Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with tencentdl Malware


  • Please log in to reply
24 replies to this topic

#1 Centuck

Centuck

  • Members
  • 68 posts
  • OFFLINE
  •  
  • Local time:09:12 AM

Posted 03 February 2016 - 12:36 AM

Hi There,

 

I am currently infected with tencentdl Malware.  I have tried running Malwarebytes and it has removed files/keys in the hundreds but it doesn't seem to stop the spread of this thing.  I am in need of some more expert help.  I believe Malwarebytes got rid of some of it, but there still seems to be a bunch of Asian stuff popping up and it's very tough to do anything in an internet browser right now (thank god for Ad-block)

 

Computer: Windows 8.1

 

I will wait for a reply and thanks in advance for the help!

 

Regards,

Centuck



BC AdBot (Login to Remove)

 


#2 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,670 posts
  • ONLINE
  •  
  • Gender:Male
  • Local time:12:12 PM

Posted 03 February 2016 - 10:06 AM

Hi Centuck :)

My name is Aura and I'll be assisting you with your issue. Follow the instructions below please.

3Al62Pm.pngMiniToolBox
  • Download MiniToolBox and move the file to your Desktop;
  • Right-click on MiniToolBox.exe and select Spcusrh.pngRun as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users);
  • Check the following options:
    • Flush DNS;
    • Report IE Proxy Settings;
    • Reset IE Proxy Settings;
    • Report FF Proxy Settings;
    • Reset FF Proxy Settings;
    • List content of Hosts;
    • List IP Configuration;
    • List Winsock Entries;
    • List Last 10 Event Viewer Errors;
    • List Installed Programs;
    • List Devices - Only Problems;
    • List Users, Partitions and Memory size;
      OQmAcqS.png
  • Once this is done, click on Go and wait for the scan to complete;
  • Once the scan is complete, a log will open. Please copy/paste the content of the output log in your next reply;
Since you already ran Malwarebytes, I would like to see your previous Scan log. Open Malwarebytes and go under the History tab. From there, click on Application logs in the left pane.
ySPxAut.png
Click on the most recent (usually at the top) Scan log to open it. From there, click on the Export button and select the first option, Copy to Clipboard
gK0lXt3.png
Paste the content of your clipboard in your next reply.

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


#3 Centuck

Centuck
  • Topic Starter

  • Members
  • 68 posts
  • OFFLINE
  •  
  • Local time:09:12 AM

Posted 03 February 2016 - 06:35 PM

Thank you for the quick reply.  I ran Malwarebytes 3 times and it found stuff all 3 times.  1st time I didn't have scan for rootkits enabled.  

 

Here are the logs you requested:

 

MiniToolBox by Farbar  Version: 03-02-2016 01
Ran by Centuck (administrator) on 03-02-2016 at 17:19:41
Running from "C:\Users\Centuck\Desktop"
Microsoft Windows 8.1  (X64)
Model: GT70 Manufacturer: Micro-Star International Co., Ltd.
Boot Mode: Normal
***************************************************************************
 
========================= Flush DNS: ===================================
 
Windows IP Configuration
 
Successfully flushed the DNS Resolver Cache.
 
========================= IE Proxy Settings: ============================== 
 
Proxy is not enabled.
No Proxy Server is set.
 
"Reset IE Proxy Settings": IE Proxy Settings were reset.
========================= Hosts content: =================================
127.0.0.1       down.baidu2016.com
127.0.0.1       123.sogou.com
127.0.0.1       www.czzsyzgm.com
127.0.0.1       www.czzsyzxl.com
========================= IP Configuration: ================================
 
Killer e2200 Gigabit Ethernet Controller (NDIS 6.30) = Ethernet (Connected)
Intel® Centrino® Wireless-N 2230 = Wi-Fi (Media disconnected)
Bluetooth Device (Personal Area Network) = Bluetooth Network Connection (Media disconnected)
 
