Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Windows XP Issues


  • Please log in to reply
31 replies to this topic

#1 Ktanaqui

Ktanaqui

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:07:05 PM

Posted 21 July 2012 - 02:07 AM

Here's the rundown. I have a friend who has a desktop PC that she's been having trouble with. I offered to fix it thinking I knew what I was getting into and discovering this is... out of my league. It's been assumed that the PC has viruses. I am tech-savvy enough to understand most everything stated to me unless it is "elite" type knowledge - stuff only the big experts would know. When I offer to fix friend's PCs, I use Avast!, MalwareBytes, and CCCleaner. My own computer has all three installed. With that out of the way... I'm hitting a dead end on this computer.

Computer Specs & Important Information
Desktop PC
Wireless via a brand new Belkin N150 USB Adapter
DSL Internet
Router is brand new Belkin, N300.
Modem is brand new, company provided. Modem is made by Motorola.
ISP is CableOne.
Location is Alabama, USA.
Operating System is Windows XP Home Edition Version 2002 Service Pack 3
Processor is AMD Athlon Processor 2650e
1.61 GHz, 896 MB of RAM
Hard Drive is 69.3 GB with 28.5 GB free
Has NO working Anti-Virus
Had Norton Free Trial; Expired who knows when.
Internet WORKS


With that out of the way... I can provide other information if needbe.

More backstory:

I was informed that the internet did not work and that the computer had viruses. I fixed the internet issue; was an issue with the router's modem port being fried. I assume that the computer definitely has viruses as it's primary user is a young lady (minor) who knows little-to-nothing about computers. She has Frostwire installed but has not used it as far as I know. I set out to fix the internet (complete) and clean the computer (this is the problem).


The Problem:

I tried to install Avast! from the only account on the computer - which is an administrator account. I am getting an "Insufficient Permission" error; I have no idea where to go from here. Google did not yield any explanations. I skipped Avast! for the moment and have installed and am running MalwareBytes. As I type this, MalwareBytes has been running for a little over 8 minutes, scanned 54 thousand objects and detected 115 objects. I am running a Full Scan. MalwareBytes downloaded and installed without a hitch.

My inquiry:
Where do I go from here?

BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,735 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:05 PM

Posted 21 July 2012 - 01:19 PM

Welcome aboard Posted Image

Let's see that MBAM log first.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 Ktanaqui

Ktanaqui
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:07:05 PM

Posted 05 August 2012 - 08:57 PM

Alright; so. Things got a little confusing. Truly sorry about that. I am having to re-run the program now due to it having a setting to automatically close... and I don't know where to find the log for it. Could you possibly guide me to the log? (For future reference if not now reference) Ignore this. I was being slow... pulling up the log now :)

Edited by Ktanaqui, 05 August 2012 - 08:58 PM.


#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,735 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:05 PM

Posted 05 August 2012 - 08:58 PM

Download Malwarebytes' Anti-Malware (MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.
NOTE. If you already have MBAM installed, update it before running the scan.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer IF MBAM asks you to do so.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#5 Ktanaqui

Ktanaqui
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:07:05 PM

Posted 05 August 2012 - 09:10 PM

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4166

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

6/5/2010 7:40:01 PM
mbam-log-2010-06-05 (19-40-01).txt

Scan type: Full scan (C:\|E:\|)
Objects scanned: 212489
Time elapsed: 47 minute(s), 40 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 31
Registry Values Infected: 4
Registry Data Items Infected: 0
Folders Infected: 33
Files Infected: 143

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\searchtoolbarlib.csearchtoolbarimpl (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\searchtoolbarlib.csearchtoolbarimpl.1 (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{741de825-a6f0-4497-9aa6-8023cf9b0fff} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{cf54be1c-9359-4395-8533-1657cf209cfe} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a4730ebe-43a6-443e-9776-36915d323ad3} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{d518921a-4a03-425e-9873-b9a71756821e} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{9d425283-d487-4337-bab6-ab8354a81457} (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea1-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59c7fc09-1c83-4648-b3e6-003d2bbc7481} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68af847f-6e91-45dd-9b68-d6a12c30e5d7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170b96c-28d4-4626-8358-27e6caeef907} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d1a71fa0-ff48-48dd-9b6d-7a13a3e42127} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{ddb1968e-ead6-40fd-8dae-ff14757f60c7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{f138d901-86f0-4383-99b6-9cdd406036da} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9d425283-d487-4337-bab6-ab8354a81457} (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\relevantknowledge (Spyware.MarketScore) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\FocusInteractive (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831} (Adware.RelevantKnowledge) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{9d425283-d487-4337-bab6-ab8354a81457} (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{90b8b761-df2b-48ac-bbe0-bcc03a819b3b} (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{9d425283-d487-4337-bab6-ab8354a81457} (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\MenuExt\&Search\(default) (Adware.Hotbar) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Documents and Settings\Vgirl\Application Data\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\FunWebProducts\Data (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\FunWebProducts\Data\Vgirl (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\FunWebProducts\Data (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\FunWebProducts\Data\Ron (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\Seekmo_Icons (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Seekmo_Icons (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\ShoppingReport2 (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\ShoppingReport2\cs (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\ShoppingReport2\cs\db (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\ShoppingReport2\cs\dwld (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\ShoppingReport2\cs\report (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\ShoppingReport2\cs\res1 (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\ScreenSaver (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\ScreenSaver\Images (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared\Cache (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\Hotbar (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\2.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\2.bin\chrome (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Avatar (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Game (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\History (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Notifier (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\RelevantKnowledge (Spyware.MarketScore) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\Vgirl\Local Settings\Application Data\Mozilla\Firefox\Profiles\dkriufsf.default\Cache(3)\1A2EB77Cd01 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\My Documents\My Videos\WebfettiSetup2.3.67.1.SA.HP.ZKfox000(2).exe (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\My Documents\My Videos\WebfettiSetup2.3.67.1.SA.HP.ZKfox000.exe (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023803.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023806.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023814.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023815.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023816.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023819.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023820.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023821.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023822.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023823.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023824.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023825.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023826.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023827.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023828.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023829.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023835.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP106\A0023837.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP108\A0023881.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP108\A0023882.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP109\A0023951.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP163\A0032742.exe (Adware.Zugo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP169\A0034579.exe (Adware.HotBar) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP169\A0034580.exe (Adware.HotBar) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036946.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036947.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036948.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036949.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036950.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036951.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036952.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036953.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036954.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036955.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036956.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036957.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036958.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036959.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036960.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036962.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036963.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036964.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036965.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036966.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036967.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036968.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036969.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036972.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036973.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036975.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036981.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036984.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP171\A0036961.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\Seekmo_Icons\dealnews.ico (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Seekmo_Icons\dealnews.ico (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\ShoppingReport2\cs\Config.xml (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\ShoppingReport2\cs\db\Aliases.dbs (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\ShoppingReport2\cs\db\Sites.dbs (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\ShoppingReport2\cs\dwld\WhiteList.xip (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\ShoppingReport2\cs\report\aggr_storage.xml (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\ShoppingReport2\cs\report\send_storage.xml (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\ShoppingReport2\cs\res1\WhiteList.dbs (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared\Cache\CursorManiaBtn.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared\Cache\SmileyCentralBtn.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared\Cache\WebfettiBtn.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\2.bin\F3BKGERR.JPG (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\2.bin\F3SPACER.WMV (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\2.bin\F3WALLPP.DAT (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\2.bin\FWPBUDDY.PNG (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\2.bin\INSTALL.RDF (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\2.bin\chrome\M3FFXTBR.JAR (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Avatar\COMMON.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\0206D818 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\0206DE52 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\0206E027.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\0206E111.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\0206E21B.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\0206E670.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Cache\0206E6CE.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Game\CHECKERS.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Game\CHESS.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Game\REVERSI.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\History\search3 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\8_step1.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\autoup.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\autoup.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\bkez.jpg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\bkgr.jpg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\bkgs.jpg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\bklf.jpg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\bkrg.jpg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\bkwebfet.jpg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\bkzc.jpg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\bkzl.jpg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\bkzn.jpg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\bkzq.jpg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\bkzr.jpg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\bkzu.jpg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\bkzv.jpg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\bkzw.jpg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\bkzwinky.jpg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\blubtn2d.png (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\blubtn2r.png (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\blubtn3d.png (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\blubtn3r.png (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\center.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\index.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\mid_dots.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\protect.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\rebut4.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\rebut4b.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\rebut4c.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\shield.png (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\shocked.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\stop.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\systray.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\systrayp.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\tp_grad.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Message\COMMON\warn.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Notifier\COMMON.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Notifier\DOG.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Notifier\FISH.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Notifier\KUNGFU.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Notifier\LIFEGARD.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Notifier\MAID.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Notifier\MAILBOX.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Notifier\OPERA.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Notifier\ROBOT.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Notifier\SEDUCT.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Notifier\SURFER.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\prevcfg2.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\s_pid.dat (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\RelevantKnowledge\MSVCP71.DLL (Spyware.MarketScore) -> Quarantined and deleted successfully.
C:\Program Files\RelevantKnowledge\MSVCR71.DLL (Spyware.MarketScore) -> Quarantined and deleted successfully.
C:\Program Files\RelevantKnowledge\rlls.dll (Spyware.MarketScore) -> Quarantined and deleted successfully.
C:\Program Files\RelevantKnowledge\rlls64.dll (Spyware.MarketScore) -> Quarantined and deleted successfully.
C:\Program Files\RelevantKnowledge\rlservice.exe (Spyware.MarketScore) -> Quarantined and deleted successfully.
C:\Program Files\RelevantKnowledge\rlvknlg.exe (Spyware.MarketScore) -> Quarantined and deleted successfully.
C:\Program Files\RelevantKnowledge\rlvknlg64.exe (Spyware.MarketScore) -> Quarantined and deleted successfully.


^^^ That was the first log. This is the second one vvv


Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4166

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

6/21/2010 3:24:59 PM
mbam-log-2010-06-21 (15-24-59).txt

Scan type: Full scan (C:\|E:\|)
Objects scanned: 230465
Time elapsed: 47 minute(s), 28 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 11
Registry Values Infected: 3
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\searchtoolbarlib.csearchtoolbarimpl (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{9d425283-d487-4337-bab6-ab8354a81457} (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{9d425283-d487-4337-bab6-ab8354a81457} (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9d425283-d487-4337-bab6-ab8354a81457} (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\searchtoolbarlib.csearchtoolbarimpl.1 (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\search toolbar (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\avsoft (Trojan.Fraudpack) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\avsuite (Rogue.AntivirusSuite) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Zugo (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\avsoft (Trojan.Fraudpack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\avsuite (Rogue.AntivirusSuite) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{9d425283-d487-4337-bab6-ab8354a81457} (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{9d425283-d487-4337-bab6-ab8354a81457} (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\edcrxybx (Rogue.AntivirusSuite.Gen) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\Hotbar (Adware.Hotbar) -> Quarantined and deleted successfully.

Files Infected:
C:\Program Files\Search Toolbar\SearchToolbar.dll (Adware.Zugo) -> Quarantined and deleted successfully.
C:\Program Files\Search Toolbar\SearchToolbarUninstall.exe (Adware.Zugo) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Local Settings\Application Data\xtreeemed\uyeiwyetssd.exe (Rogue.AntivirusSuite.Gen) -> Delete on reboot.


I still cannot install Avast and the computer randomly closes programs and has horrible pop-ups.

#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,735 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:05 PM

Posted 05 August 2012 - 09:14 PM

Re-run MBAM one more time.

Then.....

Please download the below tool named Rkill (courtesy of BleepingComputer.com) to your desktop.

There are 2 different versions. If one of them won't run then download and try to run the other one.

You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

http://download.bleepingcomputer.com/grinler/beta/rkill.exe
http://download.bleepingcomputer.com/grinler/beta/iExplore.exe

  • Double-click on the Rkill desktop icon to run the tool.
  • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • Do not reboot until instructed.
  • If the tool does not run from any of the links provided, please let me know.

If normal mode still doesn't work, run the tool from safe mode.

When the scan is done Notepad will open with rKill log.
Post it in your next reply.

