Need Help Please

I need assistance please. It is tough to type while closing all the opening browser windows from “Internet Speed Monitor” navigating to various adds. This malware began a few days ago on my daughter’s machine. She claimed to have gone to a page to view a preview of the movie “fireproof” and then the avast alarm went off. She used system restore the next day. I have been scanning this machine with various tools and always get different/varying results. The browser hijacking makes it impossible to use. I also note that automatic microsoft updates is now disabled and I can not get it enabled even running services.msc. Last night, I disabled system restore, and did a boot scan with avast and here is the log:
10/29/2008 11:05
Scan of all local drives

File C:\Program Files\support.com\providerComcast\htmlagent\inc\chtr_dectree.js is infected by JS:Feebs-A1, Deleted
Number of searched folders: 17296
Number of tested files: 161331
Number of infected files: 1


11/23/2008 23:42
Scan of all local drives

File C:\Program Files\Online Services\NetscapeOnline\NSsetup.exe is infected by Win32:Trojan-gen {Other}, Deleted
File C:\Program Files\Updates from HP\9972322\Program\Interop.SHDocVw.dll is infected by Win32:Adware-gen [Adw], Deleted
File C:\WINDOWS\system32\byXPHayy.dll is infected by Win32:Trojan-gen {Other}, Repair: Error 42060 {The file was not repaired.}, Move to chest: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Repair: Error 42060 {The file was not repaired.}, Repair: Error 42060 {The file was not repaired.}, Move to chest: Error 0xC0000034 {Object Name not found.}, Move to chest: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}, Delete: Error 0xC0000034 {Object Name not found.}
Scanning aborted

Number of searched folders: 16457
Number of tested files: 148404
Number of infected files: 3


11/24/2008 08:56
Scan of all local drives

File C:\WINDOWS\system32\drivers\TDSSpqlt.sys is infected by Win32:Tidserv [trj], Moved to chest
File C:\WINDOWS\system32\khfDvsTl.dll is infected by Win32:Trojan-gen {Other}, Moved to chest
File C:\WINDOWS\system32\opnmNfCS.dll is infected by Win32:Trojan-gen {Other}, Moved to chest
File C:\WINDOWS\system32\TDSShrxx.dll is infected by Win32:Trojan-gen {Other}, Moved to chest
File C:\WINDOWS\system32\TDSSoiqt.dll is infected by Win32:Trojan-gen {Other}, Moved to chest
File C:\WINDOWS\system32\TDSSvkql.dll is infected by Win32:Trojan-gen {Other}, Moved to chest
File C:\WINDOWS\system32\wvUlmNdb.dll is infected by Win32:Trojan-gen {Other}, Moved to chest
Number of searched folders: 17229
Number of tested files: 160313
Number of infected files: 7


11/25/2008 08:25
Scan of all local drives

File C:\Program Files\Alwil Software\Avast4\DATA\moved\A0049344.sys.vir is infected by Win32:Tidserv [trj], Moved to chest
File C:\Program Files\Alwil Software\Avast4\DATA\moved\eTIIB90.exe.vir is infected by Win32:Trojan-gen {Other}, Moved to chest
Number of searched folders: 17220
Number of tested files: 158407
Number of infected files: 2


11/25/2008 22:44
Scan of all local drives

File C:\Documents and Settings\HP_Administrator\Local Settings\Temp\mwnsxrweox.tmp is infected by Win32:Rootkit-gen [Rtk], Deleted
File C:\Documents and Settings\HP_Administrator\Local Settings\Temp\nomearoasx.tmp is infected by Win32:Rootkit-gen [Rtk], Deleted
File C:\Documents and Settings\HP_Administrator\Local Settings\Temp\prun.tmp is infected by Win32:Rootkit-gen [Rtk], Deleted
File C:\System Volume Information_restore{B9823275-D858-498B-A4DC-C4EEDA322F67}\RP401\A0047323.dll is infected by Win32:Adware-gen [Adw], Deleted
File C:\System Volume Information_restore{B9823275-D858-498B-A4DC-C4EEDA322F67}\RP402\A0049557.dll is infected by Win32:Rootkit-gen [Rtk], Deleted
File C:\System Volume Information_restore{B9823275-D858-498B-A4DC-C4EEDA322F67}\RP403\A0049586.dll is infected by Win32:Rootkit-gen [Rtk], Deleted
File C:\System Volume Information_restore{B9823275-D858-498B-A4DC-C4EEDA322F67}\RP403\A0049597.exe is infected by Win32:Rootkit-gen [Rtk], Deleted
Number of searched folders: 17249
Number of tested files: 1206448
Number of infected files: 7


11/29/2008 23:44
Scan of all local drives

File C:\Documents and Settings\HP_Administrator\Local Settings\Temp\79.exe$PLUGINSDIR\f1 is infected by Win32:Trojan-gen {Other}, Moved to chest
File C:\Program Files\Alwil Software\Avast4\DATA\moved\OFCZXR.DLL.vir is infected by Win32:Trojan-gen {Other}, Moved to chest
File C:\WINDOWS\system32\aaptsbyf.dll is infected by Win32:Rootkit-gen [Rtk], Moved to chest
File C:\WINDOWS\system32\bdfngfys.dll is infected by Win32:Rootkit-gen [Rtk], Moved to chest
File C:\WINDOWS\system32\clwxwe.dll is infected by Win32:Rootkit-gen [Rtk], Moved to chest
File C:\WINDOWS\system32\evffleop.dll is infected by Win32:Trojan-gen {Other}, Moved to chest
File C:\WINDOWS\system32\kvdliebg.dll is infected by Win32:Trojan-gen {Other}, Moved to chest
File C:\WINDOWS\system32\nbwgqfdc.dll is infected by Win32:Trojan-gen {Other}, Moved to chest
File C:\WINDOWS\system32\trz3.tmp is infected by Win32:Rootkit-gen [Rtk], Moved to chest
File C:\WINDOWS\system32\trz4.tmp is infected by Win32:Rootkit-gen [Rtk], Moved to chest
Number of searched folders: 17062
Number of tested files: 1176847
Number of infected files: 10

I will post a hjt log next.

Thank you very very much for any help.

