These are portions of the log files (cookies not included):
From SUPERantispyware (which I ran first)
Trojan.Unclassified
[prunnet] C:\WINDOWS\SYSTEM32\PRUNNET.EXE
C:\WINDOWS\SYSTEM32\PRUNNET.EXE
[prunnet] C:\WINDOWS\SYSTEM32\PRUNNET.EXE
C:\DOCUMENTS AND SETTINGS\PETER\LOCAL SETTINGS\TEMP\PRUN.TMP
C:\WINDOWS\Prefetch\PRUNNET.EXE-0D905460.pf
Trojan.Unclassified/GadCom
[gadcom] C:\DOCUMENTS AND SETTINGS\PETER\APPLICATION DATA\GADCOM\GADCOM.EXE
C:\DOCUMENTS AND SETTINGS\PETER\APPLICATION DATA\GADCOM\GADCOM.EXE
Adware.WhenU
HKCR\WUSN.1
HKCR\WUSN.1#WUSN_Id
HKLM\Software\WhenUSearch
HKLM\Software\WhenUSearch#InstallTime
HKLM\Software\WhenUSearch#zip
HKLM\Software\WhenUSearch\Partners
HKLM\Software\WhenUSearch\Partners\desktop
HKLM\Software\WhenUSearch\Partners\desktop#LastPartner
HKLM\Software\WhenUSearch\Partners\desktop#SetupCmdLine
HKLM\Software\WhenUSearch\Partners\desktop#Partner
HKLM\Software\WhenUSearch\Partners\desktop#InstallTime
HKLM\Software\WhenUSearch\Partners\desktop#PartnerDesc
HKLM\Software\WhenUSearch\WHSE
HKLM\Software\WhenUSearch\WHSE#Installed_rs
HKLM\Software\WhenUSearch\WHSE#uiver_rs
HKLM\Software\WhenUSearch\WHSE#exitsurvey_url
HKLM\Software\WhenUSearch\WHSE#Partner
HKLM\Software\WhenUSearch\WHSE#LastPartner
HKLM\Software\WhenUSearch\WHSE#InstallTime
HKLM\Software\WhenUSearch\WHSE#SetupCmdLine
HKLM\Software\WhenUSearch\WHSE#showSplash
C:\Program Files\Common Files\WhenU\UControlScanAndRemove.ocx
C:\Program Files\Common Files\WhenU
Trojan.Unknown Origin
HKLM\Software\xpre
HKLM\Software\xpre#execount
C:\DOCUMENTS AND SETTINGS\PETER\LOCAL SETTINGS\TEMP\AENSCXWOMR.TMP
C:\DOCUMENTS AND SETTINGS\PETER\LOCAL SETTINGS\TEMP\WOMSCEXRAN.TMP
Rogue.AntiSpywareMaster
HKU\S-1-5-21-602162358-1425521274-725345543-1003\Software{5222008A-DD62-49c7-A735-7BD18ECC7350}
Rogue.VirusRemover2008
HKLM\Software{5222008A-DD62-49c7-A735-7BD18ECC7350}
HKU\S-1-5-21-602162358-1425521274-725345543-1003\Software\VirusRemover2008
HKLM\Software\VirusRemover2008
HKLM\Software\VirusRemover2008#ActDomain
HKLM\Software\VirusRemover2008#CookieParams
Trojan.Fake-Alert
C:\Documents and Settings\Peter\Application Data\gadcom
Trojan.Fake-Alert/Trace
HKU\S-1-5-21-602162358-1425521274-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Run#gadcom [ “C:\Documents and Settings\Peter\Application Data\gadcom\gadcom.exe” 61A847B5BBF728173599284503996897C881250221C8670836AC4FA7C8833201749139 ]
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\fbk.sts
Adware.Prun
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\prunnet
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\prunnet#DisplayName
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\prunnet#DisplayVersion
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\prunnet#UninstallString
HKLM\Software\Microsoft\Windows\CurrentVersion\Run#prunnet [ “C:\WINDOWS\system32\prunnet.exe” ]
HKU\S-1-5-21-602162358-1425521274-725345543-1003\Software\Microsoft\Windows\CurrentVersion\Run#prunnet [ “C:\WINDOWS\system32\prunnet.exe” ]
Trojan.Dropper-NET/TMP-FV
C:\DOCUMENTS AND SETTINGS\PETER\LOCAL SETTINGS\TEMP\ORAEWMXSNC.TMP
C:\DOCUMENTS AND SETTINGS\PETER\LOCAL SETTINGS\TEMP\SNAPSNET.TMP
C:\DOCUMENTS AND SETTINGS\PETER\LOCAL SETTINGS\TEMP\XCSMOREWNA.TMP
Trace.Known Threat Sources
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\Content.IE5\89UFOP6V\secure_installers[2].js
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\Content.IE5\C52JW96J\low_16[2].jpg
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\Content.IE5\KX6N8P67\right_text_06[2].jpg
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\Content.IE5\89UFOP6V\crypt[2].js
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\Content.IE5\4TQJ89A7\129[1].htm
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\Content.IE5\KX6N8P67\full_scan_top_07[2].jpg
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\Content.IE5\C52JW96J\right_thead_14[1].gif
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\Content.IE5\4TQJ89A7\params[2].js
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\Content.IE5\4TQJ89A7\map_03[1].jpg
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\Content.IE5\C52JW96J\settings[2].js
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\Content.IE5\KX6N8P67\style[1].css
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\Content.IE5\89UFOP6V\thead_right_14[1].gif
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\Content.IE5\4TQJ89A7\index_new[2].js
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\Content.IE5\4TQJ89A7\full_scan_bott_07[1].gif
C:\Documents and Settings\Peter\Local Settings\Temporary Internet Files\Content.IE5\KX6N8P67\managers[2].js
And from Malwarebytes antimalware, run subsequently:
Files Infected:
C:\Documents and Settings\Peter\Local Settings\Temp\Mirar_V77_LOG_IESC_AFF_ATD_TID_noMDNS_RPT_AVM_FLX_ADB_876984.exe (Adware.Mirar) → Quarantined and deleted successfully.
C:\System Volume Information_restore{550952DE-3E20-4B63-8FA3-B9D26D010496}\RP850\A0243093.exe (Trojan.Downloader) → Quarantined and deleted successfully.
C:\System Volume Information_restore{550952DE-3E20-4B63-8FA3-B9D26D010496}\RP850\A0243094.exe (Trojan.Downloader) → Quarantined and deleted successfully.
After, I ran Secunia and secured all the apps it suggested.
-Peter