Current Results
Malwarebytes Anti-Malware found
Rogue.AVsec... - File - c:\documents and settings\Owner\local settin..
Rogue.AVsec... - Registry Value - HKEY_CURRENT_USER_SOFTWARE\Micr... Value: nutnumoqjp
(these nutnumoqjp detected seem to be the 04 mentioned above and that highjackthis and OTL both detected)
Rogue.AVSec... - Regristry Key - HKEY_LOCAL_MACHINE\SOFTWARE\Micr... Value: nutnumoqjp
Trojan.Fraudp... - Registry Key - HKEY_CURRENT_USER\Software/\vsoft
Rogue.Antivir... - Registry Key - HKEY_CURRENT_USER\Software\avsuite
Trojan.Fraudp... - Registry Key - HKEY_LOCAL_MACHINE\SOFTWARE\avsoft
Rogue.Antivir... - Registry Key - HKEY_LOCAL_MACHINE\SOFTWARE\avsu...
_____
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.orgDatabase version: 4184
Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13
6/10/2010 12:32:06 AM
mbam-log-2010-06-10 (00-32-06).txt
Scan type: Full scan (C:\|D:\|)
Objects scanned: 211612
Time elapsed: 1 hour(s), 32 minute(s), 1 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
HKEY_CURRENT_USER\Software\avsoft (Trojan.Fraudpack) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\avsuite (Rogue.AntivirusSuite) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\avsoft (Trojan.Fraudpack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\avsuite (Rogue.AntivirusSuite) -> Quarantined and deleted successfully.
Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nutnumoqjp (Rogue.AVSecuritySuite) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nutnumoqjp (Rogue.AVSecuritySuite) -> Quarantined and deleted successfully.
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
c:\documents and settings\Owner\local settings\application data\kwdlrgjh\surcigd.exe (Rogue.AVSecuritySuite) -> Quarantined and deleted successfully.
Another scan with MBAM right after did not detect anything this time.
The above did not seem to be found when I re-scanned with HighJackThis and OTL
the things below look very suspicious to me is this something to worry about/should be adressed or are they something that is being blocked?

O1 HOSTS File: ([2009/03/31 14:42:06 | 000,303,844 | R--- | M]) - C:\WINDOWS\system32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1 localhost
O1 - Hosts: 127.0.0.1
www.007guard.comO1 - Hosts: 127.0.0.1 007guard.com
O1 - Hosts: 127.0.0.1 008i.com
O1 - Hosts: 127.0.0.1
www.008k.comO1 - Hosts: 127.0.0.1 008k.com
O1 - Hosts: 127.0.0.1
www.00hq.comO1 - Hosts: 127.0.0.1 00hq.com
O1 - Hosts: 127.0.0.1 010402.com
O1 - Hosts: 127.0.0.1
www.032439.comO1 - Hosts: 127.0.0.1 032439.com
O1 - Hosts: 127.0.0.1
www.0scan.comO1 - Hosts: 127.0.0.1 0scan.com
O1 - Hosts: 127.0.0.1 1000gratisproben.com
O1 - Hosts: 127.0.0.1
www.1000gratisproben.comO1 - Hosts: 127.0.0.1
www.1001namen.comO1 - Hosts: 127.0.0.1 1001namen.com
O1 - Hosts: 127.0.0.1
www.100888290cs.comO1 - Hosts: 127.0.0.1 100888290cs.com
O1 - Hosts: 127.0.0.1
www.100sexlinks.comO1 - Hosts: 127.0.0.1 100sexlinks.com
O1 - Hosts: 127.0.0.1
www.10sek.comO1 - Hosts: 127.0.0.1 10sek.com
O1 - Hosts: 127.0.0.1
www.1-2005-search.comO1 - Hosts: 127.0.0.1 1-2005-search.com
O1 - Hosts: 10468 more lines...
doesn't seem right
CREATERESTOREPOINT
Restore point Set: OTL Restore Point (16902109354000384)
========== Files/Folders - Created Within 90 Days ==========[2010/06/09 12:34:39 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Owner\Local Settings\Application Data\kwdlrgjh
is still under
"Restore Point" and was the infected file according to MBAM
I am also unsure if there is anything else besides what I have just mentioned that are causing problems, or could potentialy cause problems later on or cause the Rogue-AV to reoccur.
I've attached the OTL log to this post btw