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 8:34:19 AM, on 11/30/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16735)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\arservice.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\eHome\ehRecvr.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\BellSouthWCC\McciTrayApp.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\eHome\ehSched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Common Files\Motive\McciCMService.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\GetPack\GetPack25.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\svchost.exe
c:\WINDOWS\system32\ZuneBusEnum.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\AcroRd32.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.comcast.net/
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = :0
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM..\Run: [TkBellExe] “C:\Program Files\Common Files\Real\Update_OB\realsched.exe” -osboot
O4 - HKLM..\Run: [Zune Launcher] “c:\Program Files\Zune\ZuneLauncher.exe”
O4 - HKLM..\Run: [QuickTime Task] “C:\Program Files\QuickTime\qttask.exe” -atboottime
O4 - HKLM..\Run: [iTunesHelper] “C:\Program Files\iTunes\iTunesHelper.exe”
O4 - HKLM..\Run: [BellSouthWCC_McciTrayApp] C:\Program Files\BellSouthWCC\McciTrayApp.exe
O4 - HKLM..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM..\Run: [zaragimura] Rundll32.exe “C:\WINDOWS\system32\pusunovi.dll”,s
O4 - HKCU..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU..\Run: [Yahoo! Pager] “C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE” -quiet
O4 - HKCU..\Run: [ares] “C:\Program Files\Ares\Ares.exe” -h
O4 - HKCU..\Run: [MSMSGS] “C:\Program Files\Messenger\msmsgs.exe” /background
O4 - HKCU..\Run: [BitComet] “C:\Program Files\BitComet\BitComet.exe” /tray
O4 - HKCU..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU..\Run: [prunnet] “C:\WINDOWS\system32\prunnet.exe”
O4 - HKCU..\Run: [GetPack25] “C:\Program Files\GetPack\GetPack25.exe”
O4 - HKUS\S-1-5-19..\Run: [zaragimura] Rundll32.exe “C:\WINDOWS\system32\pusunovi.dll”,s (User ‘LOCAL SERVICE’)
O4 - HKUS\S-1-5-20..\Run: [zaragimura] Rundll32.exe “C:\WINDOWS\system32\pusunovi.dll”,s (User ‘NETWORK SERVICE’)
O4 - Global Startup: HOTSYNCSHORTCUTNAME.lnk = C:\Program Files\palmOne\Hotsync.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra ‘Tools’ menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
O9 - Extra button: BitComet - {D18A0B52-D63C-4ed0-AFC6-C1E3DC1AF43A} - res://C:\Program Files\BitComet\tools\BitCometBHO_1.1.11.30.dll/206 (file missing)
O9 - Extra button: Connection Help - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra ‘Tools’ menuitem: Connection Help - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra ‘Tools’ menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra ‘Tools’ menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://housecall65.trendmicro.com/housecall/applet/html/native/x86/win32/activex/hcImpl.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://www2.snapfish.com/SnapfishActivia.cab
O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} (Windows Live Safety Center Base Module) - http://cdn.scan.onecare.live.com/resource/download/scanner/wlscbase6662.cab
O16 - DPF: {8A0019EB-51FA-4AE5-A40B-C0496BBFC739} (Verizon Wireless Media Upload) - http://picture.vzw.com/activex/VerizonWirelessUploadControl.cab
O18 - Filter hijack: text/html - {f05da186-c473-4d14-809e-199357884954} - C:\WINDOWS\system32\msiebbar.dll
O20 - AppInit_DLLs: ,C:\WINDOWS\system32\nopasisi.dll
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: ASP.NET State Service (aspnet_state) - Unknown owner - C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\aspnet_state.exe (file missing)
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: McciCMService - Motive Communications, Inc. - C:\Program Files\Common Files\Motive\McciCMService.exe


End of file - 8544 bytes

Try this

Please download the OTMoveIt3 by OldTimer.

[*] Save it to your desktop.
[*] Please double-click OTMoveIt3.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
[*]Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

 :Processes
explorer.exe

:Reg
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"zaragimura"=-
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"prunnet"=-
"GetPack25"=-
[HKEY_USERS\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"zaragimura"=-
[HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"zaragimura"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=-

:Files
C:\WINDOWS\system32\pusunovi.dll
C:\WINDOWS\system32\prunnet.exe
C:\Program Files\GetPack
C:\WINDOWS\system32\nopasisi.dll

:Commands
[purity]
[emptytemp]

[*] Return to OTMoveIt3, right click in the “Paste Instructions for Items to be Moved” window (under the yellow bar) and choose Paste.

[*]Click the red Moveit! button.
[*]Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
[*]Close OTMoveIt3

Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.

THEN

Please download Malwarebytes’ Anti-Malware from Here or Here

Double Click mbam-setup.exe to install the application.
[*]Make sure a checkmark is placed next to Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware, then click Finish.
[*]If an update is found, it will download and install the latest version.
[*]Once the program has loaded, select “Perform Quick Scan”, then click Scan.
[*]The scan may take some time to finish,so please be patient.
[*]When the scan is complete, click OK, then Show Results to view the results.
[*]Make sure that everything is checked, and click Remove Selected.
[]When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
[
]The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
[*]Copy&Paste the entire report in your next reply.

Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Thanks for our help ESSEX! Completed step one. Machine did freeze up and showed a Rundll error: “Loading C:\Windows\system32\pusundvi.dll. the specifiedod not be found.” System required reboot and brought up this OTMoveit3 log:

========== PROCESSES ==========
Process explorer.exe killed successfully.
========== REGISTRY ==========
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zaragimura deleted successfully.
Registry value HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\prunnet deleted successfully.
Registry value HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GetPack25 deleted successfully.
Registry value HKEY_USERS\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zaragimura deleted successfully.
Registry value HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zaragimura deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs deleted successfully.
========== FILES ==========
DllUnregisterServer procedure not found in C:\WINDOWS\system32\pusunovi.dll
C:\WINDOWS\system32\pusunovi.dll NOT unregistered.
C:\WINDOWS\system32\pusunovi.dll moved successfully.
File/Folder C:\WINDOWS\system32\prunnet.exe not found.
C:\Program Files\GetPack moved successfully.
DllUnregisterServer procedure not found in C:\WINDOWS\system32\nopasisi.dll
C:\WINDOWS\system32\nopasisi.dll NOT unregistered.
C:\WINDOWS\system32\nopasisi.dll moved successfully.
========== COMMANDS ==========
User’s Temp folder emptied.
User’s Temporary Internet Files folder emptied.
User’s Internet Explorer cache folder emptied.
Local Service Temp folder emptied.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Local Service Temporary Internet Files folder emptied.
File delete failed. C:\WINDOWS\temp_avast4_\Webshlock.txt scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_608.dat scheduled to be deleted on reboot.
Windows Temp folder emptied.
Java cache emptied.
Temp folders emptied.

OTMoveIt3 by OldTimer - Version 1.0.7.1 log created on 11302008_090436

Files moved on Reboot…
File move failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.
File move failed. C:\WINDOWS\temp_avast4_\Webshlock.txt scheduled to be moved on reboot.
C:\WINDOWS\temp\Perflib_Perfdata_608.dat moved successfully.

BTW, It seems that the browser hijacking has stopped after this process. Sure makes it easier to type.
;D

Ok, I completed step 2. Same previously described rundll error on reboot. Here is the Mbam log:

Malwarebytes’ Anti-Malware 1.30
Database version: 1437
Windows 5.1.2600 Service Pack 3

11/30/2008 9:42:07 AM
mbam-log-2008-11-30 (09-42-07).txt

Scan type: Quick Scan
Objects scanned: 57466
Time elapsed: 5 minute(s), 20 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 22
Registry Values Infected: 1
Registry Data Items Infected: 2
Folders Infected: 5
Files Infected: 17

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\hgGvtsRJ.dll (Trojan.Vundo.H) → Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects{8063b27b-0088-4d5a-b3d9-03e511400e9a} (Trojan.Vundo.H) → Delete on reboot.
HKEY_CLASSES_ROOT\CLSID{8063b27b-0088-4d5a-b3d9-03e511400e9a} (Trojan.Vundo.H) → Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects{45d50a00-cf0a-47d8-a1c1-bc4f1ad13d48} (Trojan.BHO.H) → Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID{45d50a00-cf0a-47d8-a1c1-bc4f1ad13d48} (Trojan.BHO.H) → Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats{8063b27b-0088-4d5a-b3d9-03e511400e9a} (Trojan.Vundo) → Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID{73259091-9574-4ed8-a40f-7f65afc28634} (Trojan.Vundo) → Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats{7545d8c8-f53c-4e2f-8fa0-d248ef4a6e61} (Rogue.Installer) → Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats{73259091-9574-4ed8-a40f-7f65afc28634} (Trojan.Vundo) → Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) → Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\icheck (Trojan.Agent) → Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\GetPack (Adware.Agent) → Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata (Trojan.Agent) → Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\tdss (Trojan.Agent) → Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\xpre (Trojan.Downloader) → Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) → Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) → Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) → Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) → Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) → Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) → Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects{48b7a6d9-8780-cd15-ed24-5cc12d448352} (Adware.BHO) → Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID{48b7a6d9-8780-cd15-ed24-5cc12d448352} (Adware.BHO) → Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zaragimura (Trojan.Agent) → Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) → Data: c:\windows\system32\hggvtsrj → Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) → Data: c:\windows\system32\hggvtsrj → Delete on reboot.