NOTE. rKill.txt log will also be present on your desktop.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#7 Ktanaqui

Ktanaqui
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:07:05 PM

Posted 06 August 2012 - 11:55 AM

Malwarebytes Anti-Malware 1.62.0.1300
www.malwarebytes.org

Database version: v2012.08.06.01

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
Vgirl :: RON-ASQJ5AVL6OT [administrator]

8/6/2012 10:19:40 AM
mbam-log-2012-08-06 (11-51-05).txt

Scan type: Full scan (C:\|E:\|F:\|G:\|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 459220
Time elapsed: 1 hour(s), 4 minute(s), 12 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 136
HKCR\CLSID\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} (PUP.Funmoods) -> No action taken.
HKCR\TypeLib\{09C554C3-109B-483C-A06B-F14172F1A947} (PUP.Funmoods) -> No action taken.
HKCR\Interface\{A9379648-F6EB-4F65-A624-1C10411A15D0} (PUP.Funmoods) -> No action taken.
HKCR\funmoods.funmoodsHlpr.1 (PUP.Funmoods) -> No action taken.
HKCR\funmoods.funmoodsHlpr (PUP.Funmoods) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} (PUP.Funmoods) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} (PUP.Funmoods) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} (PUP.Funmoods) -> No action taken.
HKCR\CLSID\{11111111-1111-1111-1111-110011221158} (Adware.GamePlayLabs) -> No action taken.
HKCR\TypeLib\{44444444-4444-4444-4444-440044224458} (Adware.GamePlayLabs) -> No action taken.
HKCR\Interface\{55555555-5555-5555-5555-550055225558} (Adware.GamePlayLabs) -> No action taken.
HKCR\CrossriderApp0002258.BHO.1 (Adware.GamePlayLabs) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{11111111-1111-1111-1111-110011221158} (Adware.GamePlayLabs) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{11111111-1111-1111-1111-110011221158} (Adware.GamePlayLabs) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{11111111-1111-1111-1111-110011221158} (Adware.GamePlayLabs) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{11111111-1111-1111-1111-110011221158} (Adware.GamePlayLabs) -> No action taken.
HKCR\CLSID\{B15FD82E-85BC-430d-90CB-65DB1B030510} (Adware.AskSBAR) -> No action taken.
HKCR\TypeLib\{F0D4B230-DA4B-4daf-81E4-DFEE4931A4AA} (Adware.AskSBAR) -> No action taken.
HKCR\Interface\{F0D4B23A-DA4B-4DAF-81E4-DFEE4931A4AA} (Adware.AskSBAR) -> No action taken.
HKCR\AskSBar.ToolbarPlugin.1 (Adware.AskSBAR) -> No action taken.
HKCR\AskSBar.ToolbarPlugin (Adware.AskSBAR) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AskSBar Uninstall (Adware.AskSBAR) -> No action taken.
HKCR\CLSID\{F0D4B231-DA4B-4daf-81E4-DFEE4931A4AA} (Adware.AskSBAR) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F0D4B231-DA4B-4DAF-81E4-DFEE4931A4AA} (Adware.AskSBAR) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{F0D4B231-DA4B-4DAF-81E4-DFEE4931A4AA} (Adware.AskSBAR) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{F0D4B231-DA4B-4DAF-81E4-DFEE4931A4AA} (Adware.AskSBAR) -> No action taken.
HKCR\CLSID\{22222222-2222-2222-2222-220022222258} (Adware.GamePlayLab) -> No action taken.
HKCR\CrossriderApp0002258.Sandbox.1 (Adware.GamePlayLab) -> No action taken.
HKCR\CrossriderApp0002258.Sandbox (Adware.GamePlayLab) -> No action taken.
HKCR\CLSID\{33333333-3333-3333-3333-330033223358} (Adware.GamePlayLab) -> No action taken.
HKCR\CrossriderApp0002258.FBApi.1 (Adware.GamePlayLab) -> No action taken.
HKCR\CrossriderApp0002258.FBApi (Adware.GamePlayLab) -> No action taken.
HKCR\CLSID\{70C6E9DE-F30E-4A40-8A6F-9572C2328320} (PUP.FCTPlugin) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70C6E9DE-F30E-4A40-8A6F-9572C2328320} (PUP.FCTPlugin) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70C6E9DE-F30E-4A40-8A6F-9572C2328320} (PUP.FCTPlugin) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{70C6E9DE-F30E-4A40-8A6F-9572C2328320} (PUP.FCTPlugin) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{70C6E9DE-F30E-4A40-8A6F-9572C2328320} (PUP.FCTPlugin) -> No action taken.
HKCR\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840} (PUP.Funmoods) -> No action taken.
HKCR\TypeLib\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706} (PUP.Funmoods) -> No action taken.
HKCR\esrv.funmoodsESrvc.1 (PUP.Funmoods) -> No action taken.
HKCR\esrv.funmoodsESrvc (PUP.Funmoods) -> No action taken.
HKCR\CLSID\{7952f465-ac46-4a82-b383-870f3784d1cd} (PUP.MyWebSearch) -> No action taken.
HKCR\CLSID\{965B9DBE-B104-44AC-950A-8A5F97AFF439} (PUP.Funmoods) -> No action taken.
HKCR\escort.escortIEPane.1 (PUP.Funmoods) -> No action taken.
HKCR\escort.escortIEPane (PUP.Funmoods) -> No action taken.
HKCR\CLSID\{A4730EBE-43A6-443e-9776-36915D323AD3} (PUP.MyWebSearch) -> No action taken.
HKCR\CLSID\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} (PUP.Funmoods) -> No action taken.
HKCR\CLSID\{5018CFD2-804D-4C99-9F81-25EAEA2769DE} (PUP.Funmoods) -> No action taken.
HKCR\TypeLib\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921} (PUP.Funmoods) -> No action taken.
HKCR\Softonic.dskBnd.1 (PUP.Funmoods) -> No action taken.
HKCR\Softonic.dskBnd (PUP.Funmoods) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{5018CFD2-804D-4C99-9F81-25EAEA2769DE} (PUP.Funmoods) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{5018CFD2-804D-4C99-9F81-25EAEA2769DE} (PUP.Funmoods) -> No action taken.
HKCR\funmoods.dskBnd.1 (PUP.Funmoods) -> No action taken.
HKCR\funmoods.dskBnd (PUP.Funmoods) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} (PUP.Funmoods) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} (PUP.Funmoods) -> No action taken.
HKCR\CLSID\{A9DB719C-7156-415E-B49D-BAD039DE4F13} (PUP.Funmoods) -> No action taken.
HKCR\CLSID\{44B50C01-4993-48E2-ADEE-D812BAE2E9A2} (PUP.Funmoods) -> No action taken.
HKCR\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800} (PUP.Funmoods) -> No action taken.
HKCR\SoftonicApp.appCore.1 (PUP.Funmoods) -> No action taken.
HKCR\SoftonicApp.appCore (PUP.Funmoods) -> No action taken.
HKCR\funmoodsApp.appCore.1 (PUP.Funmoods) -> No action taken.
HKCR\funmoodsApp.appCore (PUP.Funmoods) -> No action taken.
HKCR\CLSID\{F03FD9D0-4F2B-497C-8A71-DD41D70B07D9} (PUP.Funmoods) -> No action taken.
HKCR\f (PUP.Funmoods) -> No action taken.
HKCR\Typelib\{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3} (PUP.Funmoods) -> No action taken.
HKCR\Interface\{0D80F1C5-D17B-4177-AC68-955F3EF9F191} (PUP.Funmoods) -> No action taken.
HKCU\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256A51-B582-467e-B8D4-7786EDA79AE0} (Trojan.Vundo) -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256A51-B582-467e-B8D4-7786EDA79AE0} (Trojan.Vundo) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{00A6FAF1-072E-44CF-8957-5838F569A31D} (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF1-072E-44CF-8957-5838F569A31D} (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{07B18EA1-A523-4961-B6BB-170DE4475CCA} (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA1-A523-4961-B6BB-170DE4475CCA} (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{07B18EA9-A523-4961-B6BB-170DE4475CCA} (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA9-A523-4961-B6BB-170DE4475CCA} (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{0ED403E8-470A-4a8a-85A4-D7688CFE39A3} (Adware.Gamevance) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{0ED403E8-470A-4a8a-85A4-D7688CFE39A3} (Adware.Gamevance) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{5D79F641-C168-40DF-A32F-BACEA7509E75} (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{5D79F641-C168-40DF-A32F-BACEA7509E75} (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{C98D5B61-B0EA-4D48-9839-1079D352D880} (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{C98D5B61-B0EA-4D48-9839-1079D352D880} (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{CB41FC95-F1B3-4797-8BB6-1012FF62ABBA} (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{CB41FC95-F1B3-4797-8BB6-1012FF62ABBA} (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF6-072E-44CF-8957-5838F569A31D} (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{0696F815-A3A9-490A-BB14-9EC3350B1276} (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EAB-A523-4961-B6BB-170DE4475CCA} (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{BEAC7DC8-E106-4C6A-931E-5A42E7362883} (Adware.GameVance) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{F02C0832-C85C-4B93-8C6F-9DF20121A10D} (PUP.MyWebSearch) -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4e7f49ed-8c94-4aaa-a407-3010d099b11a} (PUP.MyWebSearch) -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59C7FC09-1C83-4648-B3E6-003D2BBC7481} (PUP.MyWebSearch) -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{65bcd620-07dd-012f-819f-073cf1b8f7c6} (Adware.GamePlayLab) -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68AF847F-6E91-45dd-9B68-D6A12C30E5D7} (PUP.MyWebSearch) -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170B96C-28D4-4626-8358-27E6CAEEF907} (PUP.MyWebSearch) -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A} (PUP.Funmoods) -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d09094b3-b426-4f16-a6d9-e211fe222127} (PUP.MyWebSearch) -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D1A71FA0-FF48-48dd-9B6D-7A13A3E42127} (PUP.MyWebSearch) -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{DDB1968E-EAD6-40fd-8DAE-FF14757F60C7} (PUP.MyWebSearch) -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F138D901-86F0-4383-99B6-9CDD406036DA} (PUP.MyWebSearch) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1D4DB7D2-6EC9-47a3-BD87-1E41684E07BB} (PUP.MyWebSearch) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{7895609d-c8b4-4cf5-a2c7-28223d0c3d92} (PUP.MyWebSearch) -> No action taken.
HKCR\CrossriderApp0002258.BHO (Adware.GamePlayLab) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\EpicPlay (Adware.Gamevance) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\funmoods (PUP.FunMoods) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\I Want This (Adware.GamePlayLabs) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\facetheme (PUP.FCTPlugin) -> No action taken.
HKCR\.pox (Rogue.FixTool) -> No action taken.
HKCR\CrossriderApp0002258.BHO (PUP.CrossFire.Gen) -> No action taken.
HKCR\CrossriderApp0002258.BHO.1 (PUP.CrossFire.Gen) -> No action taken.
HKCR\CrossriderApp0002258.FBApi (PUP.CrossFire.Gen) -> No action taken.
HKCR\CrossriderApp0002258.FBApi.1 (PUP.CrossFire.Gen) -> No action taken.
HKCR\CrossriderApp0002258.Sandbox (PUP.CrossFire.Gen) -> No action taken.
HKCR\CrossriderApp0002258.Sandbox.1 (PUP.CrossFire.Gen) -> No action taken.
HKCR\pofile (Rogue.FixTool) -> No action taken.
HKCU\SOFTWARE\Fun Web Products (PUP.MyWebSearch) -> No action taken.
HKCU\SOFTWARE\MyWebSearch (PUP.MyWebSearch) -> No action taken.
HKCU\Software\hblitesa (Adware.HotBar) -> No action taken.
HKCU\Software\Cr_Installer\2258 (Adware.GamePlayLab) -> No action taken.
HKCU\SOFTWARE\CROSSRIDER (Adware.GamePlayLab) -> No action taken.
HKCU\SOFTWARE\I WANT THIS (Adware.GamePlayLab) -> No action taken.
HKCU\SOFTWARE\I WANT THIS (PUP.GamesPlayLab) -> No action taken.
HKLM\SOFTWARE\FocusInteractive (PUP.MyWebSearch) -> No action taken.
HKLM\SOFTWARE\Fun Web Products (PUP.MyWebSearch) -> No action taken.
HKLM\SOFTWARE\MyWebSearch (PUP.MyWebSearch) -> No action taken.
HKLM\SOFTWARE\VooMuu (Adware.HotBar.VM) -> No action taken.
HKLM\SOFTWARE\Google\Chrome\Extensions\kincjchfokkeneeofpeefomkikfkiedl (PUP.FCTPlugin) -> No action taken.
HKLM\SOFTWARE\Google\Chrome\Extensions\mpfapcdfbbledbojijcbcclmlieaoogk (PUP.GamesPlayLab) -> No action taken.
HKLM\SOFTWARE\Google\chrome\Extensions\fdloijijlkoblmigdofommgnheckmaki (PUP.Funmoods) -> No action taken.
HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\mpfapcdfbbledbojijcbcclmlieaoogk (PUP.GamesPlayLab) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{11111111-1111-1111-1111-110011221158} (PUP.GamePlayLab) -> No action taken.
HKCR\CLSID\{11111111-1111-1111-1111-110011221158} (PUP.GamePlayLab) -> No action taken.
HKCR\TypeLib\{44444444-4444-4444-4444-440044224458} (PUP.GamePlayLab) -> No action taken.
HKCR\Interface\{55555555-5555-5555-5555-550055225558} (PUP.GamePlayLab) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{11111111-1111-1111-1111-110011221158} (PUP.GamePlayLab) -> No action taken.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{11111111-1111-1111-1111-110011221158} (PUP.GamePlayLab) -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{11111111-1111-1111-1111-110011221158} (PUP.GamePlayLab) -> No action taken.

