I believe that the finding by Dr Web Cureit was a false/positive. That said, although with your antivirus, Malwarebytes, WinPatrol, and SpywareBlaster, you have sufficient security software there are a few disconcerting things in your logs.
You have some rather strange entries shown in installed programs:
????? Windows Live
?????? Windows Live
???????? ?????????? Windows Live
?????????? (????????????? ??????)
Due to the damage that programs such as Wise Disk Cleaner 7.79
, Wise Registry Cleaner 7.67
and other registry-type cleaners cause, this may be the result of using those programs. Windows is a closed source system. Developers of registry cleaners do not have the core code of Windows 7 and are not working on definitive information, but rather they are going on past knowledge and experience. Automatic cleaners will usually have to do some guesswork.
Modifying registry keys incorrectly can cause Windows instability, or make Windows unbootable. No registry cleaner is completely safe and the potential is ever present to cause more problems than they claim to fix.
Registry cleaners cannot distinguish between good and bad. If you run a registry cleaner, it will delete all those keys which are obsolete and sitting idle; but in reality, those keys may well be needed by some programs or windows at a later time.
Windows 7 is much more efficient at managing the registry than previous Windows versions. If you run any other registry cleaner and do not know precisely what you are doing, you will have problems down the road. There are no gains to be had from using a registry cleaner and the risk is great.
Forget all the "wisdom" you learned about XP. Windows 7 is not XP and does not manage the registry the same as XP.
As a reminder, ZeroVulnerabilityLabs ExploitShield is Beta
so please keep that in mind. The signature of a long-time friend:
Beta. Software undergoes beta testing shortly before it's released. Beta is Latin for 'still doesn't work.'
Please bear with me while I provide my P2P lecture. P2P programs such as µTorrent form a direct conduit on to your computer. They have always been a target of malware writers and are increasingly so of late. P2P security measures are easily circumvented and if your P2P program is not configured correctly, you may be sharing more files than you realize. There have been cases where people's passwords, address books and other personal, private, and financial details have been exposed to the file sharing network by a badly configured program.
With P2P file sharing, what means do you have of identifying or authenticating the source of the download? In addition, a file can be distributed among many hosts, and peers will provide for download the sections that they have already downloaded. This results in the distinct possibility of a distribution method in which malicious bits are mixed with with good files.
Unless you have cleared older event viewer log entries, the following entry needs your attention:
Error: volsnap  - The shadow copies of volume C: were aborted because of an IO failure on volume C:
Please create a fresh System Restore point, restart your computer and check that the restore point is available. It is possible that this could be a sign of a failing hard drive and something you may want to follow up on in the Hardware Forum.