 
# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4
 
reset
set global icmpredirects=enabled taskoffload=disabled
set interface interface="Ethernet-WFP Native MAC Layer LightWeight Filter-0000" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="Ethernet" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="Wi-Fi" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="Bluetooth Network Connection" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="Local Area Connection* 12" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="ethernet_3" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
 
 
popd
# End of IPv4 configuration
 
 
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : Travis-LT
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : Home
 
Wireless LAN adapter Local Area Connection* 12:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
   Physical Address. . . . . . . . . : 60-36-DD-5F-13-07
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Ethernet adapter Bluetooth Network Connection:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)
   Physical Address. . . . . . . . . : 60-36-DD-5F-13-0A
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter Wi-Fi:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : Home
   Description . . . . . . . . . . . : Intel® Centrino® Wireless-N 2230
   Physical Address. . . . . . . . . : 60-36-DD-5F-13-06
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Ethernet adapter Ethernet:
 
   Connection-specific DNS Suffix  . : Home
   Description . . . . . . . . . . . : Killer e2200 Gigabit Ethernet Controller (NDIS 6.30)
   Physical Address. . . . . . . . . : 8C-89-A5-08-08-3C
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::21c5:80e1:92e3:c9a9%2(Preferred) 
   IPv4 Address. . . . . . . . . . . : 172.16.1.71(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : February 3, 2016 5:12:00 PM
   Lease Expires . . . . . . . . . . : February 4, 2016 5:12:00 PM
   Default Gateway . . . . . . . . . : 172.16.1.254
   DHCP Server . . . . . . . . . . . : 172.16.1.254
   DHCPv6 IAID . . . . . . . . . . . : 478972325
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1D-72-B3-14-8C-89-A5-08-08-3C
   DNS Servers . . . . . . . . . . . : 172.16.1.254
                                       142.165.21.5
   NetBIOS over Tcpip. . . . . . . . : Enabled
DNS request timed out.
    timeout was 2 seconds.
Server:  UnKnown
Address:  172.16.1.254
 
Name:    google.com
Addresses:  2607:f8b0:400f:803::200e
 207.47.131.230
 207.47.131.238
 207.47.131.231
 207.47.131.216
 207.47.131.224
 207.47.131.210
 207.47.131.237
 207.47.131.244
 207.47.131.217
 207.47.131.223
 207.47.131.251
 207.47.131.245
 
 
Pinging google.com [207.47.131.237] with 32 bytes of data:
Reply from 207.47.131.237: bytes=32 time=1ms TTL=59
Reply from 207.47.131.237: bytes=32 time=1ms TTL=59
 
Ping statistics for 207.47.131.237:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 1ms, Maximum = 1ms, Average = 1ms
DNS request timed out.
    timeout was 2 seconds.
Server:  UnKnown
Address:  172.16.1.254
 
Name:    yahoo.com
Addresses:  2001:4998:c:a06::2:4008
 2001:4998:44:204::a7
 2001:4998:58:c02::a9
 206.190.36.45
 98.138.253.109
 98.139.183.24
 
 
Pinging yahoo.com [206.190.36.45] with 32 bytes of data:
Reply from 206.190.36.45: bytes=32 time=32ms TTL=53
Reply from 206.190.36.45: bytes=32 time=30ms TTL=53
 
Ping statistics for 206.190.36.45:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 30ms, Maximum = 32ms, Average = 31ms
 
Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
 
Ping statistics for 127.0.0.1:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
  9...60 36 dd 5f 13 07 ......Microsoft Wi-Fi Direct Virtual Adapter
  6...60 36 dd 5f 13 0a ......Bluetooth Device (Personal Area Network)
  4...60 36 dd 5f 13 06 ......Intel® Centrino® Wireless-N 2230
  2...8c 89 a5 08 08 3c ......Killer e2200 Gigabit Ethernet Controller (NDIS 6.30)
  1...........................Software Loopback Interface 1
===========================================================================
 