Folders Infected:
C:\Program Files\WinBudget (Adware.AdMedia) → Quarantined and deleted successfully.
C:\Program Files\WinBudget\bin (Adware.AdMedia) → Quarantined and deleted successfully.
C:\Program Files\iCheck (Trojan.Agent) → Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator\Application Data\gadcom (Trojan.Agent) → Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator\Application Data\NI.GSCNS (Trojan.Agent) → Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\hgGvtsRJ.dll (Trojan.Vundo.H) → Delete on reboot.
C:\WINDOWS\system32\JRstvGgh.ini (Trojan.Vundo.H) → Quarantined and deleted successfully.
C:\WINDOWS\system32\JRstvGgh.ini2 (Trojan.Vundo.H) → Quarantined and deleted successfully.
C:\WINDOWS\system32\pavutaya.dll (Trojan.BHO.H) → Delete on reboot.
C:\Program Files\iCheck\Uninstall.exe (Trojan.Agent) → Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator\Application Data\NI.GSCNS\dl.ini (Trojan.Agent) → Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator\Application Data\NI.GSCNS\settings.ini (Trojan.Agent) → Quarantined and deleted successfully.
C:\WINDOWS\system32\TDSSlxcp.dll (Trojan.Agent) → Quarantined and deleted successfully.
C:\WINDOWS\system32~.exe (Trojan.Downloader) → Quarantined and deleted successfully.
C:\RECYCLER\ADAPT_Installer.exe (Heuristics.Malware) → Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator\My Documents\My Music\My Music.url (Trojan.Zlob) → Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator\My Documents\My Pictures\My Pictures.url (Trojan.Zlob) → Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator\My Documents\My Videos\My Video.url (Trojan.Zlob) → Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator\My Documents\My Documents.url (Trojan.Zlob) → Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Online Antispyware Test.url (Trojan.Zlob) → Quarantined and deleted successfully.
C:\WINDOWS\system32\TDSSkkai.log (Trojan.TDSS) → Quarantined and deleted successfully.
C:\WINDOWS\system32\nsk2D.dll (Adware.BHO) → Delete on reboot.

Looks like you had the tdss rootkit so you will need to run another programme to kill the legacy keys and see if it left any logs behind

Download ComboFix from one of these locations:

Link 1
Link 2
Link 3

* IMPORTANT !!! Save ComboFix.exe to your Desktop

[*]Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

[*]Double click on ComboFix.exe & follow the prompts.

[*]As part of it’s process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it’s strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

[*]Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it’s malware removal procedures.

http://img.photobucket.com/albums/v706/ried7/RcAuto1.gif

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

http://img.photobucket.com/albums/v706/ried7/whatnext.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Ok. Here is the combofix log. It will take to posts:

ComboFix 08-11-30.01 - HP_Administrator 2008-11-30 10:43:58.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.583 [GMT -6:00]
Running from: c:\documents and settings\HP_Administrator\Desktop\ComboFix.exe

  • Created a new restore point
    .

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\HP_Administrator\Local Settings\Temporary Internet Files\fbk.sts
c:\program files\INSTALL.LOG
c:\windows\Downloaded Program Files\setup.inf
c:\windows\IE4 Error Log.txt
c:\windows\system32\jroyoavt.ini
c:\windows\system32\kvorkcxv.ini
c:\windows\system32\oxqnyjwc.ini
c:\windows\system32\poelffve.ini
c:\windows\system32\TDSSmtvd.dat
D:\Autorun.inf

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_TDSSSERV.SYS
-------\Service_TDSSserv.sys

((((((((((((((((((((((((( Files Created from 2008-10-28 to 2008-11-30 )))))))))))))))))))))))))))))))
.

2008-11-30 09:30 . 2008-11-30 09:30 d-------- c:\program files\Malwarebytes’ Anti-Malware
2008-11-30 09:30 . 2008-11-30 09:30 d-------- c:\documents and settings\HP_Administrator\Application Data\Malwarebytes
2008-11-30 09:30 . 2008-11-30 09:30 d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2008-11-30 09:30 . 2008-10-22 16:10 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2008-11-30 09:30 . 2008-10-22 16:10 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2008-11-30 09:04 . 2008-11-30 09:04 d-------- C:_OTMoveIt
2008-11-28 01:18 . 2008-11-28 01:18 2,713 —hs---- c:\windows\system32\wisolike.exe
2008-11-26 19:15 . 2008-11-26 19:15 53,938 --a------ c:\windows\system32\cont_adsoftinc-remove.exe
2008-11-26 13:15 . 2008-11-26 13:15 2,713 —hs---- c:\windows\system32\wusorevo.exe
2008-11-25 19:57 . 2008-11-25 19:57 d-------- c:\program files\Trend Micro
2008-11-25 18:41 . 2008-11-25 21:43 d-------- c:\documents and settings\HP_Administrator.housecall6.6
2008-11-25 16:13 . 2008-11-25 16:13 2,713 —hs---- c:\windows\system32\hurasivi.exe
2008-11-23 15:52 . 2008-11-23 15:52 d-------- c:\documents and settings\HP_Administrator\Application Data\IUpd721
2008-11-23 15:32 . 2008-11-23 15:32 115,016 --a------ c:\windows\system32\MSINET.OCX
2008-11-23 15:32 . 2008-11-23 15:32 29,184 --a------ c:\windows\system32\MSINET.oca
2008-11-23 15:32 . 2008-11-23 15:32 2,407 --a------ c:\windows\system32\MSINET.DEP
2008-11-12 06:59 . 2008-09-04 11:15 1,106,944 --------- c:\windows\system32\dllcache\msxml3.dll
2008-11-12 06:59 . 2008-10-24 05:21 455,296 --------- c:\windows\system32\dllcache\mrxsmb.sys
2008-10-29 10:03 . 2008-10-29 10:03 d-------- c:\program files\Alwil Software
2008-10-29 09:46 . 2008-10-29 09:46 d-------- c:\program files\BellSouthWCC
2008-10-29 09:30 . 2007-05-14 12:03 445,696 -ra------ c:\windows\system32\drivers\rt73.sys
2008-10-29 09:05 . 2008-10-29 12:11 d-------- c:\documents and settings\HP_Administrator\Application Data\Motive
2008-10-29 09:04 . 2008-10-29 09:46 d-------- c:\program files\Common Files\Motive
2008-10-29 09:04 . 2008-10-29 09:04 d-------- c:\program files\att-nap
2008-10-29 09:03 . 2008-10-29 09:03 d-------- c:\documents and settings\All Users\Application Data\Motive
2008-10-24 06:00 . 2008-10-15 10:34 337,408 --------- c:\windows\system32\dllcache\netapi32.dll
2008-10-14 22:07 . 2008-09-08 04:41 333,824 --------- c:\windows\system32\dllcache\srv.sys
2008-10-14 22:06 . 2008-08-14 04:11 2,189,184 --------- c:\windows\system32\dllcache\ntoskrnl.exe
2008-10-14 22:06 . 2008-08-14 04:09 2,145,280 --------- c:\windows\system32\dllcache\ntkrnlmp.exe
2008-10-14 22:06 . 2008-08-14 03:33 2,066,048 --------- c:\windows\system32\dllcache\ntkrnlpa.exe
2008-10-14 22:06 . 2008-08-14 03:33 2,023,936 --------- c:\windows\system32\dllcache\ntkrpamp.exe
2008-10-14 22:06 . 2008-09-15 06:12 1,846,400 --------- c:\windows\system32\dllcache\win32k.sys

