scan results below:
MalwareBytes
Malwarebytes Anti-Malware 1.62.0.1300
www.malwarebytes.orgDatabase version: v2012.08.29.02
Windows Vista Service Pack 1 x86 NTFS
Internet Explorer 8.0.6001.19088
Belle :: MAEIR_NEW [administrator]
8/28/2012 11:41:48 PM
mbam-log-2012-08-28 (23-41-48).txt
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 249224
Time elapsed: 9 minute(s), 19 second(s)
Memory Processes Detected: 0
(No malicious items detected)
Memory Modules Detected: 0
(No malicious items detected)
Registry Keys Detected: 1
HKCU\SOFTWARE\CLASSES\CLSID\{42AEDC87-2188-41FD-B9A3-0C966FEABEC1}\INPROCSERVER32 (Trojan.Zaccess) -> Quarantined and deleted successfully.
Registry Values Detected: 1
HKCU\SOFTWARE\CLASSES\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32| (Trojan.Zaccess) -> Data: C:\Users\Belle\AppData\Local\{846fc601-8bc1-c467-991e-6ab6537544f4}\n. -> Quarantined and deleted successfully.
Registry Data Items Detected: 0
(No malicious items detected)
Folders Detected: 1
C:\sysproc.bin (Trojan.SpyEyes.R) -> Quarantined and deleted successfully.
Files Detected: 3
C:\Users\Belle\AppData\Local\temp\DD4F.tmp (Exploit.Drop.COD) -> Quarantined and deleted successfully.
C:\Windows\Installer\{846fc601-8bc1-c467-991e-6ab6537544f4}\n (RootKit.0Access) -> Quarantined and deleted successfully.
C:\sysproc.bin\E0532263A06B641 (Trojan.SpyEyes.R) -> Quarantined and deleted successfully.
(end)