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0     172.16.1.254      172.16.1.71     20
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
       172.16.1.0    255.255.255.0         On-link       172.16.1.71    276
      172.16.1.71  255.255.255.255         On-link       172.16.1.71    276
     172.16.1.255  255.255.255.255         On-link       172.16.1.71    276
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link       172.16.1.71    276
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link       172.16.1.71    276
===========================================================================
Persistent Routes:
  None
 
IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
  1    306 ::1/128                  On-link
  2    276 fe80::/64                On-link
  2    276 fe80::21c5:80e1:92e3:c9a9/128
                                    On-link
  1    306 ff00::/8                 On-link
  2    276 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None
========================= Winsock entries =====================================
 
Catalog5 01 C:\WINDOWS\SysWOW64\napinsp.dll [55296] (Microsoft Corporation)
Catalog5 02 C:\WINDOWS\SysWOW64\pnrpnsp.dll [70144] (Microsoft Corporation)
Catalog5 03 C:\WINDOWS\SysWOW64\pnrpnsp.dll [70144] (Microsoft Corporation)
Catalog5 04 C:\WINDOWS\SysWOW64\NLAapi.dll [65536] (Microsoft Corporation)
Catalog5 05 C:\WINDOWS\SysWOW64\mswsock.dll [286208] (Microsoft Corporation)
Catalog5 06 C:\WINDOWS\SysWOW64\winrnr.dll [23040] (Microsoft Corporation)
Catalog5 07 C:\WINDOWS\SysWOW64\wshbth.dll [50688] (Microsoft Corporation)
Catalog9 01 C:\WINDOWS\SysWOW64\BfLLR.dll [196096] (Bigfoot Networks, Inc.)
Catalog9 02 C:\WINDOWS\SysWOW64\BfLLR.dll [196096] (Bigfoot Networks, Inc.)
Catalog9 03 C:\WINDOWS\SysWOW64\BfLLR.dll [196096] (Bigfoot Networks, Inc.)
Catalog9 04 C:\WINDOWS\SysWOW64\BfLLR.dll [196096] (Bigfoot Networks, Inc.)
Catalog9 05 C:\WINDOWS\SysWOW64\mswsock.dll [286208] (Microsoft Corporation)
Catalog9 06 C:\WINDOWS\SysWOW64\mswsock.dll [286208] (Microsoft Corporation)
Catalog9 07 C:\WINDOWS\SysWOW64\mswsock.dll [286208] (Microsoft Corporation)
Catalog9 08 C:\WINDOWS\SysWOW64\mswsock.dll [286208] (Microsoft Corporation)
Catalog9 09 C:\WINDOWS\SysWOW64\mswsock.dll [286208] (Microsoft Corporation)
Catalog9 10 C:\WINDOWS\SysWOW64\mswsock.dll [286208] (Microsoft Corporation)
Catalog9 11 C:\WINDOWS\SysWOW64\mswsock.dll [286208] (Microsoft Corporation)
Catalog9 12 C:\WINDOWS\SysWOW64\mswsock.dll [286208] (Microsoft Corporation)
Catalog9 13 C:\WINDOWS\SysWOW64\mswsock.dll [286208] (Microsoft Corporation)
Catalog9 14 C:\WINDOWS\SysWOW64\mswsock.dll [286208] (Microsoft Corporation)
Catalog9 15 C:\WINDOWS\SysWOW64\mswsock.dll [286208] (Microsoft Corporation)
Catalog9 16 C:\WINDOWS\SysWOW64\BfLLR.dll [196096] (Bigfoot Networks, Inc.)
x64-Catalog5 01 C:\Windows\System32\napinsp.dll [69120] (Microsoft Corporation)
x64-Catalog5 02 C:\Windows\System32\pnrpnsp.dll [88576] (Microsoft Corporation)
x64-Catalog5 03 C:\Windows\System32\pnrpnsp.dll [88576] (Microsoft Corporation)
x64-Catalog5 04 C:\Windows\System32\NLAapi.dll [86016] (Microsoft Corporation)
x64-Catalog5 05 C:\Windows\System32\mswsock.dll [339456] (Microsoft Corporation)
x64-Catalog5 06 C:\Windows\System32\winrnr.dll [30720] (Microsoft Corporation)
x64-Catalog5 07 C:\Windows\System32\wshbth.dll [63488] (Microsoft Corporation)
x64-Catalog9 01 C:\Windows\System32\BfLLR.dll [216064] (Bigfoot Networks, Inc.)
x64-Catalog9 02 C:\Windows\System32\BfLLR.dll [216064] (Bigfoot Networks, Inc.)
x64-Catalog9 03 C:\Windows\System32\BfLLR.dll [216064] (Bigfoot Networks, Inc.)
x64-Catalog9 04 C:\Windows\System32\BfLLR.dll [216064] (Bigfoot Networks, Inc.)
x64-Catalog9 05 C:\Windows\System32\mswsock.dll [339456] (Microsoft Corporation)
x64-Catalog9 06 C:\Windows\System32\mswsock.dll [339456] (Microsoft Corporation)
x64-Catalog9 07 C:\Windows\System32\mswsock.dll [339456] (Microsoft Corporation)
x64-Catalog9 08 C:\Windows\System32\mswsock.dll [339456] (Microsoft Corporation)
x64-Catalog9 09 C:\Windows\System32\mswsock.dll [339456] (Microsoft Corporation)
x64-Catalog9 10 C:\Windows\System32\mswsock.dll [339456] (Microsoft Corporation)
x64-Catalog9 11 C:\Windows\System32\mswsock.dll [339456] (Microsoft Corporation)
x64-Catalog9 12 C:\Windows\System32\mswsock.dll [339456] (Microsoft Corporation)
x64-Catalog9 13 C:\Windows\System32\mswsock.dll [339456] (Microsoft Corporation)
x64-Catalog9 14 C:\Windows\System32\mswsock.dll [339456] (Microsoft Corporation)
x64-Catalog9 15 C:\Windows\System32\mswsock.dll [339456] (Microsoft Corporation)
x64-Catalog9 16 C:\Windows\System32\BfLLR.dll [216064] (Bigfoot Networks, Inc.)
 
