First we will need to disable C:\windows\system32\wscript.exe
Using windows explorer go to C:\windows\system32
Right click Wscript.exe
Select Properties
Select Security Tab
Select Advanced
Select Owner
Select Edit
Select your account
Click Apply
OK the warning
Click OK
Then delete Wscript.exe to the recycle bin
https://dl.dropbox.com/u/73555776/wscript%20ownership.JPG
THEN
Warning This fix is only relevant for this system and no other, using on another computer may cause problems
Be advised that when the fix commences it will shut down all running processes and you may lose the desktop and icons, they will return on reboot
Run OTL
[*]Under the Custom Scans/Fixes box at the bottom, paste in the following
https://dl.dropbox.com/u/73555776/OTL_Fix.GIF
:OTL
SRV - [2013/04/05 00:52:28 | 000,109,064 | ---- | M] (Wajam) [Auto | Running] -- C:\Program Files\Wajam\Updater\WajamUpdater.exe -- (WajamUpdater)
IE - HKLM\..\SearchScopes\{3d29c02b-bf3e-4d3b-8a7a-e0e7d0f6dbab}: "URL" = http://search.mywebsearch.com/mywebsearch/GGmain.jhtml?id=Z7xdm354YYin&ptnrS=Z7xdm354YYin&si=124514_race_gcIND&ptb=12FE1BD2-7E27-45E5-A034-9DD81847D53C&psa=&ind=2012061804&st=sb&n=77eda06c&searchfor={searchTerms}
IE - HKLM\..\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}: "URL" = http://search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT2790392
IE - HKU\S-1-5-21-2338478908-853316361-2382320542-1000\..\URLSearchHook: {1392b8d2-5c05-419f-a8f6-b9f15a596612} - No CLSID value found
IE - HKU\S-1-5-21-2338478908-853316361-2382320542-1000\..\URLSearchHook: {88c7f2aa-f93f-432c-8f0e-b7d85967a527} - SOFTWARE\Classes\CLSID\{88c7f2aa-f93f-432c-8f0e-b7d85967a527}\InprocServer32 File not found
IE - HKU\S-1-5-21-2338478908-853316361-2382320542-1000\..\SearchScopes,DefaultScope = {6A1806CD-94D4-4689-BA73-E35EA1EA9990}
IE - HKU\S-1-5-21-2338478908-853316361-2382320542-1000\..\SearchScopes\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}: "URL" = http://search.babylon.com/?q={searchTerms}&AF=108921&tt=290312_bexdll&babsrc=SP_ss&mntrId=9822e933000000000000000000000000
IE - HKU\S-1-5-21-2338478908-853316361-2382320542-1000\..\SearchScopes\{3d29c02b-bf3e-4d3b-8a7a-e0e7d0f6dbab}: "URL" = http://search.mywebsearch.com/mywebsearch/GGmain.jhtml?id=Z7xdm354YYin&ptnrS=Z7xdm354YYin&si=124514_race_gcIND&ptb=12FE1BD2-7E27-45E5-A034-9DD81847D53C&psa=&ind=2012061804&st=sb&n=77eda06c&searchfor={searchTerms}
IE - HKU\S-1-5-21-2338478908-853316361-2382320542-1000\..\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}: "URL" = http://search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT2790392
IE - HKU\S-1-5-21-2338478908-853316361-2382320542-1000\..\SearchScopes\{CFF4DB9B-135F-47c0-9269-B4C6572FD61A}: "URL" = http://mystart.incredibar.com/mb178/?search={searchTerms}&loc=IB_DS&a=6R8CWeu0gh&i=26
FF - HKEY_LOCAL_MACHINE\software\mozilla\Firefox\Extensions\\{336D0C35-8A85-403a-B9D2-65C292C39087}: C:\Program Files\Web Assistant\Firefox
FF - HKEY_CURRENT_USER\software\mozilla\Firefox\Extensions\\{5a95a9e0-59dd-4314-bd84-4d18ca83a0e2}: C:\Program Files\Wajam\Firefox\{5a95a9e0-59dd-4314-bd84-4d18ca83a0e2}.xpi [2013/04/05 00:52:28 | 000,037,909 | ---- | M] ()
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - No CLSID value found.
O2 - BHO: (Wajam) - {A7A6995D-6EE1-4FD1-A258-49395D5BF99C} - C:\Program Files\Wajam\IE\priam_bho.dll (Wajam)
O3 - HKU\S-1-5-21-2338478908-853316361-2382320542-1000\..\Toolbar\WebBrowser: (no name) - {1392B8D2-5C05-419F-A8F6-B9F15A596612} - No CLSID value found.