Registry Values Detected: 9
HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar|{5018CFD2-804D-4C99-9F81-25EAEA2769DE} (PUP.Funmoods) -> Data: Softonic Toolbar -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar|{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} (PUP.Funmoods) -> Data: Funmoods Toolbar -> No action taken.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} (PUP.Funmoods) -> Data: -> No action taken.
HKCU\Software\Crossrider|215AppVerifier (Adware.GamePlayLab) -> Data: 7687c4f72016e6196e82d1840a03c1db -> No action taken.
HKCU\Software\I Want This|BundledFirefox (Adware.GamePlayLab) -> Data: 1 -> No action taken.
HKCU\Software\I Want This|HelperRunningVersion (PUP.GamesPlayLab) -> Data: 147 -> No action taken.
HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings|ProxyServer (PUM.Bad.Proxy) -> Data: http=127.0.0.1:5555 -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\I Want This|Publisher (Adware.GamePlayLab) -> Data: 215 Apps -> No action taken.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\funmoods|UninstallString (PUP.Funmoods) -> Data: "C:\Program Files\Funmoods\funmoods\1.5.11.16\uninstall.exe" -> No action taken.

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 75
C:\Program Files\Object (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\chromeaddon (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\content (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\defaults (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\defaults\preferences (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\locale (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\locale\en-US (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\skin (PUP.FCTPlugin) -> No action taken.
C:\Program Files\I Want This (Adware.GamePlayLab) -> No action taken.
C:\Documents and Settings\All Users\Application Data\2ACA5CC3-0F83-453D-A079-1076FE1A8B65 (Adware.Seekmo) -> No action taken.
C:\Documents and Settings\All Users\Application Data\ClickPotatoLiteSA (Adware.ClickPotato) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\ClickPotatoLite (Adware.ClickPotato) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\Logs (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\PCOBackups (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410 (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020 (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\Results (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2 (Adware.ShoppingReport2) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs (Adware.ShoppingReport2) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\db (Adware.ShoppingReport2) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\dwld (Adware.ShoppingReport2) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\report (Adware.ShoppingReport2) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\res1 (Adware.ShoppingReport2) -> No action taken.
C:\Program Files\ClickPotatoLite (Adware.ClickPotato) -> No action taken.
C:\Program Files\ClickPotatoLite\bin (Adware.ClickPotato) -> No action taken.
C:\Program Files\ClickPotatoLite\bin\10.0.519.0 (Adware.ClickPotato) -> No action taken.
C:\Program Files\ClickPotatoLite\bin\10.0.519.0\firefox (Adware.ClickPotato) -> No action taken.
C:\Program Files\ClickPotatoLite\bin\10.0.519.0\firefox\extensions (Adware.ClickPotato) -> No action taken.
C:\Program Files\ClickPotatoLite\bin\10.0.530.0 (Adware.ClickPotato) -> No action taken.
C:\Program Files\ClickPotatoLite\bin\10.0.530.0\firefox (Adware.ClickPotato) -> No action taken.
C:\Program Files\ClickPotatoLite\bin\10.0.530.0\firefox\extensions (Adware.ClickPotato) -> No action taken.
C:\Program Files\ClickPotatoLite\bin\10.0.530.0\firefox\extensions\plugins (Adware.ClickPotato) -> No action taken.
C:\Program Files\ClickPotatoLite\bin\10.0.536.0 (Adware.ClickPotato) -> No action taken.
C:\Program Files\ClickPotatoLite\bin\10.0.536.0\firefox (Adware.ClickPotato) -> No action taken.
C:\Program Files\ClickPotatoLite\bin\10.0.536.0\firefox\extensions (Adware.ClickPotato) -> No action taken.
C:\Program Files\ClickPotatoLite\bin\10.0.536.0\firefox\extensions\plugins (Adware.ClickPotato) -> No action taken.
C:\Program Files\Error Fix (Rogue.ErrorFix) -> No action taken.
C:\Program Files\Error Fix\PW (Rogue.ErrorFix) -> No action taken.
C:\Program Files\FunWebProducts (PUP.MyWebSearch) -> No action taken.
C:\Program Files\FunWebProducts\ScreenSaver (PUP.MyWebSearch) -> No action taken.
C:\Program Files\FunWebProducts\ScreenSaver\Images (PUP.MyWebSearch) -> No action taken.
C:\Program Files\FunWebProducts\Shared (PUP.MyWebSearch) -> No action taken.
C:\Program Files\MyWebSearch (PUP.MyWebSearch) -> No action taken.
C:\Program Files\MyWebSearch\bar (PUP.MyWebSearch) -> No action taken.
C:\Program Files\MyWebSearch\bar\History (PUP.MyWebSearch) -> No action taken.
C:\Program Files\MyWebSearch\bar\Settings (PUP.MyWebSearch) -> No action taken.
C:\Program Files\Perfect Optimizer (PUP.PerfectOptimizer) -> No action taken.
C:\Program Files\Perfect Optimizer\Backup (PUP.PerfectOptimizer) -> No action taken.
C:\Program Files\Perfect Optimizer\Backup\Application (PUP.PerfectOptimizer) -> No action taken.
C:\Program Files\Perfect Optimizer\Backup\Registry (PUP.PerfectOptimizer) -> No action taken.
C:\Program Files\Perfect Optimizer\Backup\Registry\FirstBackup (PUP.PerfectOptimizer) -> No action taken.
C:\Program Files\Perfect Optimizer\Backup\Registry\FullBackup (PUP.PerfectOptimizer) -> No action taken.
C:\Program Files\Perfect Optimizer\Backup\Service (PUP.PerfectOptimizer) -> No action taken.
C:\Program Files\Perfect Optimizer\Temp (PUP.PerfectOptimizer) -> No action taken.
C:\Program Files\ShoppingReport2 (Adware.ShoppingReport2) -> No action taken.
C:\Program Files\ShoppingReport2\Bin (Adware.ShoppingReport2) -> No action taken.
C:\Program Files\ShoppingReport2\Bin\2.7.21 (Adware.ShoppingReport2) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com (PUP.PlaySushi) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com\chrome (PUP.PlaySushi) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com\components (PUP.PlaySushi) -> No action taken.
C:\Program Files\VooMuu (Adware.HotBar.VM) -> No action taken.
C:\Program Files\VooMuu\bin (Adware.HotBar.VM) -> No action taken.
C:\Program Files\VooMuu\bin\1.0.36.0 (Adware.HotBar.VM) -> No action taken.
C:\Documents and Settings\All Users\Application Data\VooMuuSA (Adware.HotBar.VM) -> No action taken.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C} (Adware.Zwangi) -> No action taken.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C}\chrome (Adware.Zwangi) -> No action taken.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C}\defaults (Adware.Zwangi) -> No action taken.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C}\defaults\preferences (Adware.Zwangi) -> No action taken.
C:\Program Files\Funmoods\funmoods\1.5.11.16 (PUP.Funmoods) -> No action taken.
C:\Program Files\Funmoods\funmoods\1.5.11.16\bh (PUP.Funmoods) -> No action taken.
C:\Documents and Settings\Vgirl\Local Settings\Application Data\I Want This (Adware.GamePlayLab) -> No action taken.
C:\Documents and Settings\Vgirl\Local Settings\Application Data\I Want This\Chrome (Adware.GamePlayLab) -> No action taken.