========================= Event log errors: ===============================
 
Application errors:
==================
Error: (02/03/2016 05:14:09 PM) (Source: Application Error) (User: )
Description: Faulting application name: KLM.exe, version: 1.0.1112.1901, time stamp: 0x4eeed613
Faulting module name: KERNELBASE.dll, version: 6.3.9600.18007, time stamp: 0x55c4bcfc
Exception code: 0xe0434352
Fault offset: 0x00015b68
Faulting process id: 0xf74
Faulting application start time: 0xKLM.exe0
Faulting application path: KLM.exe1
Faulting module path: KLM.exe2
Report Id: KLM.exe3
Faulting package full name: KLM.exe4
Faulting package-relative application ID: KLM.exe5
 
Error: (02/03/2016 05:14:08 PM) (Source: .NET Runtime) (User: )
Description: Application: KLM.exe
Framework Version: v4.0.30319
Description: The process was terminated due to an unhandled exception.
Exception Info: System.Management.ManagementException
Stack:
   at System.Management.ManagementException.ThrowWithExtendedInfo(System.Management.ManagementStatus)
   at System.Management.ManagementEventWatcher.Start()
   at KLM.MainWindow.<.ctor>b__0()
   at System.Threading.ThreadHelper.ThreadStart_Context(System.Object)
   at System.Threading.ExecutionContext.RunInternal(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean)
   at System.Threading.ExecutionContext.Run(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean)
   at System.Threading.ExecutionContext.Run(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object)
   at System.Threading.ThreadHelper.ThreadStart()
 