O4 - HKU\S-1-5-21-2338478908-853316361-2382320542-1000..\Run: [98c69] C:\Users\vaibhav\AppData\Roaming\8ed0\98c69.js ()
O4 - HKU\S-1-5-21-2338478908-853316361-2382320542-1000..\Run: [Search Protection] C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe File not found
O4 - Startup: C:\Users\vaibhav\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c4c4c.js ()
O33 - MountPoints2\{23500543-458f-11df-93a3-001dd9f8f5c0}\Shell\AutoRun\command - "" = H:\cache\tmp983.exe
O33 - MountPoints2\{23500543-458f-11df-93a3-001dd9f8f5c0}\Shell\oPEN\coMmaNd - "" = H:\cache\tmp983.exe
O33 - MountPoints2\{29e3727f-1658-11e1-a3c3-a8787e70be29}\Shell - "" = AutoRun
O33 - MountPoints2\{29e3727f-1658-11e1-a3c3-a8787e70be29}\Shell\AutoRun\command - "" = H:\AutoRun.exe
O33 - MountPoints2\{34b5682e-7f18-11e0-a922-c8de0e3bfeb7}\Shell - "" = AutoRun
O33 - MountPoints2\{34b5682e-7f18-11e0-a922-c8de0e3bfeb7}\Shell\AutoRun\command - "" = H:\AutoRun.exe
O33 - MountPoints2\{34c7c229-ab65-11df-92cc-001dd9f8f5c0}\Shell\AutoRun\command - "" = H:\NIKOLIC\\baswala.exe
O33 - MountPoints2\{34c7c229-ab65-11df-92cc-001dd9f8f5c0}\Shell\explore\command - "" = H:\NIKOLIC\\\baswala.exe
O33 - MountPoints2\{34c7c229-ab65-11df-92cc-001dd9f8f5c0}\Shell\open\command - "" = H:\NIKOLIC\\\baswala.exe
O33 - MountPoints2\{36c98d01-6bf3-11e0-b332-fb77929a60e2}\Shell - "" = AutoRun
O33 - MountPoints2\{36c98d01-6bf3-11e0-b332-fb77929a60e2}\Shell\AutoRun\command - "" = H:\AutoRun.exe
O33 - MountPoints2\{60983e63-8364-11e0-b9f2-8a9d666004aa}\Shell - "" = AutoRun
O33 - MountPoints2\{60983e63-8364-11e0-b9f2-8a9d666004aa}\Shell\AutoRun\command - "" = H:\AutoRun.exe
O33 - MountPoints2\{66a83c17-0765-11e1-89e3-ae78ec07dce2}\Shell - "" = AutoRun
O33 - MountPoints2\{66a83c17-0765-11e1-89e3-ae78ec07dce2}\Shell\AutoRun\command - "" = H:\AutoRun.exe
O33 - MountPoints2\{66a83c27-0765-11e1-89e3-ae78ec07dce2}\Shell - "" = AutoRun
O33 - MountPoints2\{66a83c27-0765-11e1-89e3-ae78ec07dce2}\Shell\AutoRun\command - "" = H:\AutoRun.exe
O33 - MountPoints2\{73862434-b5d4-11df-9c05-001b38a2f4e8}\Shell\AutoRun\command - "" = H:\DUSKO\\\svjetlana.exe
O33 - MountPoints2\{73862434-b5d4-11df-9c05-001b38a2f4e8}\Shell\explore\command - "" = H:\DUSKO\\\\svjetlana.exe
O33 - MountPoints2\{73862434-b5d4-11df-9c05-001b38a2f4e8}\Shell\open\command - "" = H:\DUSKO\\\\svjetlana.exe
O33 - MountPoints2\{8c1d25a2-2c45-11df-8771-001b38a2f4e8}\Shell\AutoRun\command - "" = H:\cache\tmp983.exe
O33 - MountPoints2\{8c1d25a2-2c45-11df-8771-001b38a2f4e8}\Shell\oPEN\coMmaNd - "" = H:\cache\tmp983.exe
O33 - MountPoints2\{8d2418e8-a0d8-11e2-b97c-806e6f6e6963}\Shell\AutoRun\command - "" = G:\8e8\g9fc49.js
O33 - MountPoints2\{8d2418e8-a0d8-11e2-b97c-806e6f6e6963}\Shell\explore\command - "" = G:\8e8\g9fc49.js
O33 - MountPoints2\{8d2418e8-a0d8-11e2-b97c-806e6f6e6963}\Shell\open\command - "" = G:\8e8\g9fc49.js
O33 - MountPoints2\{9bc3808e-1a91-11e1-9674-e7d93968262f}\Shell - "" = AutoRun