Files Detected: 298
C:\Program Files\Funmoods\funmoods\1.5.11.16\bh\funmoods.dll (PUP.Funmoods) -> No action taken.
C:\Program Files\I Want This\I Want This.dll (Adware.GamePlayLabs) -> No action taken.
C:\Program Files\AskSBar\bar\1.bin\ASKSBAR.DLL (Adware.AskSBAR) -> No action taken.
C:\Program Files\Object\bho_project.dll (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe (PUP.Funmoods) -> No action taken.
C:\Program Files\Funmoods\funmoods\1.5.11.16\funmoodsTlbr.dll (PUP.Funmoods) -> No action taken.
C:\Program Files\Softonic\Softonic\1.5.21.0\SoftonicTlbr.dll (PUP.Funmoods) -> No action taken.
C:\Program Files\Funmoods\funmoods\1.5.11.16\funmoodsApp.dll (PUP.Funmoods) -> No action taken.
C:\Program Files\Softonic\Softonic\1.5.21.0\SoftonicApp.dll (PUP.Funmoods) -> No action taken.
C:\Program Files\Funmoods\funmoods\1.5.11.16\funmoodsEng.dll (PUP.Funmoods) -> No action taken.
C:\Documents and Settings\Diegos girl♥1.23.11\Local Settings\Temporary Internet Files\Content.IE5\G9QVSXQF\Retrogamer[1].exe (PUP.FunWebProducts) -> No action taken.
C:\Documents and Settings\Ron\Local Settings\Temporary Internet Files\Content.IE5\RMNI0YMP\iWon[1].exe (PUP.FunWebProducts) -> No action taken.
C:\Documents and Settings\Ron\Local Settings\Temporary Internet Files\Content.IE5\VZYJ4ZU5\GamingWonderland[1].exe (PUP.FunWebProducts) -> No action taken.
C:\Documents and Settings\Vgirl\My Documents\Downloads\Downloader.exe (PUP.BundleInstaller.VG) -> No action taken.
C:\Program Files\AskSBar\bar\1.bin\A2HIGHIN.EXE (Trojan.Agent) -> No action taken.
C:\Program Files\AskSBar\bar\1.bin\A2PLUGIN.DLL (PUP.MyWebSearch) -> No action taken.
C:\Program Files\AskSBar\bar\1.bin\NPASKSBR.DLL (Trojan.Agent) -> No action taken.
C:\Program Files\iWonEI\Installr\1.bin\jfEZSETP.dll (PUP.FunWebProducts) -> No action taken.
C:\Program Files\ShoppingReport2\Uninst.exe (Adware.HotBar.SS2) -> No action taken.
C:\Program Files\Mozilla Firefox\plugins\NPAskSBr.dll (Trojan.Agent) -> No action taken.
C:\Program Files\EpicPlay\epicRemoval.exe (Adware.Gamevance) -> No action taken.
C:\Program Files\Funmoods\funmoods\1.5.11.16\uninstall.exe (PUP.FunMoods) -> No action taken.
C:\Program Files\I Want This\I Want This.exe (Adware.GamePlayLabs) -> No action taken.
C:\Program Files\I Want This\I Want ThisGui.exe (Adware.GamePlayLabs) -> No action taken.
C:\Program Files\I Want This\Uninstall.exe (Adware.GamePlayLabs) -> No action taken.
C:\RECYCLER\S-1-5-21-1606980848-115176313-839522115-1004\Dc13.exe (PUP.FunWebProducts) -> No action taken.
C:\RECYCLER\S-1-5-21-1606980848-115176313-839522115-1005\Dc10.exe (Affiliate.Downloader) -> No action taken.
C:\RECYCLER\S-1-5-21-1606980848-115176313-839522115-1005\Dc9.exe (Affiliate.Downloader) -> No action taken.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP946\A0245027.exe (PUP.Bundle.Installer.OI) -> No action taken.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP946\A0245028.exe (PUP.BundleInstaller.OI) -> No action taken.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP946\A0245029.exe (PUP.BundleInstaller.OI) -> No action taken.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP946\A0245030.exe (PUP.BundleInstaller.OI) -> No action taken.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP946\A0245035.exe (PUP.BundleOffers.IIQ) -> No action taken.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP946\A0245038.exe (Adware.GameVance) -> No action taken.
C:\Documents and Settings\Vgirl\Local Settings\Temp\.exe (Trojan.Agent) -> No action taken.
C:\Program Files\Object\enable.txt (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\ChromeAddon.pem (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\config.ini (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme_uninstall.exe (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\chromeaddon\._included.js (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\chromeaddon\background.html (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\chromeaddon\included.js (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\chromeaddon\manifest.json (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\build.sh (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\chrome.manifest (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\config_build.sh (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\files (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\install.rdf (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\readme.txt (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\content\.DS_Store (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\content\firefoxOverlay.xul (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\content\installid.js (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\content\overlay.js (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\content\sudoku.js (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\defaults\.DS_Store (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\defaults\preferences\.DS_Store (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\defaults\preferences\._sudoku.js (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\defaults\preferences\sudoku.js (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\locale\.DS_Store (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\locale\en-US\.DS_Store (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\locale\en-US\sudoku.dtd (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\locale\en-US\sudoku.properties (PUP.FCTPlugin) -> No action taken.
C:\Program Files\Object\facetheme\skin\overlay.css (PUP.FCTPlugin) -> No action taken.
C:\Program Files\I Want This\I Want This.ini (Adware.GamePlayLab) -> No action taken.
C:\Program Files\I Want This\appAPIinternalWrapper.js (Adware.GamePlayLab) -> No action taken.
C:\Program Files\I Want This\fb.js (Adware.GamePlayLab) -> No action taken.
C:\Program Files\I Want This\I Want This.ico (Adware.GamePlayLab) -> No action taken.
C:\Program Files\I Want This\I Want ThisInstaller.log (Adware.GamePlayLab) -> No action taken.
C:\Program Files\I Want This\jquery.js (Adware.GamePlayLab) -> No action taken.
C:\Program Files\I Want This\json.js (Adware.GamePlayLab) -> No action taken.
C:\Documents and Settings\All Users\Application Data\ClickPotatoLiteSA\ClickPotatoLiteSA.dat (Adware.ClickPotato) -> No action taken.
C:\Documents and Settings\All Users\Application Data\ClickPotatoLiteSA\ClickPotatoLiteSAAbout.mht (Adware.ClickPotato) -> No action taken.
C:\Documents and Settings\All Users\Application Data\ClickPotatoLiteSA\ClickPotatoLiteSAau.dat (Adware.ClickPotato) -> No action taken.
C:\Documents and Settings\All Users\Application Data\ClickPotatoLiteSA\ClickPotatoLiteSAEULA.mht (Adware.ClickPotato) -> No action taken.
C:\Documents and Settings\All Users\Application Data\ClickPotatoLiteSA\ClickPotatoLiteSA_hpk.dat (Adware.ClickPotato) -> No action taken.
C:\Documents and Settings\All Users\Application Data\ClickPotatoLiteSA\ClickPotatoLiteSA_kyf.dat (Adware.ClickPotato) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\spy_ignore.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\Logs\2011-03-02 16-03-120.log (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\filelist.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-0.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-1.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-10.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-100.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-101.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-102.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-103.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-11.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-12.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-13.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-14.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-15.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-16.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-17.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-18.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-19.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-2.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-20.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-21.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-22.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-23.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-24.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-26.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-27.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-28.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-29.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-3.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-30.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-31.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-32.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-33.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-34.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-35.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-36.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-37.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-38.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-39.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-4.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-40.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-41.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-42.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-44.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-45.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-46.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-47.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-48.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-49.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-5.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-50.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-51.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-52.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-53.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-54.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-55.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-56.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-57.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-58.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-59.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-6.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-60.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-62.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-63.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-64.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-65.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-66.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-67.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-68.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-69.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-7.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-70.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-71.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-72.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-73.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-74.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-75.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-76.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-77.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-78.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-79.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-80.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-81.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-82.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-83.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-84.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-85.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-86.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-87.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-88.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-89.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-9.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-90.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-91.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-92.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-93.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-94.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-95.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-96.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-97.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-98.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-99.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-25.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-43.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-61.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-8.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file26.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file9.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file0.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file1.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file10.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file11.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file12.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file13.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file14.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file15.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file16.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file17.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file18.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file19.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file2.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file20.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file21.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file22.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file23.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file24.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file25.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\filelist.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-0.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-1.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-10.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-11.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-12.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-13.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-14.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-15.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-16.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-2.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-3.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-4.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-5.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-6.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-7.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-8.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-9.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file27.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file28.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file29.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file3.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file30.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file31.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file32.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file33.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file34.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file35.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file36.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file37.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file38.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file39.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file4.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file40.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file41.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file42.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file43.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file44.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file45.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file46.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file47.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file48.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file49.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file5.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file50.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file6.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file7.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file8.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\Results\Evidence.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\Results\Junk.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\Results\Registry.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Ron\Application Data\Error Fix\Results\Update.db (Rogue.ErrorFix) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\Config.xml (Adware.ShoppingReport2) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\db\Aliases.dbs (Adware.ShoppingReport2) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\db\Sites.dbs (Adware.ShoppingReport2) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\dwld\WhiteList.xip (Adware.ShoppingReport2) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\report\aggr_storage.xml (Adware.ShoppingReport2) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\report\send_storage.xml (Adware.ShoppingReport2) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\res1\WhiteList.dbs (Adware.ShoppingReport2) -> No action taken.
C:\Program Files\ClickPotatoLite\bin\10.0.519.0\firefox\extensions\install.rdf (Adware.ClickPotato) -> No action taken.
C:\Program Files\ClickPotatoLite\bin\10.0.530.0\firefox\extensions\chrome.manifest (Adware.ClickPotato) -> No action taken.
C:\Program Files\ClickPotatoLite\bin\10.0.530.0\firefox\extensions\install.rdf (Adware.ClickPotato) -> No action taken.
C:\Program Files\ClickPotatoLite\bin\10.0.536.0\firefox\extensions\install.rdf (Adware.ClickPotato) -> No action taken.
C:\Program Files\Error Fix\PW\general.html (Rogue.ErrorFix) -> No action taken.
C:\Program Files\Error Fix\PW\optimizations.html (Rogue.ErrorFix) -> No action taken.
C:\Program Files\Error Fix\PW\privacy.html (Rogue.ErrorFix) -> No action taken.
C:\Program Files\Error Fix\PW\scheduler.html (Rogue.ErrorFix) -> No action taken.
C:\Program Files\Error Fix\PW\startup.html (Rogue.ErrorFix) -> No action taken.
C:\Program Files\Error Fix\PW\wizard.css (Rogue.ErrorFix) -> No action taken.
C:\Program Files\FunWebProducts\ScreenSaver\Images\025A7A21.urr (PUP.MyWebSearch) -> No action taken.
C:\Program Files\FunWebProducts\ScreenSaver\Images\025BC30C.urr (PUP.MyWebSearch) -> No action taken.
C:\Program Files\FunWebProducts\ScreenSaver\Images\025BEEB0.dat (PUP.MyWebSearch) -> No action taken.
C:\Program Files\FunWebProducts\ScreenSaver\Images\wrkparam.lst (PUP.MyWebSearch) -> No action taken.
C:\Program Files\MyWebSearch\bar\History\search3 (PUP.MyWebSearch) -> No action taken.
C:\Program Files\MyWebSearch\bar\Settings\s_FeatCk.dat (PUP.MyWebSearch) -> No action taken.
C:\Program Files\MyWebSearch\bar\Settings\s_FeatCk.dat.bak (PUP.MyWebSearch) -> No action taken.
C:\Program Files\MyWebSearch\bar\Settings\s_pid.dat (PUP.MyWebSearch) -> No action taken.
C:\Program Files\Perfect Optimizer\PerfectOptimizer.ini (PUP.PerfectOptimizer) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com\chrome.manifest (PUP.PlaySushi) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com\install.rdf (PUP.PlaySushi) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com\chrome\pstextlinks.jar (PUP.PlaySushi) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com\components\PlaySushiFF.dll (PUP.PlaySushi) -> No action taken.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com\components\PlaySushiFF.xpt (PUP.PlaySushi) -> No action taken.
C:\Program Files\VooMuu\bin\1.0.36.0\copyright.txt (Adware.HotBar.VM) -> No action taken.
C:\Documents and Settings\All Users\Application Data\VooMuuSA\VooMuuSA.dat (Adware.HotBar.VM) -> No action taken.
C:\Documents and Settings\All Users\Application Data\VooMuuSA\VooMuuSAau.dat (Adware.HotBar.VM) -> No action taken.
C:\Documents and Settings\All Users\Application Data\VooMuuSA\VooMuuSA_kyf.dat (Adware.HotBar.VM) -> No action taken.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C}\chrome.manifest (Adware.Zwangi) -> No action taken.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C}\install.rdf (Adware.Zwangi) -> No action taken.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C}\chrome\basicscan.jar (Adware.Zwangi) -> No action taken.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C}\defaults\preferences\prefs.js (Adware.Zwangi) -> No action taken.
C:\Program Files\Funmoods\funmoods\1.5.11.16\funmoodsOEM.crx (PUP.Funmoods) -> No action taken.
C:\Documents and Settings\Vgirl\Local Settings\Application Data\I Want This\Chrome\I Want This.crx (Adware.GamePlayLab) -> No action taken.
C:\Program Files\I Want This\I Want This.dll (PUP.GamePlayLab) -> No action taken.

(end)


Downloading Rkill now.

#8 Ktanaqui

Ktanaqui
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:07:05 PM

Posted 06 August 2012 - 11:59 AM

Rkill:


Rkill 2.1.0 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2012 BleepingComputer.com
More Information about Rkill can be found at this link:
http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 08/06/2012 11:57:15 AM in x86 mode.
Windows Version: Windows XP

Checking for Windows services to stop.

* No malware services found to stop.

Checking for processes to terminate.

* No malware processes found to kill.

Checking Registry for malware related settings.

* No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks.

* No issues found.

Searching for Missing Digital Signatures:

* No issues found.

Restarting Explorer.exe in order to apply changes.

Program finished at: 08/06/2012 11:58:06 AM
Execution time: 0 hours(s), 0 minute(s), and 51 seconds(s)

#9 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,735 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:05 PM

Posted 06 August 2012 - 04:58 PM

Your MBAM log says "No action taken".
Re-run it, FIX all issues and post new log.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#10 Ktanaqui

Ktanaqui
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:07:05 PM

Posted 06 August 2012 - 05:01 PM

Alright; shall do now :) I left it in its default settings x.x

#11 Ktanaqui

Ktanaqui
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:07:05 PM

Posted 06 August 2012 - 11:20 PM

Malwarebytes Anti-Malware 1.62.0.1300
www.malwarebytes.org

Database version: v2012.08.06.01

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
Vgirl :: RON-ASQJ5AVL6OT [administrator]

