCK\KEYGEN.EXE
D:\APPLICATIONS\PC TOOLS REGISTRY MECHANIC V8.0.0.900+KEYGEN-HEARTBUG\KEYGEN\KEYGEN.EXE
D:\APPLICATIONS\STARDOCK OBJECTDOCK PLUS V 1.90\KEYGEN.EXE
Adware.Tracking Cookie
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@2o7[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@ad.yieldmanager[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@ad3.clickhype[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@adrevolver[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@adrevolver[3].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@ads.bleepingcomputer[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@advertising[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@adviva[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@apmebf[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@at.atwola[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@at.atwola[3].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@atdmt[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@avgtechnologies.112.2o7[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@bs.serving-sys[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@casalemedia[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@chitika[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@clicktorrent[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@doubleclick[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@e-2dj6wcloaidzadp.stats.esomniture[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@fastclick[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@interclick[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@kontera[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@media.adrevolver[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@media.adrevolver[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@mediaplex[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@microsoftwga.112.2o7[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@msnportal.112.2o7[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@nero.122.2o7[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@paypal.112.2o7[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@realmedia[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@revsci[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@revsci[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@serving-sys[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@smartadserver[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@smartadserver[3].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@specificclick[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@stats.paypal[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@tacoda[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@tribalfusion[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@tribalfusion[3].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@www.googleadservices[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@www.googleadservices[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@xiti[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@zedo[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@zedo[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\user@ad.yieldmanager[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\user@ad.yieldmanager[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\user@ad.zanox[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\user@adserving.ezanga[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\user@clicksor[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\user@media6degrees[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\user@myroitracking[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\user@questionmarket[1].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\user@screen.t10-click[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\user@serving-sys[2].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\user@serving-sys[3].txt
C:\Users\User\AppData\Roaming\Microsoft\Windows\Cookies\user@zedo[1].txt
Trojan.Agent/Gen-Keygen
C:\USERS\USER\DOWNLOADS\CONVERTXTODVD 3.3.4.106E AND KEYGEN [1337X]\KEYGEN.EXE