Hi,

Please attach here AdwCleaner S1 log for review.
C:\AdwCleaner[S1].txt

  1. Open notepad and copy/paste the text present inside the code box below.
    To do this highlight the contents of the box and right click on it. Paste this into the open notepad.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to the operating system


START
HKCU\...\Run: [tsiVideo] - rundll32.exe C:\DOCUME~1\Freeze\LOCALS~1\Temp\\tsiVi132.dll,start [x] <===== ATTENTION
CMD: attrib /d /s -s -h F:\*
CMD: attrib /d /s -s -h H:\*
CMD: rd /s /q F:\$RECYCLE.BIN
CMD: rd /s /q F:\RECYCLER
CMD: rd /s /q H:\$RECYCLE.BIN
CMD: rd /s /q H:\RECYCLER
MountPoints2: H - H:\AutoRun.exe
MountPoints2: {141d4db8-098e-11df-913d-001fd0532981} - F:\AutoRun.exe
MountPoints2: {141d4dbc-098e-11df-913d-001fd0532981} - F:\AutoRun.exe
MountPoints2: {141d4dbe-098e-11df-913d-001fd0532981} - F:\AutoRun.exe
MountPoints2: {18080350-13de-11df-915b-001fd0532981} - F:\AutoRun.exe
MountPoints2: {36ecce98-16f8-11df-916c-001fd0532981} - F:\AutoRun.exe
MountPoints2: {7ff0689c-098c-11df-913c-001fd0532981} - F:\AutoRun.exe
MountPoints2: {7ff068a0-098c-11df-913c-001fd0532981} - F:\AutoRun.exe
MountPoints2: {8585ec0c-098a-11df-913b-001fd0532981} - F:\AutoRun.exe
MountPoints2: {870b364d-d341-11de-9083-001cf018c37d} - F:\AutoRun.exe
MountPoints2: {870b3650-d341-11de-9083-001fd0532981} - F:\AutoRun.exe
MountPoints2: {870b3652-d341-11de-9083-001fd0532981} - F:\AutoRun.exe
MountPoints2: {870b3653-d341-11de-9083-001fd0532981} - F:\AutoRun.exe
MountPoints2: {895bac3a-13db-11df-915a-001fd0532981} - F:\AutoRun.exe
MountPoints2: {8dfa273e-34a0-11e1-a718-001fd0532981} - G:\AutoRun.exe
MountPoints2: {baf50938-8d88-11df-a2b5-001fd0532981} - F:\AutoRun.exe
MountPoints2: {d8c12b2c-0980-11df-913a-001cf018c37d} - F:\AutoRun.exe
MountPoints2: {d8c12b31-0980-11df-913a-001cf018c37d} - F:\AutoRun.exe
MountPoints2: {d8c12b33-0980-11df-913a-001cf018c37d} - F:\AutoRun.exe
MountPoints2: {d8c12b37-0980-11df-913a-001cf018c37d} - F:\AutoRun.exe
MountPoints2: {d92148cc-fb87-11de-910e-001cf018c37d} - F:\AutoRun.exe
MountPoints2: {f10f2a9e-acd5-11df-a322-001fd0532981} - I:\Windows\CHECK\DriveNavigator.exe
MountPoints2: {f6917c98-fba3-11df-a417-001fd0532981} - F:\AutoRun.exe
MountPoints2: {f6917c99-fba3-11df-a417-001fd0532981} - F:\AutoRun.exe
H:\AutoRun.exe
F:\AutoRun.exe
BHO: No Name - {1FD79A59-37B1-459B-9097-09F9FAB8A523} -  No File
BHO: No Name - {5C255C8A-E604-49b4-9D64-90988571CECB} -  No File
CHR Extension: () - C:\DOCUME~1\Freeze\LOCALS~1\Application Data\Google\Chrome\User Data\Default\Extensions\pgbdhkpacgdhfabeceekiafonfkipohm\1.0_0
C:\DOCUME~1\Freeze\LOCALS~1\Application Data\Google\Chrome\User Data\Default\Extensions\pgbdhkpacgdhfabeceekiafonfkipohm
Folder: C:\Autoruns
File: c:\windows\system32\V0530Pin.dll
c:\program files\babylon
CMD: ipconfig /flushdns
END

  1. Save notepad as fixlist.txt
    NOTE. It’s important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

  2. Run FRST/FRST64 and press the Fix button just once and wait.
    If the tool needed a restart please make sure you let the system to restart normally and let the tool completes its run after restart.
    The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply.

Note: If the tool warned you about the outdated version please download and run the updated version.

========= NEXT ==========

Download TDSSKiller and save it to your desktop

Execute [b]TDSSKiller.exe[/b] by doubleclicking on it.

[*] Press Start Scan

[*] If Suspicious object is detected, the default action will be Skip, click on Continue.
[*] If Malicious objects are found, select Cure.

Once complete, a log will be produced at the root drive which is typically C:\ ,for example, [b]C:\TDSSKiller.<version_date_time>log.txt[/b]

Please post the contents of that log in your next reply.

========= NEXT ==========

  1. Re-run FRST click on Scan button and attach here fresh FRST.txt logreport.

Type iswizard.7z into the Search: field in FRST then click the Search File(s) button.
FRST will search your computer for files and when finished it will produce a log Search.txt on the flash drive.
Exit FRST.