8/6/2012 5:04:39 PM
mbam-log-2012-08-06 (17-04-39).txt

Scan type: Full scan (C:\|E:\|F:\|G:\|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 459307
Time elapsed: 1 hour(s), 40 minute(s), 49 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 136
HKCR\CLSID\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\TypeLib\{09C554C3-109B-483C-A06B-F14172F1A947} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\Interface\{A9379648-F6EB-4F65-A624-1C10411A15D0} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\funmoods.funmoodsHlpr.1 (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\funmoods.funmoodsHlpr (PUP.Funmoods) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\CLSID\{11111111-1111-1111-1111-110011221158} (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
HKCR\TypeLib\{44444444-4444-4444-4444-440044224458} (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
HKCR\Interface\{55555555-5555-5555-5555-550055225558} (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
HKCR\CrossriderApp0002258.BHO.1 (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{11111111-1111-1111-1111-110011221158} (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{11111111-1111-1111-1111-110011221158} (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{11111111-1111-1111-1111-110011221158} (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{11111111-1111-1111-1111-110011221158} (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
HKCR\CLSID\{B15FD82E-85BC-430d-90CB-65DB1B030510} (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKCR\TypeLib\{F0D4B230-DA4B-4daf-81E4-DFEE4931A4AA} (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKCR\Interface\{F0D4B23A-DA4B-4DAF-81E4-DFEE4931A4AA} (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKCR\AskSBar.ToolbarPlugin.1 (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKCR\AskSBar.ToolbarPlugin (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AskSBar Uninstall (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKCR\CLSID\{F0D4B231-DA4B-4daf-81E4-DFEE4931A4AA} (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F0D4B231-DA4B-4DAF-81E4-DFEE4931A4AA} (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{F0D4B231-DA4B-4DAF-81E4-DFEE4931A4AA} (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{F0D4B231-DA4B-4DAF-81E4-DFEE4931A4AA} (Adware.AskSBAR) -> Quarantined and deleted successfully.
HKCR\CLSID\{22222222-2222-2222-2222-220022222258} (Adware.GamePlayLab) -> Quarantined and deleted successfully.
HKCR\CrossriderApp0002258.Sandbox.1 (Adware.GamePlayLab) -> Quarantined and deleted successfully.
HKCR\CrossriderApp0002258.Sandbox (Adware.GamePlayLab) -> Quarantined and deleted successfully.
HKCR\CLSID\{33333333-3333-3333-3333-330033223358} (Adware.GamePlayLab) -> Quarantined and deleted successfully.
HKCR\CrossriderApp0002258.FBApi.1 (Adware.GamePlayLab) -> Quarantined and deleted successfully.
HKCR\CrossriderApp0002258.FBApi (Adware.GamePlayLab) -> Quarantined and deleted successfully.
HKCR\CLSID\{70C6E9DE-F30E-4A40-8A6F-9572C2328320} (PUP.FCTPlugin) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70C6E9DE-F30E-4A40-8A6F-9572C2328320} (PUP.FCTPlugin) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70C6E9DE-F30E-4A40-8A6F-9572C2328320} (PUP.FCTPlugin) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{70C6E9DE-F30E-4A40-8A6F-9572C2328320} (PUP.FCTPlugin) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{70C6E9DE-F30E-4A40-8A6F-9572C2328320} (PUP.FCTPlugin) -> Quarantined and deleted successfully.
HKCR\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\TypeLib\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\esrv.funmoodsESrvc.1 (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\esrv.funmoodsESrvc (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\CLSID\{7952f465-ac46-4a82-b383-870f3784d1cd} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{965B9DBE-B104-44AC-950A-8A5F97AFF439} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\escort.escortIEPane.1 (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\escort.escortIEPane (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\CLSID\{A4730EBE-43A6-443e-9776-36915D323AD3} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\CLSID\{5018CFD2-804D-4C99-9F81-25EAEA2769DE} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\TypeLib\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\Softonic.dskBnd.1 (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\Softonic.dskBnd (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{5018CFD2-804D-4C99-9F81-25EAEA2769DE} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{5018CFD2-804D-4C99-9F81-25EAEA2769DE} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\funmoods.dskBnd.1 (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\funmoods.dskBnd (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\CLSID\{A9DB719C-7156-415E-B49D-BAD039DE4F13} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\CLSID\{44B50C01-4993-48E2-ADEE-D812BAE2E9A2} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\SoftonicApp.appCore.1 (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\SoftonicApp.appCore (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\funmoodsApp.appCore.1 (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\funmoodsApp.appCore (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\CLSID\{F03FD9D0-4F2B-497C-8A71-DD41D70B07D9} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\f (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\Typelib\{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\Interface\{0D80F1C5-D17B-4177-AC68-955F3EF9F191} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256A51-B582-467e-B8D4-7786EDA79AE0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256A51-B582-467e-B8D4-7786EDA79AE0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{00A6FAF1-072E-44CF-8957-5838F569A31D} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF1-072E-44CF-8957-5838F569A31D} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{07B18EA1-A523-4961-B6BB-170DE4475CCA} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA1-A523-4961-B6BB-170DE4475CCA} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{07B18EA9-A523-4961-B6BB-170DE4475CCA} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA9-A523-4961-B6BB-170DE4475CCA} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{0ED403E8-470A-4a8a-85A4-D7688CFE39A3} (Adware.Gamevance) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{0ED403E8-470A-4a8a-85A4-D7688CFE39A3} (Adware.Gamevance) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{5D79F641-C168-40DF-A32F-BACEA7509E75} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{5D79F641-C168-40DF-A32F-BACEA7509E75} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{C98D5B61-B0EA-4D48-9839-1079D352D880} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{C98D5B61-B0EA-4D48-9839-1079D352D880} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{CB41FC95-F1B3-4797-8BB6-1012FF62ABBA} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{CB41FC95-F1B3-4797-8BB6-1012FF62ABBA} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF6-072E-44CF-8957-5838F569A31D} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{0696F815-A3A9-490A-BB14-9EC3350B1276} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EAB-A523-4961-B6BB-170DE4475CCA} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{BEAC7DC8-E106-4C6A-931E-5A42E7362883} (Adware.GameVance) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{F02C0832-C85C-4B93-8C6F-9DF20121A10D} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4e7f49ed-8c94-4aaa-a407-3010d099b11a} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59C7FC09-1C83-4648-B3E6-003D2BBC7481} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{65bcd620-07dd-012f-819f-073cf1b8f7c6} (Adware.GamePlayLab) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68AF847F-6E91-45dd-9B68-D6A12C30E5D7} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170B96C-28D4-4626-8358-27E6CAEEF907} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d09094b3-b426-4f16-a6d9-e211fe222127} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D1A71FA0-FF48-48dd-9B6D-7A13A3E42127} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{DDB1968E-EAD6-40fd-8DAE-FF14757F60C7} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F138D901-86F0-4383-99B6-9CDD406036DA} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1D4DB7D2-6EC9-47a3-BD87-1E41684E07BB} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{7895609d-c8b4-4cf5-a2c7-28223d0c3d92} (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CrossriderApp0002258.BHO (Adware.GamePlayLab) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\EpicPlay (Adware.Gamevance) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\funmoods (PUP.FunMoods) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\I Want This (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\facetheme (PUP.FCTPlugin) -> Quarantined and deleted successfully.
HKCR\.pox (Rogue.FixTool) -> Quarantined and deleted successfully.
HKCR\CrossriderApp0002258.BHO (PUP.CrossFire.Gen) -> Quarantined and deleted successfully.
HKCR\CrossriderApp0002258.BHO.1 (PUP.CrossFire.Gen) -> Quarantined and deleted successfully.
HKCR\CrossriderApp0002258.FBApi (PUP.CrossFire.Gen) -> Quarantined and deleted successfully.
HKCR\CrossriderApp0002258.FBApi.1 (PUP.CrossFire.Gen) -> Quarantined and deleted successfully.
HKCR\CrossriderApp0002258.Sandbox (PUP.CrossFire.Gen) -> Quarantined and deleted successfully.
HKCR\CrossriderApp0002258.Sandbox.1 (PUP.CrossFire.Gen) -> Quarantined and deleted successfully.
HKCR\pofile (Rogue.FixTool) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Fun Web Products (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\MyWebSearch (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\Software\hblitesa (Adware.HotBar) -> Quarantined and deleted successfully.
HKCU\Software\Cr_Installer\2258 (Adware.GamePlayLab) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\CROSSRIDER (Adware.GamePlayLab) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\I WANT THIS (Adware.GamePlayLab) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\I WANT THIS (PUP.GamesPlayLab) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\FocusInteractive (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Fun Web Products (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\MyWebSearch (PUP.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\VooMuu (Adware.HotBar.VM) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Google\Chrome\Extensions\kincjchfokkeneeofpeefomkikfkiedl (PUP.FCTPlugin) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Google\Chrome\Extensions\mpfapcdfbbledbojijcbcclmlieaoogk (PUP.GamesPlayLab) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Google\chrome\Extensions\fdloijijlkoblmigdofommgnheckmaki (PUP.Funmoods) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\mpfapcdfbbledbojijcbcclmlieaoogk (PUP.GamesPlayLab) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{11111111-1111-1111-1111-110011221158} (PUP.GamePlayLab) -> Quarantined and deleted successfully.
HKCR\CLSID\{11111111-1111-1111-1111-110011221158} (PUP.GamePlayLab) -> Quarantined and deleted successfully.
HKCR\TypeLib\{44444444-4444-4444-4444-440044224458} (PUP.GamePlayLab) -> Quarantined and deleted successfully.
HKCR\Interface\{55555555-5555-5555-5555-550055225558} (PUP.GamePlayLab) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{11111111-1111-1111-1111-110011221158} (PUP.GamePlayLab) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{11111111-1111-1111-1111-110011221158} (PUP.GamePlayLab) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{11111111-1111-1111-1111-110011221158} (PUP.GamePlayLab) -> Quarantined and deleted successfully.

Registry Values Detected: 9
HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar|{5018CFD2-804D-4C99-9F81-25EAEA2769DE} (PUP.Funmoods) -> Data: Softonic Toolbar -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar|{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} (PUP.Funmoods) -> Data: Funmoods Toolbar -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} (PUP.Funmoods) -> Data: -> Quarantined and deleted successfully.
HKCU\Software\Crossrider|215AppVerifier (Adware.GamePlayLab) -> Data: 7687c4f72016e6196e82d1840a03c1db -> Quarantined and deleted successfully.
HKCU\Software\I Want This|BundledFirefox (Adware.GamePlayLab) -> Data: 1 -> Quarantined and deleted successfully.
HKCU\Software\I Want This|HelperRunningVersion (PUP.GamesPlayLab) -> Data: 147 -> Quarantined and deleted successfully.
HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings|ProxyServer (PUM.Bad.Proxy) -> Data: http=127.0.0.1:5555 -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\I Want This|Publisher (Adware.GamePlayLab) -> Data: 215 Apps -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\funmoods|UninstallString (PUP.Funmoods) -> Data: "C:\Program Files\Funmoods\funmoods\1.5.11.16\uninstall.exe" -> Quarantined and deleted successfully.

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 75
C:\Program Files\Object (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\chromeaddon (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\content (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\defaults (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\defaults\preferences (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\locale (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\locale\en-US (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\skin (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\I Want This (Adware.GamePlayLab) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\2ACA5CC3-0F83-453D-A079-1076FE1A8B65 (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\ClickPotatoLiteSA (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\ClickPotatoLite (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\Logs (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\PCOBackups (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410 (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020 (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\Results (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2 (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\db (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\dwld (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\report (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\res1 (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin\10.0.519.0 (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin\10.0.519.0\firefox (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin\10.0.519.0\firefox\extensions (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin\10.0.530.0 (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin\10.0.530.0\firefox (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin\10.0.530.0\firefox\extensions (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin\10.0.530.0\firefox\extensions\plugins (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin\10.0.536.0 (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin\10.0.536.0\firefox (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin\10.0.536.0\firefox\extensions (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin\10.0.536.0\firefox\extensions\plugins (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\Error Fix (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Program Files\Error Fix\PW (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\ScreenSaver (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\ScreenSaver\Images (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\Shared (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\History (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\Perfect Optimizer (PUP.PerfectOptimizer) -> Quarantined and deleted successfully.
C:\Program Files\Perfect Optimizer\Backup (PUP.PerfectOptimizer) -> Quarantined and deleted successfully.
C:\Program Files\Perfect Optimizer\Backup\Application (PUP.PerfectOptimizer) -> Quarantined and deleted successfully.
C:\Program Files\Perfect Optimizer\Backup\Registry (PUP.PerfectOptimizer) -> Quarantined and deleted successfully.
C:\Program Files\Perfect Optimizer\Backup\Registry\FirstBackup (PUP.PerfectOptimizer) -> Quarantined and deleted successfully.
C:\Program Files\Perfect Optimizer\Backup\Registry\FullBackup (PUP.PerfectOptimizer) -> Quarantined and deleted successfully.
C:\Program Files\Perfect Optimizer\Backup\Service (PUP.PerfectOptimizer) -> Quarantined and deleted successfully.
C:\Program Files\Perfect Optimizer\Temp (PUP.PerfectOptimizer) -> Quarantined and deleted successfully.
C:\Program Files\ShoppingReport2 (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Program Files\ShoppingReport2\Bin (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Program Files\ShoppingReport2\Bin\2.7.21 (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com (PUP.PlaySushi) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com\chrome (PUP.PlaySushi) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com\components (PUP.PlaySushi) -> Quarantined and deleted successfully.
C:\Program Files\VooMuu (Adware.HotBar.VM) -> Quarantined and deleted successfully.
C:\Program Files\VooMuu\bin (Adware.HotBar.VM) -> Quarantined and deleted successfully.
C:\Program Files\VooMuu\bin\1.0.36.0 (Adware.HotBar.VM) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\VooMuuSA (Adware.HotBar.VM) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C} (Adware.Zwangi) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C}\chrome (Adware.Zwangi) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C}\defaults (Adware.Zwangi) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C}\defaults\preferences (Adware.Zwangi) -> Quarantined and deleted successfully.
C:\Program Files\Funmoods\funmoods\1.5.11.16 (PUP.Funmoods) -> Quarantined and deleted successfully.
C:\Program Files\Funmoods\funmoods\1.5.11.16\bh (PUP.Funmoods) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Local Settings\Application Data\I Want This (Adware.GamePlayLab) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Local Settings\Application Data\I Want This\Chrome (Adware.GamePlayLab) -> Quarantined and deleted successfully.