O33 - MountPoints2\{9bc3808e-1a91-11e1-9674-e7d93968262f}\Shell\AutoRun\command - "" = H:\AutoRun.exe
O33 - MountPoints2\{a7ddbf82-7ebd-11e0-914b-989e7a7bf4da}\Shell - "" = AutoRun
O33 - MountPoints2\{a7ddbf82-7ebd-11e0-914b-989e7a7bf4da}\Shell\AutoRun\command - "" = H:\AutoRun.exe
O33 - MountPoints2\{a7ddbfa3-7ebd-11e0-914b-989e7a7bf4da}\Shell - "" = AutoRun
O33 - MountPoints2\{a7ddbfa3-7ebd-11e0-914b-989e7a7bf4da}\Shell\AutoRun\command - "" = H:\AutoRun.exe
O33 - MountPoints2\{b514b11b-7f8a-11e0-9eaa-a68f40ebc0f8}\Shell - "" = AutoRun
O33 - MountPoints2\{b514b11b-7f8a-11e0-9eaa-a68f40ebc0f8}\Shell\AutoRun\command - "" = H:\AutoRun.exe
O33 - MountPoints2\{bf049174-4e2d-11df-b3d7-001b38a2f4e8}\Shell\AutoRun\command - "" = H:\cache\tmp983.exe
O33 - MountPoints2\{bf049174-4e2d-11df-b3d7-001b38a2f4e8}\Shell\oPEN\coMmaNd - "" = H:\cache\tmp983.exe
O33 - MountPoints2\{cd9847d4-6e51-11e0-9872-eabe28869fe6}\Shell - "" = AutoRun
O33 - MountPoints2\{cd9847d4-6e51-11e0-9872-eabe28869fe6}\Shell\AutoRun\command - "" = H:\AutoRun.exe
O33 - MountPoints2\{d05ab49b-4f79-11df-b917-001b38a2f4e8}\Shell\Auto\command - "" = I:\msbackup.exe
O33 - MountPoints2\{d05ab49b-4f79-11df-b917-001b38a2f4e8}\Shell\AutoRun\command - "" = C:\Windows\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL I:\msbackup.exe
O33 - MountPoints2\{d67d1264-68ec-11e0-8fb8-8b1bded65ded}\Shell - "" = AutoRun
O33 - MountPoints2\{d67d1264-68ec-11e0-8fb8-8b1bded65ded}\Shell\AutoRun\command - "" = H:\AutoRun.exe
O33 - MountPoints2\{d67d1268-68ec-11e0-8fb8-8b1bded65ded}\Shell - "" = AutoRun
O33 - MountPoints2\{d67d1268-68ec-11e0-8fb8-8b1bded65ded}\Shell\AutoRun\command - "" = H:\AutoRun.exe
O33 - MountPoints2\{e6aacaaf-6a40-11e0-ae98-a178bd7d08ed}\Shell - "" = AutoRun
O33 - MountPoints2\{e6aacaaf-6a40-11e0-ae98-a178bd7d08ed}\Shell\AutoRun\command - "" = H:\AutoRun.exe
O33 - MountPoints2\{f99e3b75-6bcc-11df-b166-001b38a2f4e8}\Shell\AutoRun\command - "" = H:\b.exe
O33 - MountPoints2\{f99e3b75-6bcc-11df-b166-001b38a2f4e8}\Shell\explore\Command - "" = H:\b.exe
O33 - MountPoints2\{f99e3b75-6bcc-11df-b166-001b38a2f4e8}\Shell\open\Command - "" = H:\b.exe
[2013/04/09 23:30:55 | 000,000,000 | ---D | C] -- C:\Users\vaibhav\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Wajam
[2013/04/09 23:30:44 | 000,000,000 | ---D | C] -- C:\Users\vaibhav\AppData\Local\Wajam
[2013/04/09 23:30:23 | 000,000,000 | ---D | C] -- C:\Program Files\Wajam
[2013/04/09 11:21:52 | 000,000,000 | -HSD | C] -- C:\Users\vaibhav\AppData\Roaming\8ed0
[2013/04/10 01:00:05 | 000,045,644 | ---- | C] () -- C:\Users\vaibhav\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c4c4c.js
:Files
C:\Users\vaibhav\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\*.js
C:\Program Files\Web Assistant
:Commands
[resethosts]
[CREATERESTOREPOINT]
[Reboot]
[*]Then click the Run Fix button at the top
[*]Let the program run unhindered, reboot the PC when it is done
[*]Open OTL again and click the Quick Scan button. Post the log it produces in your next reply.