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-11-27 00:43 --------- d-----w c:\program files\Windows Live Safety Center
2008-11-24 20:03 --------- d-----w c:\documents and settings\All Users\Application Data\Lavasoft
2008-11-24 20:02 --------- d-----w c:\program files\Lavasoft
2008-11-24 20:00 --------- d-----w c:\program files\Common Files\Wise Installation Wizard
2008-11-22 22:18 --------- d-----w c:\program files\Google
2008-10-29 15:15 --------- d-----w c:\documents and settings\All Users\Application Data\McAfee
2008-10-24 11:21 455,296 ----a-w c:\windows\system32\drivers\mrxsmb.sys
2008-10-24 01:49 --------- d-----w c:\program files\Common Files\Symantec Shared
2008-04-25 02:15 0 --sha-w c:\documents and settings\HP_Administrator\Application Data[u]0[/u]048111e23d30a475d7d3d9395370a9ff361f7be500ba1e2bc.dat
2007-10-13 04:59 61,480 ----a-w c:\documents and settings\HP_Administrator\GoToAssistDownloadHelper.exe
2006-06-03 23:45 774,144 -c–a-w c:\program files\RngInterstitial.dll
2005-11-18 23:44 251 -c–a-w c:\program files\wt3d.ini
2008-08-27 00:18 32,768 --sha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008082620080827\index.dat
.

((((((((((((((((((((((((((((((((((((((((((((( AWF ))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
----a-w 253,952 2005-05-10 17:50:42 c:\hp\drivers\hplsbwatcher\bak\lsburnwatcher.exe
----a-w 253,952 2005-05-11 00:50:42 c:\hp\drivers\hplsbwatcher\LSBurnWatcher.exe

----a-w 969,728 2007-02-18 21:30:17 c:\program files\Ares\bak\Ares.exe
----a-w 962,560 2007-11-23 16:18:16 c:\program files\Ares\Ares.exe

----a-w 61,440 2005-08-10 07:33:06 c:\program files\ATI Technologies\ATI.ACE\bak\cli.exe
----a-w 61,440 2005-08-10 14:33:06 c:\program files\ATI Technologies\ATI.ACE\CLI.exe

----a-w 131,072 2006-08-25 07:43:40 c:\program files\CA\eTrust PestPatrol\bak\PPActiveDetection.exe

----a-w 192,512 2005-05-09 23:16:15 c:\program files\Comcast\Comcast PhotoShow 4\data\Xtras\bak\mssysmgr.exe

----a-w 180,269 2005-09-14 20:30:46 c:\program files\Common Files\Real\Update_OB\bak\realsched.exe
----a-w 180,269 2005-09-15 03:30:46 c:\program files\Common Files\Real\Update_OB\realsched.exe

----a-w 48,752 2005-10-04 18:42:40 c:\program files\Common Files\Symantec Shared\bak\ccApp.exe

----a-w 190,064 2005-10-04 18:41:38 c:\program files\Common Files\Symantec Shared\bak\ccEmlPxy.dll

----a-w 3,198,976 2006-04-03 04:48:52 c:\program files\FilmLoop Player\bak\FilmLoop.exe

----a-w 245,760 2005-02-25 22:34:02 c:\program files\Hewlett-Packard\HP Boot Optimizer\bak\HPBootOp.exe
----a-w 245,760 2005-02-26 05:34:02 c:\program files\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe

----a-w 49,152 2005-06-01 23:35:56 c:\program files\HP\Digital Imaging{33D6CC28-9F75-4d1b-A11D-98895B3A3729}\bak\hphupd08.exe
----a-w 49,152 2005-06-02 06:35:56 c:\program files\HP\Digital Imaging{33D6CC28-9F75-4d1b-A11D-98895B3A3729}\hphupd08.exe

----a-w 49,152 2007-03-12 02:34:40 c:\program files\HP\HP Software Update\bak\HPWuSchd2.exe
----a-w 49,152 2005-05-12 13:12:54 c:\program files\HP\HP Software Update\hpwuSchd2.exe

----a-w 257,088 2007-06-01 21:51:26 c:\program files\iTunes\bak\iTunesHelper.exe
----a-w 289,576 2008-09-10 22:40:06 c:\program files\iTunes\iTunesHelper.exe

----a-w 36,975 2005-08-27 00:14:44 c:\program files\Java\jre1.5.0_05\bin\bak\jusched.exe

----a-w 600,896 2006-07-07 23:15:07 c:\program files\Microsoft IntelliPoint\bak\ipoint.exe

----a-w 576,320 2006-07-07 23:14:38 c:\program files\Microsoft IntelliType Pro\bak\itype.exe
----a-w 813,912 2006-11-21 22:08:58 c:\program files\Microsoft IntelliType Pro\itype.exe

----a-w 282,624 2007-04-27 14:41:54 c:\program files\QuickTime\bak\qttask.exe
----a-w 413,696 2008-09-06 20:09:14 c:\program files\QuickTime\QTTask.exe

----a-w 1,757,184 2006-06-02 21:09:18 c:\program files\support.com\bin\bak\tgcmd.exe

----a-w 85,744 2005-11-15 19:28:04 c:\program files\Symantec Client Security\Symantec AntiVirus\bak\VPTray.exe

----a-w 4,670,704 2007-08-30 22:43:18 c:\program files\Yahoo!\Messenger\bak\YAHOOM~1.EXE

----a-w 64,512 2005-08-05 20:56:34 c:\windows\ehome\bak\ehtray.exe
----a-w 64,512 2005-08

Combofix log. Post 2 of 3:

-06 03:56:34 c:\windows\ehome\ehtray.exe

.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
Note empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
“ctfmon.exe”=“c:\windows\system32\ctfmon.exe” [2008-04-13 15360]
“Yahoo! Pager”=“c:\progra~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE” [2007-08-30 4670704]
“ares”=“c:\program files\Ares\Ares.exe” [2007-11-23 962560]
“MSMSGS”=“c:\program files\Messenger\msmsgs.exe” [2008-04-13 1695232]
“BitComet”=“c:\program files\BitComet\BitComet.exe” [N/A]
“swg”=“c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe” [2007-10-14 68856]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
“TkBellExe”=“c:\program files\Common Files\Real\Update_OB\realsched.exe” [2005-09-14 180269]
“Zune Launcher”=“c:\program files\Zune\ZuneLauncher.exe” [2008-01-11 166304]
“QuickTime Task”=“c:\program files\QuickTime\qttask.exe” [2008-09-06 413696]
“iTunesHelper”=“c:\program files\iTunes\iTunesHelper.exe” [2008-09-10 289576]
“BellSouthWCC_McciTrayApp”=“c:\program files\BellSouthWCC\McciTrayApp.exe” [2006-03-10 543232]
“avast!”=“c:\progra~1\ALWILS~1\Avast4\ashDisp.exe” [2008-07-19 78008]
“RTHDCPL”=“RTHDCPL.EXE” [2007-10-25 c:\windows\RTHDCPL.EXE]

c:\documents and settings\All Users\Start Menu\Programs\Startup
HOTSYNCSHORTCUTNAME.lnk - c:\program files\palmOne\Hotsync.exe [2004-06-09 471040]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
“AppInit_DLLs”=c:\windows\system32\nopasisi.dll

[HKLM~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^ATI CATALYST System Tray.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\ATI CATALYST System Tray.lnk
backup=c:\windows\pss\ATI CATALYST System Tray.lnkCommon Startup