Error: (02/02/2016 11:50:37 PM) (Source: Application Error) (User: )
Description: Faulting application name: KLM.exe, version: 1.0.1112.1901, time stamp: 0x4eeed613
Faulting module name: KERNELBASE.dll, version: 6.3.9600.18007, time stamp: 0x55c4bcfc
Exception code: 0xe0434352
Fault offset: 0x00015b68
Faulting process id: 0x176c
Faulting application start time: 0xKLM.exe0
Faulting application path: KLM.exe1
Faulting module path: KLM.exe2
Report Id: KLM.exe3
Faulting package full name: KLM.exe4
Faulting package-relative application ID: KLM.exe5
 
Error: (02/02/2016 11:50:32 PM) (Source: .NET Runtime) (User: )
Description: Application: KLM.exe
Framework Version: v4.0.30319
Description: The process was terminated due to an unhandled exception.
Exception Info: System.Management.ManagementException
Stack:
   at System.Management.ManagementException.ThrowWithExtendedInfo(System.Management.ManagementStatus)
   at System.Management.ManagementEventWatcher.Start()
   at KLM.MainWindow.<.ctor>b__0()
   at System.Threading.ThreadHelper.ThreadStart_Context(System.Object)
   at System.Threading.ExecutionContext.RunInternal(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean)
   at System.Threading.ExecutionContext.Run(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean)
   at System.Threading.ExecutionContext.Run(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object)
   at System.Threading.ThreadHelper.ThreadStart()
 
Error: (02/02/2016 11:41:33 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: Cryptographic Services failed while processing the OnIdentity() call in the System Writer Object.
 
 
Details:
AddWin32ServiceFiles: Unable to back up image of service Kujgak since QueryServiceConfig API failed
 
System Error:
The system cannot find the file specified.
.
 
Error: (02/02/2016 11:41:33 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: Cryptographic Services failed while processing the OnIdentity() call in the System Writer Object.
 
 
Details:
AddLegacyDriverFiles: Unable to back up image of binary BDICx64.
 
System Error:
The system cannot find the file specified.
.
 
Error: (02/02/2016 11:19:41 PM) (Source: Application Error) (User: )
Description: Faulting application name: BDALeakfixer.exe, version: 4.0.0.8029, time stamp: 0x554c696c
Faulting module name: ntdll.dll, version: 6.3.9600.18007, time stamp: 0x55c4bc8e
Exception code: 0xc0000008
Fault offset: 0x0003c7dc
Faulting process id: 0x144c
Faulting application start time: 0xBDALeakfixer.exe0
Faulting application path: BDALeakfixer.exe1
Faulting module path: BDALeakfixer.exe2
Report Id: BDALeakfixer.exe3
Faulting package full name: BDALeakfixer.exe4
Faulting package-relative application ID: BDALeakfixer.exe5
 
Error: (02/02/2016 11:18:22 PM) (Source: Application Error) (User: )
Description: Faulting application name: BaiduHips.exe, version: 1.2.0.892, time stamp: 0x5530d674
Faulting module name: ntdll.dll, version: 6.3.9600.18007, time stamp: 0x55c4bc8e
Exception code: 0xc0000008
Fault offset: 0x0007d315
Faulting process id: 0x1a08
Faulting application start time: 0xBaiduHips.exe0
Faulting application path: BaiduHips.exe1
Faulting module path: BaiduHips.exe2
Report Id: BaiduHips.exe3
Faulting package full name: BaiduHips.exe4
Faulting package-relative application ID: BaiduHips.exe5
 
Error: (02/02/2016 11:17:09 PM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "Microsoft.VC80.ATL,processorArchitecture="amd64",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50727.4053"1".
Dependent Assembly Microsoft.VC80.ATL,processorArchitecture="amd64",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50727.4053" could not be found.
Please use sxstrace.exe for detailed diagnosis.
 