Files Detected: 298
C:\Program Files\Funmoods\funmoods\1.5.11.16\bh\funmoods.dll (PUP.Funmoods) -> Quarantined and deleted successfully.
C:\Program Files\I Want This\I Want This.dll (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
C:\Program Files\AskSBar\bar\1.bin\ASKSBAR.DLL (Adware.AskSBAR) -> Quarantined and deleted successfully.
C:\Program Files\Object\bho_project.dll (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe (PUP.Funmoods) -> Quarantined and deleted successfully.
C:\Program Files\Funmoods\funmoods\1.5.11.16\funmoodsTlbr.dll (PUP.Funmoods) -> Quarantined and deleted successfully.
C:\Program Files\Softonic\Softonic\1.5.21.0\SoftonicTlbr.dll (PUP.Funmoods) -> Quarantined and deleted successfully.
C:\Program Files\Funmoods\funmoods\1.5.11.16\funmoodsApp.dll (PUP.Funmoods) -> Quarantined and deleted successfully.
C:\Program Files\Softonic\Softonic\1.5.21.0\SoftonicApp.dll (PUP.Funmoods) -> Quarantined and deleted successfully.
C:\Program Files\Funmoods\funmoods\1.5.11.16\funmoodsEng.dll (PUP.Funmoods) -> Quarantined and deleted successfully.
C:\Documents and Settings\Diegos girl♥1.23.11\Local Settings\Temporary Internet Files\Content.IE5\G9QVSXQF\Retrogamer[1].exe (PUP.FunWebProducts) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Local Settings\Temporary Internet Files\Content.IE5\RMNI0YMP\iWon[1].exe (PUP.FunWebProducts) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Local Settings\Temporary Internet Files\Content.IE5\VZYJ4ZU5\GamingWonderland[1].exe (PUP.FunWebProducts) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\My Documents\Downloads\Downloader.exe (PUP.BundleInstaller.VG) -> Quarantined and deleted successfully.
C:\Program Files\AskSBar\bar\1.bin\A2HIGHIN.EXE (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\AskSBar\bar\1.bin\A2PLUGIN.DLL (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\AskSBar\bar\1.bin\NPASKSBR.DLL (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\iWonEI\Installr\1.bin\jfEZSETP.dll (PUP.FunWebProducts) -> Quarantined and deleted successfully.
C:\Program Files\ShoppingReport2\Uninst.exe (Adware.HotBar.SS2) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\plugins\NPAskSBr.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\EpicPlay\epicRemoval.exe (Adware.Gamevance) -> Quarantined and deleted successfully.
C:\Program Files\Funmoods\funmoods\1.5.11.16\uninstall.exe (PUP.FunMoods) -> Quarantined and deleted successfully.
C:\Program Files\I Want This\I Want This.exe (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
C:\Program Files\I Want This\I Want ThisGui.exe (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
C:\Program Files\I Want This\Uninstall.exe (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
C:\RECYCLER\S-1-5-21-1606980848-115176313-839522115-1004\Dc13.exe (PUP.FunWebProducts) -> Quarantined and deleted successfully.
C:\RECYCLER\S-1-5-21-1606980848-115176313-839522115-1005\Dc10.exe (Affiliate.Downloader) -> Quarantined and deleted successfully.
C:\RECYCLER\S-1-5-21-1606980848-115176313-839522115-1005\Dc9.exe (Affiliate.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP946\A0245027.exe (PUP.Bundle.Installer.OI) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP946\A0245028.exe (PUP.BundleInstaller.OI) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP946\A0245029.exe (PUP.BundleInstaller.OI) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP946\A0245030.exe (PUP.BundleInstaller.OI) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP946\A0245035.exe (PUP.BundleOffers.IIQ) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{C5567080-B7A5-4BC8-8D2D-56B4C47823EB}\RP946\A0245038.exe (Adware.GameVance) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Local Settings\Temp\.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\Object\enable.txt (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\ChromeAddon.pem (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\config.ini (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme_uninstall.exe (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\chromeaddon\._included.js (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\chromeaddon\background.html (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\chromeaddon\included.js (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\chromeaddon\manifest.json (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\build.sh (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\chrome.manifest (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\config_build.sh (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\files (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\install.rdf (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\readme.txt (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\content\.DS_Store (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\content\firefoxOverlay.xul (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\content\installid.js (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\content\overlay.js (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\content\sudoku.js (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\defaults\.DS_Store (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\defaults\preferences\.DS_Store (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\defaults\preferences\._sudoku.js (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\defaults\preferences\sudoku.js (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\locale\.DS_Store (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\locale\en-US\.DS_Store (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\locale\en-US\sudoku.dtd (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\locale\en-US\sudoku.properties (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\Object\facetheme\skin\overlay.css (PUP.FCTPlugin) -> Quarantined and deleted successfully.
C:\Program Files\I Want This\I Want This.ini (Adware.GamePlayLab) -> Quarantined and deleted successfully.
C:\Program Files\I Want This\appAPIinternalWrapper.js (Adware.GamePlayLab) -> Quarantined and deleted successfully.
C:\Program Files\I Want This\fb.js (Adware.GamePlayLab) -> Quarantined and deleted successfully.
C:\Program Files\I Want This\I Want This.ico (Adware.GamePlayLab) -> Quarantined and deleted successfully.
C:\Program Files\I Want This\I Want ThisInstaller.log (Adware.GamePlayLab) -> Quarantined and deleted successfully.
C:\Program Files\I Want This\jquery.js (Adware.GamePlayLab) -> Quarantined and deleted successfully.
C:\Program Files\I Want This\json.js (Adware.GamePlayLab) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\ClickPotatoLiteSA\ClickPotatoLiteSA.dat (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\ClickPotatoLiteSA\ClickPotatoLiteSAAbout.mht (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\ClickPotatoLiteSA\ClickPotatoLiteSAau.dat (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\ClickPotatoLiteSA\ClickPotatoLiteSAEULA.mht (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\ClickPotatoLiteSA\ClickPotatoLiteSA_hpk.dat (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\ClickPotatoLiteSA\ClickPotatoLiteSA_kyf.dat (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\spy_ignore.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\Logs\2011-03-02 16-03-120.log (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\filelist.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-0.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-1.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-10.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-100.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-101.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-102.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-103.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-11.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-12.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-13.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-14.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-15.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-16.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-17.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-18.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-19.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-2.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-20.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-21.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-22.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-23.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-24.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-26.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-27.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-28.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-29.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-3.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-30.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-31.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-32.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-33.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-34.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-35.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-36.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-37.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-38.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-39.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-4.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-40.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-41.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-42.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-44.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-45.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-46.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-47.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-48.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-49.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-5.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-50.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-51.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-52.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-53.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-54.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-55.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-56.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-57.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-58.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-59.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-6.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-60.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-62.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-63.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-64.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-65.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-66.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-67.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-68.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-69.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-7.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-70.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-71.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-72.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-73.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-74.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-75.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-76.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-77.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-78.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-79.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-80.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-81.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-82.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-83.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-84.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-85.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-86.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-87.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-88.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-89.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-9.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-90.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-91.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-92.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-93.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-94.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-95.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-96.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-97.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-98.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-99.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-25.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-43.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-61.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-07-410\regb-8.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file26.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file9.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file0.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file1.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file10.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file11.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file12.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file13.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file14.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file15.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file16.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file17.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file18.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file19.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file2.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file20.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file21.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file22.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file23.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file24.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file25.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\filelist.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-0.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-1.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-10.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-11.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-12.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-13.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-14.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-15.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-16.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-2.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-3.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-4.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-5.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-6.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-7.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-8.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\regb-9.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file27.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file28.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file29.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file3.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file30.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file31.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file32.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file33.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file34.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file35.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file36.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file37.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file38.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file39.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file4.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file40.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file41.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file42.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file43.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file44.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file45.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file46.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file47.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file48.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file49.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file5.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file50.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file6.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file7.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\QuarantineW\2011-03-02 16-08-020\file8.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\Results\Evidence.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\Results\Junk.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\Results\Registry.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ron\Application Data\Error Fix\Results\Update.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\Config.xml (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\db\Aliases.dbs (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\db\Sites.dbs (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\dwld\WhiteList.xip (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\report\aggr_storage.xml (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\report\send_storage.xml (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\ShoppingReport2\cs\res1\WhiteList.dbs (Adware.ShoppingReport2) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin\10.0.519.0\firefox\extensions\install.rdf (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin\10.0.530.0\firefox\extensions\chrome.manifest (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin\10.0.530.0\firefox\extensions\install.rdf (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\ClickPotatoLite\bin\10.0.536.0\firefox\extensions\install.rdf (Adware.ClickPotato) -> Quarantined and deleted successfully.
C:\Program Files\Error Fix\PW\general.html (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Program Files\Error Fix\PW\optimizations.html (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Program Files\Error Fix\PW\privacy.html (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Program Files\Error Fix\PW\scheduler.html (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Program Files\Error Fix\PW\startup.html (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Program Files\Error Fix\PW\wizard.css (Rogue.ErrorFix) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\ScreenSaver\Images\025A7A21.urr (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\ScreenSaver\Images\025BC30C.urr (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\ScreenSaver\Images\025BEEB0.dat (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\ScreenSaver\Images\wrkparam.lst (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\History\search3 (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\s_FeatCk.dat (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\s_FeatCk.dat.bak (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\s_pid.dat (PUP.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\Perfect Optimizer\PerfectOptimizer.ini (PUP.PerfectOptimizer) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com\chrome.manifest (PUP.PlaySushi) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com\install.rdf (PUP.PlaySushi) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com\chrome\pstextlinks.jar (PUP.PlaySushi) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com\components\PlaySushiFF.dll (PUP.PlaySushi) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com\components\PlaySushiFF.xpt (PUP.PlaySushi) -> Quarantined and deleted successfully.
C:\Program Files\VooMuu\bin\1.0.36.0\copyright.txt (Adware.HotBar.VM) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\VooMuuSA\VooMuuSA.dat (Adware.HotBar.VM) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\VooMuuSA\VooMuuSAau.dat (Adware.HotBar.VM) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\VooMuuSA\VooMuuSA_kyf.dat (Adware.HotBar.VM) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C}\chrome.manifest (Adware.Zwangi) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C}\install.rdf (Adware.Zwangi) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C}\chrome\basicscan.jar (Adware.Zwangi) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\extensions\{6AA54174-C9E8-4B07-95A0-0FBC19CBE64C}\defaults\preferences\prefs.js (Adware.Zwangi) -> Quarantined and deleted successfully.
C:\Program Files\Funmoods\funmoods\1.5.11.16\funmoodsOEM.crx (PUP.Funmoods) -> Quarantined and deleted successfully.
C:\Documents and Settings\Vgirl\Local Settings\Application Data\I Want This\Chrome\I Want This.crx (Adware.GamePlayLab) -> Quarantined and deleted successfully.
C:\Program Files\I Want This\I Want This.dll (PUP.GamePlayLab) -> Quarantined and deleted successfully.

(end)

#12 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,735 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:05:05 PM

Posted 07 August 2012 - 03:54 PM

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download Farbar Service Scanner (FSS) and run it on the computer with the issue.
  • Make sure the following options are checked:
    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center/Action Center
    • Windows Update
    • Windows Defender
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.

====================================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Devices (do NOT change any settings here)
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download aswMBR to your desktop.
Double click the aswMBR.exe to run it.
If you see this question: Would you like to download latest Avast! virus definitions?" say "Yes".
Click the "Scan" button to start scan.
On completion of the scan click "Save log", save it to your desktop and post in your next reply.