[HKLM~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Updates from HP.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Updates from HP.lnk
backup=c:\windows\pss\Updates from HP.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ares]
–a------ 2007-11-23 10:18 962560 c:\program files\Ares\Ares.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ATICCC]
–a------ 2005-08-10 08:33 61440 c:\program files\ATI Technologies\ATI.ACE\CLI.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
–a------ 2008-04-13 18:12 15360 c:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ehTray]
–a------ 2005-08-05 21:56 64512 c:\windows\ehome\ehtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
–a------ 2005-05-12 07:12 49152 c:\program files\HP\HP Software Update\hpwuSchd2.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HPBootOp]
–a------ 2005-02-25 23:34 245760 c:\program files\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HPHUPD08]
–a------ 2005-06-02 00:35 49152 c:\program files\HP\Digital Imaging{33D6CC28-9F75-4d1b-A11D-98895B3A3729}\hphupd08.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
–a------ 2008-09-10 16:40 289576 c:\program files\iTunes\iTunesHelper.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LSBWatcher]
–a------ 2005-05-10 18:50 253952 c:\hp\drivers\hplsbwatcher\LSBurnWatcher.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
–a------ 2008-04-13 18:12 1695232 c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
–a------ 2008-09-06 14:09 413696 c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
–a------ 2007-09-25 01:11 132496 c:\program files\Java\jre1.6.0_03\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
–a------ 2005-09-14 21:30 180269 c:\program files\Common Files\Real\Update_OB\realsched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Yahoo! Pager]
–a------ 2007-08-30 17:43 4670704 c:\progra~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Alcmtr]
–a------ 2005-05-03 10:43 69632 c:\windows\ALCMTR.EXE

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AlwaysReady Power Message APP]
–a------ 2005-08-03 00:19 77312 c:\windows\arpwrmsg.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
“MDM”=2 (0x2)
“Ati HotKey Poller”=2 (0x2)
“Apple Mobile Device”=2 (0x2)
“ALG”=3 (0x3)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
“UpdatesDisableNotify”=dword:00000001

combofix log post 3 of 3:

[HKLM~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
“%windir%\system32\sessmgr.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpqste08.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpofxm08.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hposfx08.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hposid01.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpqscnvw.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpqkygrp.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpqCopy.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpfccopy.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpzwiz01.exe”=
“c:\Program Files\HP\Digital Imaging\Unload\HpqPhUnl.exe”=
“c:\Program Files\HP\Digital Imaging\Unload\HpqDIA.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpoews01.exe”=
“c:\Program Files\Updates from HP\9972322\Program\Updates from HP.exe”=
“%windir%\Network Diagnostic\xpnetdiag.exe”=
“c:\Program Files\Messenger\msmsgs.exe”=
“c:\Program Files\Yahoo!\Messenger\YahooMessenger.exe”=
“c:\Program Files\Yahoo!\Messenger\YServer.exe”=
“c:\Program Files\Ares\Ares.exe”=
“c:\Program Files\Bonjour\mDNSResponder.exe”=
“c:\Program Files\iTunes\iTunes.exe”=
“c:\Program Files\att-nap\McciBrowser.exe”=

[HKLM~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
“20014:TCP”= 20014:TCP:BitComet 20014 TCP
“20014:UDP”= 20014:UDP:BitComet 20014 UDP

R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2008-10-29 78416]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\DRIVERS\aswFsBlk.sys [2008-10-29 20560]
R2 McciCMService;McciCMService;“c:\program files\Common Files\Motive\McciCMService.exe” [2008-10-29 303104]
R2 zumbus;Zune Bus Enumerator Driver;c:\windows\system32\DRIVERS\zumbus.sys [2007-11-15 40832]
R3 MRESP50;MRESP50 NDIS Protocol Driver;??\c:\progra~1\COMMON~1\Motive\MRESP50.SYS [2008-10-29 18304]
S3 DCamUSBVeo532;Veo Stingray/Connect Web Camera;c:\windows\system32\Drivers\ubVeo532.sys [2002-07-01 95232]
S3 MREMP50;MREMP50 NDIS Protocol Driver;??\c:\progra~1\COMMON~1\Motive\MREMP50.SYS [2008-10-29 19712]
S3 MREMP50a64;MREMP50a64 NDIS Protocol Driver;??\c:\progra~1\COMMON~1\Motive\MREMP50a64.SYS
S3 MRESP50a64;MRESP50a64 NDIS Protocol Driver;??\c:\progra~1\COMMON~1\Motive\MRESP50a64.SYS

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2{1493c7c0-634d-11dd-98f9-0013d4c33d6b}]
\Shell\AutoRun\command - wd_windows_tools\setup.exe
.
Contents of the ‘Scheduled Tasks’ folder

2008-11-29 c:\windows\Tasks\AppleSoftwareUpdate.job

  • c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 11:34]

2007-10-15 c:\windows\Tasks\Microsoft_Hardware_Launch_IType_exe.job

  • c:\program files\Microsoft IntelliType Pro\itype.exe [2006-11-21 16:08]

2008-11-29 c:\windows\Tasks\PPv5Scan_Daily as HP_Administrator at 12 00 AM.job

  • c:\program files\CA\eTrust PestPatrol\ppv5consumercl.exe [2004-11-29 09:14]

2008-11-30 c:\windows\Tasks\Symantec NetDetect.job

  • c:\program files\Symantec\LiveUpdate\NDetect.exe

2008-11-27 c:\windows\Tasks\Uniblue SpyEraser Nag.job

  • c:\program files\Uniblue\SpyEraser\SpyEraser.exe

2007-10-04 c:\windows\Tasks\Uniblue SpyEraser.job

  • c:\program files\Uniblue\SpyEraser\SpyEraser.exe
    .

Looky at the menagerie we found there

  1. Please open Notepad
    [*] Click Start , then Run[*]Type notepad .exe in the Run Box.

  2. Now copy/paste the entire content of the codebox below into the Notepad window:


KillAll::

AWF::
c:\hp\drivers\hplsbwatcher\bak\lsburnwatcher.exe
c:\program files\Ares\bak\Ares.exe
c:\program files\ATI Technologies\ATI.ACE\bak\cli.exe
c:\program files\Common Files\Real\Update_OB\bak\realsched.exe
c:\program files\Hewlett-Packard\HP Boot Optimizer\bak\HPBootOp.exe
c:\program files\HP\Digital Imaging\{33D6CC28-9F75-4d1b-A11D-98895B3A3729}\bak\hphupd08.exe
c:\program files\HP\HP Software Update\bak\HPWuSchd2.exe
c:\program files\iTunes\bak\iTunesHelper.exe
c:\program files\Microsoft IntelliType Pro\bak\itype.exe
c:\program files\QuickTime\bak\qttask.exe
c:\windows\ehome\bak\ehtray.exe

File::
c:\windows\system32\wisolike.exe
c:\windows\system32\cont_adsoftinc-remove.exe
c:\windows\system32\wusorevo.exe
c:\windows\system32\hurasivi.exe
c:\windows\system32\nopasisi.dll

Folder::
c:\documents and settings\HP_Administrator\Application Data\IUpd721

  1. Then in the text file go to FILE > SAVE AS and in the dropdown box select SAVE AS TYPE to ALL FILES

  2. Save the above as CFScript.txt

  3. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

  1. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
    [*]Combofix.txt [*]A new HijackThis log.