Error: (02/02/2016 11:17:09 PM) (Source: SideBySide) (User: )
Description: Activation context generation failed for "Microsoft.VC80.ATL,processorArchitecture="amd64",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50727.4053"1".
Dependent Assembly Microsoft.VC80.ATL,processorArchitecture="amd64",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50727.4053" could not be found.
Please use sxstrace.exe for detailed diagnosis.
 
 
System errors:
=============
Error: (02/03/2016 05:14:27 PM) (Source: Service Control Manager) (User: )
Description: The NVIDIA Update Service Daemon service failed to start due to the following error: 
%%1069
 
Error: (02/03/2016 05:14:27 PM) (Source: Service Control Manager) (User: )
Description: The nvUpdatusService service was unable to log on as .\UpdatusUser with the currently configured password due to the following error: 
%%2
 
To ensure that the service is configured properly, use the Services snap-in in Microsoft Management Console (MMC).
 
Error: (02/03/2016 05:11:58 PM) (Source: Service Control Manager) (User: )
Description: The UAC File Virtualization service failed to start due to the following error: 
%%1275
 
Error: (02/03/2016 05:11:54 PM) (Source: BTHUSB) (User: )
Description: The local adapter does not support an important Low Energy controller state.  The minimum required supported state mask is 0x1f7fffff, got 0x1f3fffff.  Low Energy functionality will be disabled.
 
Error: (02/03/2016 05:10:51 PM) (Source: DCOM) (User: TRAVIS-LT)
Description: 1084WSearchUnavailable{7D096C5F-AC08-4F1F-BEB7-5C22C517CE39}
 
Error: (02/03/2016 05:10:51 PM) (Source: DCOM) (User: TRAVIS-LT)
Description: 1084WSearchUnavailable{7D096C5F-AC08-4F1F-BEB7-5C22C517CE39}
 
Error: (02/03/2016 05:10:51 PM) (Source: DCOM) (User: TRAVIS-LT)
Description: 1084WSearchUnavailable{7D096C5F-AC08-4F1F-BEB7-5C22C517CE39}
 
Error: (02/03/2016 05:10:51 PM) (Source: DCOM) (User: TRAVIS-LT)
Description: 1084WSearchUnavailable{7D096C5F-AC08-4F1F-BEB7-5C22C517CE39}
 
Error: (02/03/2016 05:10:51 PM) (Source: DCOM) (User: TRAVIS-LT)
Description: 1084WSearchUnavailable{7D096C5F-AC08-4F1F-BEB7-5C22C517CE39}
 
Error: (02/03/2016 05:10:51 PM) (Source: DCOM) (User: TRAVIS-LT)
Description: 1084WSearchUnavailable{7D096C5F-AC08-4F1F-BEB7-5C22C517CE39}
 
 
Microsoft Office Sessions:
=========================
Error: (02/03/2016 05:14:09 PM) (Source: Application Error)(User: )
Description: KLM.exe1.0.1112.19014eeed613KERNELBASE.dll6.3.9600.1800755c4bcfce043435200015b68f7401d15ed892fcaf63C:\Program Files (x86)\MSI\KLM\KLM.exeC:\WINDOWS\SYSTEM32\KERNELBASE.dlld389a457-cacb-11e5-befe-6036dd5f130a
 
Error: (02/03/2016 05:14:08 PM) (Source: .NET Runtime)(User: )
Description: Application: KLM.exe
Framework Version: v4.0.30319
Description: The process was terminated due to an unhandled exception.
Exception Info: System.Management.ManagementException
Stack:
   at System.Management.ManagementException.ThrowWithExtendedInfo(System.Management.ManagementStatus)
   at System.Management.ManagementEventWatcher.Start()
   at KLM.MainWindow.<.ctor>b__0()
   at System.Threading.ThreadHelper.ThreadStart_Context(System.Object)
   at System.Threading.ExecutionContext.RunInternal(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean)
   at System.Threading.ExecutionContext.Run(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean)
   at System.Threading.ExecutionContext.Run(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object)
   at System.Threading.ThreadHelper.ThreadStart()
 