NOTE. aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#13 Ktanaqui

Ktanaqui
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:07:05 PM

Posted 07 August 2012 - 04:04 PM

Security Check

Results of screen317's Security Check version 0.99.43
Windows XP Service Pack 3 x86
Internet Explorer 8
``````````````Antivirus/Firewall Check:``````````````
Windows Firewall Enabled!
McAfee Security Scan Plus
Microsoft Security Essentials
`````````Anti-malware/Other Utilities Check:`````````
Malwarebytes Anti-Malware version 1.62.0.1300
TuneUp Companion 2.4.4.3
JavaFX 2.1.1
Java™ 6 Update 32
Java™ 7 Update 5
Adobe Flash Player 11.2.202.233
Adobe Reader 9 Adobe Reader out of Date!
Mozilla Firefox (3.6.28) Firefox out of Date!
Google Chrome 20.0.1132.57
Google Chrome 21.0.1180.60
Google Chrome VisualElementsManifest.xml..
````````Process Check: objlist.exe by Laurent````````
Norton ccSvcHst.exe
Microsoft Security Essentials MSMpEng.exe
Microsoft Security Essentials msseces.exe
`````````````````System Health check`````````````````
Total Fragmentation on Drive C:: 3%
````````````````````End of Log``````````````````````

#14 Ktanaqui

Ktanaqui
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:07:05 PM

Posted 07 August 2012 - 04:07 PM

Farbar Service Scanner

Farbar Service Scanner Version: 06-08-2012
Ran by Vgirl (administrator) on 07-08-2012 at 16:06:54
Running from "C:\Documents and Settings\Vgirl\My Documents\Downloads"
Microsoft Windows XP Home Edition Service Pack 3 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============

Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Google.com is accessible.
Yahoo IP is accessible.
Yahoo.com is accessible.


Windows Firewall:
=============

Firewall Disabled Policy:
==================


System Restore:
============

System Restore Disabled Policy:
========================


Security Center:
============

Windows Update:
============

Windows Autoupdate Disabled Policy:
============================


File Check:
========
C:\WINDOWS\system32\dhcpcsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\netbt.sys
[2003-03-31 07:00] - [2008-04-13 14:21] - 0162816 ____A () C464595038F6FAAF79E18CCE391C3278

ATTENTION!=====> C:\WINDOWS\system32\Drivers\netbt.sys IS INFECTED AND SHOULD BE REPLACED.

C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit
C:\WINDOWS\system32\dnsrslvr.dll => MD5 is legit
C:\WINDOWS\system32\ipnathlp.dll => MD5 is legit
C:\WINDOWS\system32\netman.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\srsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\sr.sys => MD5 is legit
C:\WINDOWS\system32\wscsvc.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\wuauserv.dll => MD5 is legit
C:\WINDOWS\system32\qmgr.dll => MD5 is legit
C:\WINDOWS\system32\es.dll => MD5 is legit
C:\WINDOWS\system32\cryptsvc.dll => MD5 is legit
C:\WINDOWS\system32\svchost.exe => MD5 is legit
C:\WINDOWS\system32\rpcss.dll => MD5 is legit
C:\WINDOWS\system32\services.exe => MD5 is legit

Extra List:
=======
Gpc(3) IPSec(5) NetBT(6) NwlnkIpx(8) NwlnkNb(9) PSched(7) Tcpip(4) Tcpip6(13)
0x0D0000000500000001000000020000000300000004000000060000000700000008000000090000000A0000000B0000000C0000000D000000
IpSec Tag value is correct.

**** End of log ****

#15 Ktanaqui

Ktanaqui
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:07:05 PM

Posted 07 August 2012 - 04:11 PM

Mini Toolbox



MiniToolBox by Farbar Version: 23-07-2012
Ran by Vgirl (administrator) on 07-08-2012 at 16:09:04
Microsoft Windows XP Home Edition Service Pack 3 (X86)
Boot Mode: Normal
***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

Hosts file not detected in the default directory
========================= IP Configuration: ================================

Belkin USB Wireless Adaptor = Wireless Network Connection 13 (Connected)
NVIDIA nForce 10/100/1000 Mbps Ethernet = Local Area Connection 3 (Media disconnected)


# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Local Area Connection 3"

set address name="Local Area Connection 3" source=dhcp
set dns name="Local Area Connection 3" source=dhcp register=PRIMARY
set wins name="Local Area Connection 3" source=dhcp

# Interface IP Configuration for "Wireless Network Connection 13"

set address name="Wireless Network Connection 13" source=dhcp
set dns name="Wireless Network Connection 13" source=dhcp register=PRIMARY
set wins name="Wireless Network Connection 13" source=dhcp


popd
# End of interface IP configuration




Windows IP Configuration



Host Name . . . . . . . . . . . . : ron-asqj5avl6ot

Primary Dns Suffix . . . . . . . :

Node Type . . . . . . . . . . . . : Unknown

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No

DNS Suffix Search List. . . . . . : Belkin



Ethernet adapter Local Area Connection 3:



Media State . . . . . . . . . . . : Media disconnected

Description . . . . . . . . . . . : NVIDIA nForce 10/100/1000 Mbps Ethernet

Physical Address. . . . . . . . . : 00-1D-72-AA-7A-DC



Ethernet adapter Wireless Network Connection 13:



Connection-specific DNS Suffix . : Belkin

Description . . . . . . . . . . . : Belkin USB Wireless Adaptor

Physical Address. . . . . . . . . : 08-86-3B-8F-49-88

Dhcp Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

IP Address. . . . . . . . . . . . : 192.168.2.2

Subnet Mask . . . . . . . . . . . : 255.255.255.0

IP Address. . . . . . . . . . . . : fe80::a86:3bff:fe8f:4988%6

Default Gateway . . . . . . . . . : 192.168.2.1

DHCP Server . . . . . . . . . . . : 192.168.2.1

DNS Servers . . . . . . . . . . . : 192.168.2.1

fec0:0:0:ffff::1%1

fec0:0:0:ffff::2%1

fec0:0:0:ffff::3%1

Lease Obtained. . . . . . . . . . : Sunday, August 05, 2012 12:33:01 PM

Lease Expires . . . . . . . . . . : Monday, January 18, 2038 10:14:07 PM



Tunnel adapter Teredo Tunneling Pseudo-Interface:



Connection-specific DNS Suffix . :

Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface

Physical Address. . . . . . . . . : FF-FF-FF-FF-FF-FF-FF-FF

Dhcp Enabled. . . . . . . . . . . : No

IP Address. . . . . . . . . . . . : fe80::ffff:ffff:fffd%4

Default Gateway . . . . . . . . . :

NetBIOS over Tcpip. . . . . . . . : Disabled



Tunnel adapter Automatic Tunneling Pseudo-Interface:



Connection-specific DNS Suffix . : Belkin

Description . . . . . . . . . . . : Automatic Tunneling Pseudo-Interface

Physical Address. . . . . . . . . : C0-A8-02-02

Dhcp Enabled. . . . . . . . . . . : No

IP Address. . . . . . . . . . . . : fe80::5efe:192.168.2.2%2

Default Gateway . . . . . . . . . :

DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1

fec0:0:0:ffff::2%1

fec0:0:0:ffff::3%1

NetBIOS over Tcpip. . . . . . . . : Disabled

Server: UnKnown
Address: 192.168.2.1

Name: google.com
Addresses: 74.125.227.98, 74.125.227.99, 74.125.227.100, 74.125.227.101
74.125.227.102, 74.125.227.103, 74.125.227.104, 74.125.227.105, 74.125.227.110
74.125.227.96, 74.125.227.97



Pinging google.com [74.125.227.96] with 32 bytes of data:



Reply from 74.125.227.96: bytes=32 time=33ms TTL=52

Reply from 74.125.227.96: bytes=32 time=44ms TTL=52



Ping statistics for 74.125.227.96:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 33ms, Maximum = 44ms, Average = 38ms

Server: UnKnown
Address: 192.168.2.1

Name: yahoo.com
Addresses: 209.191.122.70, 72.30.38.140, 98.139.183.24



Pinging yahoo.com [209.191.122.70] with 32 bytes of data:



Reply from 209.191.122.70: bytes=32 time=35ms TTL=51

Reply from 209.191.122.70: bytes=32 time=32ms TTL=51



Ping statistics for 209.191.122.70:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 32ms, Maximum = 35ms, Average = 33ms

Server: UnKnown
Address: 192.168.2.1

DNS request timed out.
timeout was 2 seconds.
Name: bleepingcomputer.com
Address: 208.43.87.2



Pinging bleepingcomputer.com [208.43.87.2] with 32 bytes of data:



Request timed out.

Request timed out.



Ping statistics for 208.43.87.2:

Packets: Sent = 2, Received = 0, Lost = 2 (100% loss),



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=64

Reply from 127.0.0.1: bytes=32 time<1ms TTL=64



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 1d 72 aa 7a dc ...... NVIDIA nForce Networking Controller - Packet Scheduler Miniport
0x10004 ...08 86 3b 8f 49 88 ...... Belkin USB Wireless Adaptor - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.2.1 192.168.2.2 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.2.2 192.168.2.2 20
192.168.2.0 255.255.255.0 192.168.2.2 192.168.2.2 20
192.168.2.2 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.2.255 255.255.255.255 192.168.2.2 192.168.2.2 20
224.0.0.0 240.0.0.0 192.168.2.2 192.168.2.2 20
255.255.255.255 255.255.255.255 192.168.2.2 2 1
255.255.255.255 255.255.255.255 192.168.2.2 192.168.2.2 1
Default Gateway: 192.168.2.1
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 C:\Windows\System32\nwprovau.dll [142336] (Microsoft Corporation)
Catalog5 02 C:\Windows\System32\mswsock.dll [245248] (Microsoft Corporation)
Catalog5 03 C:\Windows\System32\winrnr.dll [16896] (Microsoft Corporation)
Catalog5 04 C:\Windows\System32\mswsock.dll [245248] (Microsoft Corporation)
Catalog5 05 C:\Program Files\Bonjour\mdnsNSP.dll [121704] (Apple Inc.)
Catalog9 01 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 02 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 03 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 04 C:\Windows\system32\rsvpsp.dll [92672] (Microsoft Corporation)
Catalog9 05 C:\Windows\system32\rsvpsp.dll [92672] (Microsoft Corporation)
Catalog9 06 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 07 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 08 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 09 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 10 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 11 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 12 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 13 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 14 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 15 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 16 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 17 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 18 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 19 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 20 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 21 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 22 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 23 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 24 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 25 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 26 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 27 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 28 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 29 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 30 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 31 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 32 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 33 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 34 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 35 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 36 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 37 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 38 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 39 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (08/06/2012 10:46:09 PM) (Source: crypt32) (User: )
Description: Failed auto update retrieval of third-party root list sequence number from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt> with error: This network connection does not exist.

Error: (08/06/2012 10:46:09 PM) (Source: crypt32) (User: )
Description: Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab> with error: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

Error: (08/06/2012 10:46:09 PM) (Source: crypt32) (User: )
Description: Failed auto update retrieval of third-party root list sequence number from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt> with error: A connection with the server could not be established

Error: (08/06/2012 10:46:08 PM) (Source: crypt32) (User: )
Description: Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab> with error: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

Error: (08/06/2012 10:46:08 PM) (Source: crypt32) (User: )
Description: Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab> with error: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

Error: (08/06/2012 09:01:00 PM) (Source: crypt32) (User: )
Description: Failed auto update retrieval of third-party root list sequence number from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt> with error: The specified server cannot perform the requested operation.

Error: (08/06/2012 09:01:00 PM) (Source: crypt32) (User: )
Description: Failed auto update retrieval of third-party root list sequence number from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt> with error: The specified server cannot perform the requested operation.