Combofix Log Part 1:

ComboFix 08-11-30.01 - HP_Administrator 2008-11-30 11:51:52.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.566 [GMT -6:00]
Running from: c:\documents and settings\HP_Administrator\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\HP_Administrator\Desktop\CFScript.txt

  • Created a new restore point

FILE ::
c:\windows\system32\cont_adsoftinc-remove.exe
c:\windows\system32\hurasivi.exe
c:\windows\system32\nopasisi.dll
c:\windows\system32\wisolike.exe
c:\windows\system32\wusorevo.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\HP_Administrator\Application Data\IUpd721
c:\documents and settings\HP_Administrator\Application Data\IUpd721\Logs\scns.log
c:\windows\system32\cont_adsoftinc-remove.exe
c:\windows\system32\hurasivi.exe
c:\windows\system32\wisolike.exe
c:\windows\system32\wusorevo.exe

.
((((((((((((((((((((((((( Files Created from 2008-10-28 to 2008-11-30 )))))))))))))))))))))))))))))))
.

2008-11-30 09:30 . 2008-11-30 09:30 d-------- c:\program files\Malwarebytes’ Anti-Malware
2008-11-30 09:30 . 2008-11-30 09:30 d-------- c:\documents and settings\HP_Administrator\Application Data\Malwarebytes
2008-11-30 09:30 . 2008-11-30 09:30 d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2008-11-30 09:30 . 2008-10-22 16:10 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2008-11-30 09:30 . 2008-10-22 16:10 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2008-11-30 09:04 . 2008-11-30 09:04 d-------- C:_OTMoveIt
2008-11-25 19:57 . 2008-11-25 19:57 d-------- c:\program files\Trend Micro
2008-11-25 18:41 . 2008-11-25 21:43 d-------- c:\documents and settings\HP_Administrator.housecall6.6
2008-11-23 15:32 . 2008-11-23 15:32 115,016 --a------ c:\windows\system32\MSINET.OCX
2008-11-23 15:32 . 2008-11-23 15:32 29,184 --a------ c:\windows\system32\MSINET.oca
2008-11-23 15:32 . 2008-11-23 15:32 2,407 --a------ c:\windows\system32\MSINET.DEP
2008-11-12 06:59 . 2008-09-04 11:15 1,106,944 --------- c:\windows\system32\dllcache\msxml3.dll
2008-11-12 06:59 . 2008-10-24 05:21 455,296 --------- c:\windows\system32\dllcache\mrxsmb.sys
2008-10-29 10:03 . 2008-10-29 10:03 d-------- c:\program files\Alwil Software
2008-10-29 09:46 . 2008-10-29 09:46 d-------- c:\program files\BellSouthWCC
2008-10-29 09:30 . 2007-05-14 12:03 445,696 -ra------ c:\windows\system32\drivers\rt73.sys
2008-10-29 09:05 . 2008-10-29 12:11 d-------- c:\documents and settings\HP_Administrator\Application Data\Motive
2008-10-29 09:04 . 2008-10-29 09:46 d-------- c:\program files\Common Files\Motive
2008-10-29 09:04 . 2008-10-29 09:04 d-------- c:\program files\att-nap
2008-10-29 09:03 . 2008-10-29 09:03 d-------- c:\documents and settings\All Users\Application Data\Motive
2008-10-24 06:00 . 2008-10-15 10:34 337,408 --------- c:\windows\system32\dllcache\netapi32.dll
2008-10-14 22:07 . 2008-09-08 04:41 333,824 --------- c:\windows\system32\dllcache\srv.sys
2008-10-14 22:06 . 2008-08-14 04:11 2,189,184 --------- c:\windows\system32\dllcache\ntoskrnl.exe
2008-10-14 22:06 . 2008-08-14 04:09 2,145,280 --------- c:\windows\system32\dllcache\ntkrnlmp.exe
2008-10-14 22:06 . 2008-08-14 03:33 2,066,048 --------- c:\windows\system32\dllcache\ntkrnlpa.exe
2008-10-14 22:06 . 2008-08-14 03:33 2,023,936 --------- c:\windows\system32\dllcache\ntkrpamp.exe
2008-10-14 22:06 . 2008-09-15 06:12 1,846,400 --------- c:\windows\system32\dllcache\win32k.sys

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-11-30 17:57 --------- d-----w c:\program files\QuickTime
2008-11-30 17:57 --------- d-----w c:\program files\iTunes
2008-11-30 17:57 --------- d-----w c:\program files\Ares
2008-11-30 17:51 --------- d-----w c:\program files\Microsoft IntelliType Pro
2008-11-27 00:43 --------- d-----w c:\program files\Windows Live Safety Center
2008-11-24 20:03 --------- d-----w c:\documents and settings\All Users\Application Data\Lavasoft
2008-11-24 20:02 --------- d-----w c:\program files\Lavasoft
2008-11-24 20:00 --------- d-----w c:\program files\Common Files\Wise Installation Wizard
2008-11-22 22:18 --------- d-----w c:\program files\Google
2008-10-29 15:15 --------- d-----w c:\documents and settings\All Users\Application Data\McAfee
2008-10-24 11:21 455,296 ----a-w c:\windows\system32\drivers\mrxsmb.sys
2008-10-24 01:49 --------- d-----w c:\program files\Common Files\Symantec Shared
2008-04-25 02:15 0 --sha-w c:\documents and settings\HP_Administrator\Application Data[u]0[/u]048111e23d30a475d7d3d9395370a9ff361f7be500ba1e2bc.dat
2007-10-13 04:59 61,480 ----a-w c:\documents and settings\HP_Administrator\GoToAssistDownloadHelper.exe
2006-06-03 23:45 774,144 -c–a-w c:\program files\RngInterstitial.dll
2005-11-18 23:44 251 -c–a-w c:\program files\wt3d.ini
2008-08-27 00:18 32,768 --sha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008082620080827\index.dat
.

((((((((((((((((((((((((((((( snapshot@2008-11-30_10.59.26.51 )))))))))))))))))))))))))))))))))))))))))
.

  • 2005-08-06 03:56:34 64,512 ----a-w c:\windows\ehome\ehtray.exe
  • 2005-08-05 20:56:34 64,512 ----a-w c:\windows\ehome\ehtray.exe
  • 2005-08-06 03:56:34 64,512 ----a-w c:\windows\system32\dllcache\ehtray.exe
  • 2005-08-05 20:56:34 64,512 ----a-w c:\windows\system32\dllcache\ehtray.exe
  • 2008-11-30 17:56:40 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_5c4.dat

combofix log part 2:

.
((((((((((((((((((((((((((((((((((((((((((((( AWF ))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
----a-w 131,072 2006-08-25 07:43:40 c:\program files\CA\eTrust PestPatrol\bak\PPActiveDetection.exe

----a-w 192,512 2005-05-09 23:16:15 c:\program files\Comcast\Comcast PhotoShow 4\data\Xtras\bak\mssysmgr.exe

----a-w 48,752 2005-10-04 18:42:40 c:\program files\Common Files\Symantec Shared\bak\ccApp.exe

----a-w 190,064 2005-10-04 18:41:38 c:\program files\Common Files\Symantec Shared\bak\ccEmlPxy.dll

----a-w 3,198,976 2006-04-03 04:48:52 c:\program files\FilmLoop Player\bak\FilmLoop.exe

----a-w 36,975 2005-08-27 00:14:44 c:\program files\Java\jre1.5.0_05\bin\bak\jusched.exe

----a-w 600,896 2006-07-07 23:15:07 c:\program files\Microsoft IntelliPoint\bak\ipoint.exe

----a-w 1,757,184 2006-06-02 21:09:18 c:\program files\support.com\bin\bak\tgcmd.exe

----a-w 85,744 2005-11-15 19:28:04 c:\program files\Symantec Client Security\Symantec AntiVirus\bak\VPTray.exe

----a-w 4,670,704 2007-08-30 22:43:18 c:\program files\Yahoo!\Messenger\bak\YAHOOM~1.EXE

.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
Note empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
“ctfmon.exe”=“c:\windows\system32\ctfmon.exe” [2008-04-13 15360]
“Yahoo! Pager”=“c:\progra~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE” [2007-08-30 4670704]
“ares”=“c:\program files\Ares\Ares.exe” [2007-02-18 969728]
“MSMSGS”=“c:\program files\Messenger\msmsgs.exe” [2008-04-13 1695232]
“BitComet”=“c:\program files\BitComet\BitComet.exe” [N/A]
“swg”=“c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe” [2007-10-14 68856]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
“TkBellExe”=“c:\program files\Common Files\Real\Update_OB\realsched.exe” [2005-09-14 180269]
“Zune Launcher”=“c:\program files\Zune\ZuneLauncher.exe” [2008-01-11 166304]
“QuickTime Task”=“c:\program files\QuickTime\qttask.exe” [2007-04-27 282624]
“iTunesHelper”=“c:\program files\iTunes\iTunesHelper.exe” [2007-06-01 257088]
“BellSouthWCC_McciTrayApp”=“c:\program files\BellSouthWCC\McciTrayApp.exe” [2006-03-10 543232]
“avast!”=“c:\progra~1\ALWILS~1\Avast4\ashDisp.exe” [2008-07-19 78008]
“RTHDCPL”=“RTHDCPL.EXE” [2007-10-25 c:\windows\RTHDCPL.EXE]

c:\documents and settings\All Users\Start Menu\Programs\Startup
HOTSYNCSHORTCUTNAME.lnk - c:\program files\palmOne\Hotsync.exe [2004-06-09 471040]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
“AppInit_DLLs”=c:\windows\system32\nopasisi.dll

[HKLM~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^ATI CATALYST System Tray.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\ATI CATALYST System Tray.lnk
backup=c:\windows\pss\ATI CATALYST System Tray.lnkCommon Startup

[HKLM~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKLM~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Updates from HP.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Updates from HP.lnk
backup=c:\windows\pss\Updates from HP.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ares]
–a------ 2007-02-18 15:30 969728 c:\program files\Ares\Ares.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ATICCC]
–a------ 2005-08-10 01:33 61440 c:\program files\ATI Technologies\ATI.ACE\cli.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
–a------ 2008-04-13 18:12 15360 c:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ehTray]
–a------ 2005-08-05 14:56 64512 c:\windows\ehome\ehtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
–a------ 2007-03-11 20:34 49152 c:\program files\HP\HP Software Update\HPWuSchd2.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HPBootOp]
–a------ 2005-02-25 16:34 245760 c:\program files\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HPHUPD08]
–a------ 2005-06-01 17:35 49152 c:\program files\HP\Digital Imaging{33D6CC28-9F75-4d1b-A11D-98895B3A3729}\hphupd08.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
–a------ 2007-06-01 15:51 257088 c:\program files\iTunes\iTunesHelper.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LSBWatcher]
–a------ 2005-05-10 11:50 253952 c:\hp\drivers\hplsbwatcher\lsburnwatcher.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
–a------ 2008-04-13 18:12 1695232 c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
–a------ 2007-04-27 08:41 282624 c:\program files\QuickTime\qttask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
–a------ 2007-09-25 01:11 132496 c:\program files\Java\jre1.6.0_03\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
–a------ 2005-09-14 14:30 180269 c:\program files\Common Files\Real\Update_OB\realsched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Yahoo! Pager]
–a------ 2007-08-30 17:43 4670704 c:\progra~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Alcmtr]
–a------ 2005-05-03 10:43 69632 c:\windows\ALCMTR.EXE

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AlwaysReady Power Message APP]
–a------ 2005-08-03 00:19 77312 c:\windows\arpwrmsg.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
“MDM”=2 (0x2)
“Ati HotKey Poller”=2 (0x2)
“Apple Mobile Device”=2 (0x2)
“ALG”=3 (0x3)

combofix part 3:

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
“UpdatesDisableNotify”=dword:00000001

[HKLM~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
“%windir%\system32\sessmgr.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpqste08.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpofxm08.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hposfx08.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hposid01.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpqscnvw.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpqkygrp.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpqCopy.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpfccopy.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpzwiz01.exe”=
“c:\Program Files\HP\Digital Imaging\Unload\HpqPhUnl.exe”=
“c:\Program Files\HP\Digital Imaging\Unload\HpqDIA.exe”=
“c:\Program Files\HP\Digital Imaging\bin\hpoews01.exe”=
“c:\Program Files\Updates from HP\9972322\Program\Updates from HP.exe”=
“%windir%\Network Diagnostic\xpnetdiag.exe”=
“c:\Program Files\Messenger\msmsgs.exe”=
“c:\Program Files\Yahoo!\Messenger\YahooMessenger.exe”=
“c:\Program Files\Yahoo!\Messenger\YServer.exe”=
“c:\Program Files\Ares\Ares.exe”=
“c:\Program Files\Bonjour\mDNSResponder.exe”=
“c:\Program Files\iTunes\iTunes.exe”=
“c:\Program Files\att-nap\McciBrowser.exe”=

[HKLM~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
“20014:TCP”= 20014:TCP:BitComet 20014 TCP
“20014:UDP”= 20014:UDP:BitComet 20014 UDP

R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2008-10-29 78416]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\DRIVERS\aswFsBlk.sys [2008-10-29 20560]
R2 McciCMService;McciCMService;“c:\program files\Common Files\Motive\McciCMService.exe” [2008-10-29 303104]
R2 zumbus;Zune Bus Enumerator Driver;c:\windows\system32\DRIVERS\zumbus.sys [2007-11-15 40832]
R3 MRESP50;MRESP50 NDIS Protocol Driver;??\c:\progra~1\COMMON~1\Motive\MRESP50.SYS [2008-10-29 18304]
S3 DCamUSBVeo532;Veo Stingray/Connect Web Camera;c:\windows\system32\Drivers\ubVeo532.sys [2002-07-01 95232]
S3 MREMP50;MREMP50 NDIS Protocol Driver;??\c:\progra~1\COMMON~1\Motive\MREMP50.SYS [2008-10-29 19712]
S3 MREMP50a64;MREMP50a64 NDIS Protocol Driver;??\c:\progra~1\COMMON~1\Motive\MREMP50a64.SYS
S3 MRESP50a64;MRESP50a64 NDIS Protocol Driver;??\c:\progra~1\COMMON~1\Motive\MRESP50a64.SYS

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2{1493c7c0-634d-11dd-98f9-0013d4c33d6b}]
\Shell\AutoRun\command - wd_windows_tools\setup.exe
.
Contents of the ‘Scheduled Tasks’ folder

2008-11-29 c:\windows\Tasks\AppleSoftwareUpdate.job

  • c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 11:34]

2007-10-15 c:\windows\Tasks\Microsoft_Hardware_Launch_IType_exe.job

  • c:\program files\Microsoft IntelliType Pro\itype.exe [2006-07-07 17:14]

2008-11-29 c:\windows\Tasks\PPv5Scan_Daily as HP_Administrator at 12 00 AM.job

  • c:\program files\CA\eTrust PestPatrol\ppv5consumercl.exe [2004-11-29 09:14]

2008-11-30 c:\windows\Tasks\Symantec NetDetect.job

  • c:\program files\Symantec\LiveUpdate\NDetect.exe

2008-11-27 c:\windows\Tasks\Uniblue SpyEraser Nag.job

  • c:\program files\Uniblue\SpyEraser\SpyEraser.exe

2007-10-04 c:\windows\Tasks\Uniblue SpyEraser.job

  • c:\program files\Uniblue\SpyEraser\SpyEraser.exe
    .