Error: (08/06/2012 09:01:00 PM) (Source: crypt32) (User: )
Description: Failed auto update retrieval of third-party root list sequence number from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt> with error: The specified server cannot perform the requested operation.

Error: (08/06/2012 09:01:00 PM) (Source: crypt32) (User: )
Description: Failed auto update retrieval of third-party root list sequence number from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt> with error: The specified server cannot perform the requested operation.

Error: (08/06/2012 09:01:00 PM) (Source: crypt32) (User: )
Description: Failed auto update retrieval of third-party root list sequence number from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt> with error: The specified server cannot perform the requested operation.


System errors:
=============
Error: (08/04/2012 06:12:08 AM) (Source: Microsoft Antimalware) (User: )
Description: %60 has encountered an error trying to load signatures and will attempt reverting back to a known-good set of signatures.

Signatures Attempted: %24

Error Code: 0x80070003

Error description: The system cannot find the path specified.

Signature version: 1.131.1184.0;1.131.1184.0

Engine version: %600

Error: (08/03/2012 00:05:37 PM) (Source: Microsoft Antimalware) (User: )
Description: %60 has encountered an error trying to load signatures and will attempt reverting back to a known-good set of signatures.

Signatures Attempted: %24

Error Code: 0x80070003

Error description: The system cannot find the path specified.

Signature version: 1.131.1184.0;1.131.1184.0

Engine version: %600

Error: (08/01/2012 00:32:16 PM) (Source: Dhcp) (User: )
Description: The IP address lease 192.168.2.2 for the Network Card with network address 08863B8F4988 has been
denied by the DHCP server 0.0.0.0 (The DHCP Server sent a DHCPNACK message).

Error: (08/01/2012 00:32:10 PM) (Source: Microsoft Antimalware) (User: )
Description: %60 has encountered an error trying to load signatures and will attempt reverting back to a known-good set of signatures.

Signatures Attempted: %24

Error Code: 0x80070003

Error description: The system cannot find the path specified.

Signature version: 1.131.901.0;1.131.901.0

Engine version: %600

Error: (07/28/2012 01:49:31 PM) (Source: 0) (User: )
Description: \Device\Harddisk1\D

Error: (07/26/2012 10:51:02 PM) (Source: Dhcp) (User: )
Description: The IP address lease 192.168.2.2 for the Network Card with network address 08863B8F4988 has been
denied by the DHCP server 0.0.0.0 (The DHCP Server sent a DHCPNACK message).

Error: (07/26/2012 10:40:15 PM) (Source: 0) (User: )
Description: \Device\Harddisk1\D

Error: (07/26/2012 06:33:34 PM) (Source: Service Control Manager) (User: )
Description: The Yahoo! Updater service hung on starting.

Error: (07/25/2012 00:09:17 AM) (Source: Service Control Manager) (User: )
Description: The Yahoo! Updater service hung on starting.

Error: (07/24/2012 06:57:20 PM) (Source: Service Control Manager) (User: )
Description: The Yahoo! Updater service hung on starting.


Microsoft Office Sessions:
=========================
Error: (08/06/2012 10:46:09 PM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txtThis network connection does not exist.

Error: (08/06/2012 10:46:09 PM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabA required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

Error: (08/06/2012 10:46:09 PM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txtA connection with the server could not be established

Error: (08/06/2012 10:46:08 PM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabA required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

Error: (08/06/2012 10:46:08 PM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabA required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

Error: (08/06/2012 09:01:00 PM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txtThe specified server cannot perform the requested operation.

Error: (08/06/2012 09:01:00 PM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txtThe specified server cannot perform the requested operation.

Error: (08/06/2012 09:01:00 PM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txtThe specified server cannot perform the requested operation.

Error: (08/06/2012 09:01:00 PM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txtThe specified server cannot perform the requested operation.

Error: (08/06/2012 09:01:00 PM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txtThe specified server cannot perform the requested operation.


=========================== Installed Programs ============================

24x7 Help (Version: 1.0.0.20)
Adobe AIR (Version: 3.1.0.4880)
Adobe Download Manager (Version: 1.6.2.99)
Adobe Flash Player 11 ActiveX (Version: 11.2.202.228)
Adobe Flash Player 11 Plugin (Version: 11.2.202.233)
Adobe Reader 9.5.1 (Version: 9.5.1)
Adobe Shockwave Player 11.6 (Version: 11.6.1.629)
Agere Systems PCI-SV92EX Soft Modem
AppGraffiti (Version: 1.0.0.30)
Apple Application Support (Version: 2.1.6)
Apple Mobile Device Support (Version: 4.0.0.97)
Apple Software Update (Version: 2.1.3.127)
Ask Toolbar (Version: 1.14.1.0)
Ask Toolbar Updater (Version: 1.2.0.20007)
AviSynth 2.5
AVS Audio Editor version 6.1
AVS Update Manager 1.0
AVS4YOU Software Navigator 1.4
BearShare (Version: 10.0.0.119267)
Belkin Setup and Router Monitor
Bonjour (Version: 3.0.0.10)
Bonzuna (Version: 1.0.1)
Compatibility Pack for the 2007 Office system (Version: 12.0.6612.1000)
Contraptions Demo
DealRunner 1.27 (Version: 1.26)
Default Tab (Version: 0.9.15)
Digeus System Optimizer (Version: 8.2)
DivX Setup (Version: 2.5.0.8)
DriverFinder (Version: 2.1.0)
EA Download Manager (Version: 5.0.0.255)
eToolKit
Facebook Video Calling 1.2.0.159 (Version: 1.2.159)
Fliptoast (Version: 1.0.0)
Freecorder (Version: 4.1)
FrostWire 4.13.5 (Version: 4.13.5.0)
FrostWire 5.2.9 (Version: 5.2.9.0)
Google Chrome (Version: 21.0.1180.60)
Google Talk (remove only)
Google Update Helper (Version: 1.3.21.115)
Hoyle Casino 5
Hoyle Word Games Demo
iMesh (Version: 11.0.0.124124)
IMinent Toolbar (Version: 3.26.0)
IMVU Avatar Chat Software
IMVU Inc Toolbar (Version: 6.8.9.0)
Inbox Toolbar (Version: 1.0.0.135)
Itibiti RTC (Version: 0.0.1)
iTunes (Version: 10.5.3.3)
Java Auto Updater (Version: 2.1.6.0)
Java™ 6 Update 32 (Version: 6.0.320)
Java™ 7 Update 5 (Version: 7.0.50)
JavaFX 2.1.1 (Version: 2.1.1)
jZip
Knctr
Linkury Smartbar (Version: 1.6.0.11)
Malwarebytes Anti-Malware version 1.62.0.1300 (Version: 1.62.0.1300)
McAfee Security Scan Plus (Version: 2.1.121.2)
Microsoft .NET Framework 2.0 Service Pack 2 (Version: 2.2.30729)
Microsoft .NET Framework 3.0 Service Pack 2 (Version: 3.2.30729)
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1 (Version: 3.5.30729)
Microsoft Application Error Reporting (Version: 12.0.6012.5000)
Microsoft Choice Guard (Version: 2.0.48.0)
Microsoft Compression Client Pack 1.0 for Windows XP (Version: 1)
Microsoft Internationalized Domain Names Mitigation APIs
Microsoft Kernel-Mode Driver Framework Feature Pack 1.5
Microsoft National Language Support Downlevel APIs
Microsoft Security Client (Version: 4.0.1526.0)
Microsoft Security Essentials (Version: 4.0.1526.0)
Microsoft Silverlight (Version: 4.1.10329.0)
Microsoft User-Mode Driver Framework Feature Pack 1.0
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.56336)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.61001)
Microsoft Visual C++ 2008 Redistributable - KB2467174 - x86 9.0.30729.5570 (Version: 9.0.30729.5570)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (Version: 9.0.30729)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (Version: 9.0.30729.4148)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (Version: 9.0.30729.6161)
Microsoft Visual C++ 2010 x86 Redistributable - 10.0.30319 (Version: 10.0.30319)
Microsoft WSE 3.0 Runtime (Version: 3.0.5305.0)
Moozy v 2.7
Mozilla Firefox (3.6.28) (Version: 3.6.28 (en-US))
MSVCRT (Version: 14.0.1468.721)
Music Oasis (Version: 1.0.0)
My.Freeze.com NetAssistant (Version: 3.6.3)
Norton Safe Web Lite (Version: 2.0.0.16)
Norton Security Scan (Version: 3.5.1.6)
NVIDIA Drivers
ooVoo (Version: 3.0.7008)
Pando Media Booster (Version: 2.3.3.9)
PC Confidential 2008 (Version: 2008)
PC Power Speed 1.0.0.26 (Version: 1.0.0.26)
PriceGong 2.5.3 (Version: 2.5.3)
PricePeep for Google Chrome (Version: 2.1.15.0)
QuickTime (Version: 7.71.80.42)
RAF (Version: 1.00.0001)
Realtek High Definition Audio Driver (Version: 5.10.0.5628)
RebateInformer (Version: 1.0.0.83)
Registry Mechanic 10.0 (Version: 10.0)
Roblox for Vgirl
Search Toolbar (Version: 1.2)
Segoe UI (Version: 14.0.4327.805)
Shop To Win (Version: 1.1.0.0)
SiteRanker (Version: 1.0.0.29)
Skype web features (Version: 1.0.3971)
Skype™ 5.8 (Version: 5.8.154)
Social Extras
Softonic toolbar on IE and Chrome
StartNow Toolbar (Version: 2.4.0)
swMSM (Version: 12.0.0.1)
The Sims™ 2 Double Deluxe
The Sims™ 3 (Version: 1.33.2)
TuneUp Companion 2.4.4.3 (Version: 2.4.4.3)
Uniblue DriverScanner (Version: 4.0.3.4)
Unity Web Player (Version: )
Update for Microsoft .NET Framework 3.5 SP1 (KB963707) (Version: 1)
Update for Windows Internet Explorer 7 (KB980182) (Version: 1)
Update for Windows Internet Explorer 8 (KB2447568) (Version: 1)
Update for Windows Internet Explorer 8 (KB976662) (Version: 1)
Update for Windows XP (KB2141007) (Version: 1)
Update for Windows XP (KB2345886) (Version: 1)
Update for Windows XP (KB2467659) (Version: 1)
Update for Windows XP (KB2541763) (Version: 1)
Update for Windows XP (KB2607712) (Version: 1)
Update for Windows XP (KB2616676) (Version: 1)
Update for Windows XP (KB2641690) (Version: 1)
Update for Windows XP (KB2718704) (Version: 1)
Update for Windows XP (KB951978) (Version: 1)
Update for Windows XP (KB955759) (Version: 1)
Update for Windows XP (KB961503) (Version: 1)
Update for Windows XP (KB967715) (Version: 1)
Update for Windows XP (KB968389) (Version: 1)
Update for Windows XP (KB971737) (Version: 1)
Update for Windows XP (KB973687) (Version: 1)
Update for Windows XP (KB973815) (Version: 1)
Update for Windows XP (KB978207) (Version: 1)
VC80CRTRedist - 8.0.50727.4053 (Version: 1.1.0)
Veetle TV (Version: 0.9.19)
vShare Plugin
WeatherBug (Version: 7.0.0.3)
WebFldrs XP (Version: 9.50.6513)
Wincore MediaBar (Version: 3.0.0.122080)
Windows Genuine Advantage Validation Tool (KB892130)
Windows Genuine Advantage Validation Tool (KB892130) (Version: 1.7.0069.2)
Windows Internet Explorer 7 (Version: 20070813.185237)
Windows Internet Explorer 8 (Version: 20090308.140743)
Windows Live Call (Version: 14.0.8064.0206)
Windows Live Communications Platform (Version: 14.0.8098.930)
Windows Live Essentials (Version: 14.0.8089.0726)
Windows Live Essentials (Version: 14.0.8089.726)
Windows Live ID Sign-in Assistant (Version: 6.500.3165.0)
Windows Live Messenger (Version: 14.0.8089.0726)
Windows Media Format 11 runtime
Windows Media Player 11
Windows PowerShell™ 1.0 (Version: 2)
Windows XP Service Pack 3 (Version: 20080414.031525)
WModem Driver Installer (Version: 2.0.6.7)
Xvid 1.2.2 final uninstall (Version: 1.2)
Yahoo! BrowserPlus 2.9.8
Yahoo! Messenger
Yahoo! Search Protection
Yahoo! Software Update
Yahoo! Toolbar
Yontoo Layers Runtime (Drop Down Deals) 1.10.01 (Version: 1.10.01)

========================= Devices: ================================

Name: SM Bus Controller
Description: SM Bus Controller
Class Guid:
Manufacturer:
Service:
Problem: : This device is disabled. (Code 22)
Resolution: In Device Manager, click "Action", and then click "Enable Device". This starts the Enable Device wizard. Follow the instructions.

Name: Video Controller (VGA Compatible)
Description: Video Controller (VGA Compatible)
Class Guid:
Manufacturer:
Service:
Problem: : The drivers for this device are not installed. (Code 28)
Resolution: To install the drivers for this device, click "Update Driver", which starts the Hardware Update wizard.

Name: Microsoft Tun Miniport Adapter #2
Description: Microsoft Tun Miniport Adapter
Class Guid: {4D36E972-E325-11CE-BFC1-08002BE10318}
Manufacturer: Microsoft
Service: tunmp
Problem: : This device cannot start. (Code10)
Resolution: Device failed to start. Click "Update Driver" to update the drivers for this device.
On the "General Properties" tab of the device, click "Troubleshoot" to start the troubleshooting wizard.


========================= Memory info: ===================================

Percentage of memory in use: 73%
Total physical RAM: 894.42 MB
Available physical RAM: 232.76 MB
Total Pagefile: 2166.89 MB
Available Pagefile: 952.94 MB
Total Virtual: 2047.88 MB
Available Virtual: 1971.12 MB

========================= Partitions: =====================================

1 Drive c: () (Fixed) (Total:69.3 GB) (Free:24.06 GB) NTFS
2 Drive e: (DATA) (Fixed) (Total:69.99 GB) (Free:57.81 GB) NTFS

========================= Users: ========================================

User accounts for \\RON-ASQJ5AVL6OT

Administrator Guest HelpAssistant
SUPPORT_388945a0 Veronica15 Vgirl


**** End of log ****




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users