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-11-30 11:56:54
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes …

scanning hidden autostart entries …

scanning hidden files …

scan completed successfully
hidden files: 0


.
--------------------- DLLs Loaded Under Running Processes ---------------------

              • ‘winlogon.exe’(704)
                c:\windows\system32\Ati2evxx.dll
                .
                ------------------------ Other Running Processes ------------------------
                .
                c:\program files\Lavasoft\Ad-Aware\aawservice.exe
                c:\program files\Alwil Software\Avast4\aswUpdSv.exe
                c:\program files\Alwil Software\Avast4\ashServ.exe
                c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
                c:\windows\arservice.exe
                c:\program files\Bonjour\mDNSResponder.exe
                c:\windows\ehome\ehrecvr.exe
                c:\windows\ehome\ehSched.exe
                c:\program files\Common Files\LightScribe\LSSrvc.exe
                c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
                c:\windows\system32\ZuneBusEnum.exe
                c:\windows\ehome\mcrdsvc.exe
                c:\program files\Alwil Software\Avast4\ashMaiSv.exe
                c:\program files\Alwil Software\Avast4\ashWebSv.exe
                c:\windows\system32\dllhost.exe
                c:\progra~1\Yahoo!\MESSEN~1\Ymsgr_tray.exe
                .


.
Completion time: 2008-11-30 12:06:18 - machine was rebooted
ComboFix-quarantined-files.txt 2008-11-30 18:06:15
ComboFix2.txt 2008-11-30 17:04:22

Pre-Run: 173,859,033,088 bytes free
Post-Run: 173,846,269,952 bytes free

258 — E O F — 2008-11-13 09:05:11

HJT Log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:15:07 PM, on 11/30/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16735)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\arservice.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Common Files\Motive\McciCMService.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\svchost.exe
c:\WINDOWS\system32\ZuneBusEnum.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Zune\ZuneLauncher.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\BellSouthWCC\McciTrayApp.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Ares\Ares.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\palmOne\Hotsync.exe
C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.comcast.net/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = :0
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\3.0.1225.9868\swg.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM..\Run: [TkBellExe] “C:\Program Files\Common Files\Real\Update_OB\realsched.exe” -osboot
O4 - HKLM..\Run: [Zune Launcher] “c:\Program Files\Zune\ZuneLauncher.exe”
O4 - HKLM..\Run: [QuickTime Task] “C:\Program Files\QuickTime\qttask.exe” -atboottime
O4 - HKLM..\Run: [iTunesHelper] “C:\Program Files\iTunes\iTunesHelper.exe”
O4 - HKLM..\Run: [BellSouthWCC_McciTrayApp] C:\Program Files\BellSouthWCC\McciTrayApp.exe
O4 - HKLM..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKCU..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU..\Run: [Yahoo! Pager] “C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE” -quiet
O4 - HKCU..\Run: [ares] “C:\Program Files\Ares\Ares.exe” -h
O4 - HKCU..\Run: [MSMSGS] “C:\Program Files\Messenger\msmsgs.exe” /background
O4 - HKCU..\Run: [BitComet] “C:\Program Files\BitComet\BitComet.exe” /tray
O4 - HKCU..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - Global Startup: HOTSYNCSHORTCUTNAME.lnk = C:\Program Files\palmOne\Hotsync.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra ‘Tools’ menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
O9 - Extra button: BitComet - {D18A0B52-D63C-4ed0-AFC6-C1E3DC1AF43A} - res://C:\Program Files\BitComet\tools\BitCometBHO_1.1.11.30.dll/206 (file missing)
O9 - Extra button: Connection Help - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra ‘Tools’ menuitem: Connection Help - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra ‘Tools’ menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra ‘Tools’ menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://housecall65.trendmicro.com/housecall/applet/html/native/x86/win32/activex/hcImpl.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://www2.snapfish.com/SnapfishActivia.cab
O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} (Windows Live Safety Center Base Module) - http://cdn.scan.onecare.live.com/resource/download/scanner/wlscbase6662.cab
O16 - DPF: {8A0019EB-51FA-4AE5-A40B-C0496BBFC739} (Verizon Wireless Media Upload) - http://picture.vzw.com/activex/VerizonWirelessUploadControl.cab
O20 - AppInit_DLLs: C:\WINDOWS\system32\nopasisi.dll
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: ASP.NET State Service (aspnet_state) - Unknown owner - C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\aspnet_state.exe (file missing)
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: McciCMService - Motive Communications, Inc. - C:\Program Files\Common Files\Motive\McciCMService.exe


End of file - 8298 bytes

Lets just clear the bak folders now and then see how it runs

[*] Please double-click OTMoveIt3.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
[*]Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

:Reg
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=-

:Files
c:\program files\CA\eTrust PestPatrol\bak
c:\program files\Comcast\Comcast PhotoShow 4\data\Xtras\bak
c:\program files\Common Files\Symantec Shared\bak
c:\program files\Common Files\Symantec Shared\bak
c:\program files\FilmLoop Player\bak
c:\program files\Java\jre1.5.0_05\bin\bak
c:\program files\Microsoft IntelliPoint\bak
c:\program files\support.com\bin\bak
c:\program files\Symantec Client Security\Symantec AntiVirus\bak
c:\program files\Yahoo!\Messenger\bak
c:\windows\system32\nopasisi.dll
:Commands
[purity]
[emptytemp]

[*] Return to OTMoveIt3, right click in the “Paste Instructions for Items to be Moved” window (under the yellow bar) and choose Paste.

[*]Click the red Moveit! button.
[*]Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
[*]Close OTMoveIt3

Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.

ok. OTMI log:

========== REGISTRY ==========
Registry value HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows\AppInit_DLLs deleted successfully.
========== FILES ==========
c:\program files\CA\eTrust PestPatrol\bak moved successfully.
c:\program files\Comcast\Comcast PhotoShow 4\data\Xtras\bak moved successfully.
c:\program files\Common Files\Symantec Shared\bak moved successfully.
File/Folder c:\program files\Common Files\Symantec Shared\bak not found.
c:\program files\FilmLoop Player\bak moved successfully.
c:\program files\Java\jre1.5.0_05\bin\bak moved successfully.
c:\program files\Microsoft IntelliPoint\bak moved successfully.
c:\program files\support.com\bin\bak moved successfully.
c:\program files\Symantec Client Security\Symantec AntiVirus\bak moved successfully.
c:\program files\Yahoo!\Messenger\bak moved successfully.
File/Folder c:\windows\system32\nopasisi.dll not found.
========== COMMANDS ==========
User’s Temp folder emptied.
User’s Temporary Internet Files folder emptied.
User’s Internet Explorer cache folder emptied.
Local Service Temp folder emptied.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Local Service Temporary Internet Files folder emptied.
File delete failed. C:\WINDOWS\temp_avast4_\Webshlock.txt scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_5c4.dat scheduled to be deleted on reboot.
Windows Temp folder emptied.
Java cache emptied.
Temp folders emptied.

OTMoveIt3 by OldTimer - Version 1.0.7.1 log created on 11302008_123409

Files moved on Reboot…
File move failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.
File move failed. C:\WINDOWS\temp_avast4_\Webshlock.txt scheduled to be moved on reboot.
File move failed. C:\WINDOWS\temp\Perflib_Perfdata_5c4.dat scheduled to be moved on reboot.

Big question … How is it running now ?

Running absolutely great! I was also able to enable automatic microsoft updates! Thanks!
I don’t really understand all you did Essex, but you really know what you’re doing. Please know that I sincerely appreciate your assistance. It’s pretty amazing that you volunteer so much of your time to help folks.

I don’t understand how all this malware got on this machine. It had fully paid mcaffee up until 2-3 weeks ago when we switched it to Avast. I suppose I need to look over my daughter’s shoulder more? Any suggestions would be appreciated.

Thanks again Essex…You da man!