Error: (02/02/2016 11:50:37 PM) (Source: Application Error)(User: )
Description: KLM.exe1.0.1112.19014eeed613KERNELBASE.dll6.3.9600.1800755c4bcfce043435200015b68176c01d15e46c526bb25C:\Program Files (x86)\MSI\KLM\KLM.exeC:\WINDOWS\SYSTEM32\KERNELBASE.dll0bcb56b2-ca3a-11e5-befa-6036dd5f130a
 
Error: (02/02/2016 11:50:32 PM) (Source: .NET Runtime)(User: )
Description: Application: KLM.exe
Framework Version: v4.0.30319
Description: The process was terminated due to an unhandled exception.
Exception Info: System.Management.ManagementException
Stack:
   at System.Management.ManagementException.ThrowWithExtendedInfo(System.Management.ManagementStatus)
   at System.Management.ManagementEventWatcher.Start()
   at KLM.MainWindow.<.ctor>b__0()
   at System.Threading.ThreadHelper.ThreadStart_Context(System.Object)
   at System.Threading.ExecutionContext.RunInternal(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean)
   at System.Threading.ExecutionContext.Run(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean)
   at System.Threading.ExecutionContext.Run(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object)
   at System.Threading.ThreadHelper.ThreadStart()
 
Error: (02/02/2016 11:41:33 PM) (Source: Microsoft-Windows-CAPI2)(User: )
Description: 
Details:
AddWin32ServiceFiles: Unable to back up image of service Kujgak since QueryServiceConfig API failed
 
System Error:
The system cannot find the file specified.
 
Error: (02/02/2016 11:41:33 PM) (Source: Microsoft-Windows-CAPI2)(User: )
Description: 
Details:
AddLegacyDriverFiles: Unable to back up image of binary BDICx64.
 
System Error:
The system cannot find the file specified.
 
Error: (02/02/2016 11:19:41 PM) (Source: Application Error)(User: )
Description: BDALeakfixer.exe4.0.0.8029554c696cntdll.dll6.3.9600.1800755c4bc8ec00000080003c7dc144c01d15e41c1e826d0C:\Program Files (x86)\Baidu\BaiduAn\4.0.0.8029\BDALeakfixer.exeC:\WINDOWS\SYSTEM32\ntdll.dllb9e875a5-ca35-11e5-bef7-6036dd5f130a
 
Error: (02/02/2016 11:18:22 PM) (Source: Application Error)(User: )
Description: BaiduHips.exe1.2.0.8925530d674ntdll.dll6.3.9600.1800755c4bc8ec00000080007d3151a0801d15e41bf53b368C:\Program Files (x86)\Common Files\Baidu\BaiduHips\1.2.0.892\BaiduHips.exeC:\WINDOWS\SYSTEM32\ntdll.dll8aa70709-ca35-11e5-bef7-6036dd5f130a
 
Error: (02/02/2016 11:17:09 PM) (Source: SideBySide)(User: )
Description: Microsoft.VC80.ATL,processorArchitecture="amd64",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50727.4053"C:\Users\Centuck\AppData\Local\Temp\Tencent\QQPCMgr\~642a9\TestMSVCR_64.exe
 
Error: (02/02/2016 11:17:09 PM) (Source: SideBySide)(User: )
Description: Microsoft.VC80.ATL,processorArchitecture="amd64",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="8.0.50727.4053"C:\Users\Centuck\AppData\Local\Temp\Tencent\QQPCMgr\~642a9\TestMSVCR_64.exe
 
 
CodeIntegrity Errors:
===================================
  Date: 2016-02-02 22:59:23.090
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume4\Program Files\SpaceSoundPro\SpaceSoundPro.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-02-02 22:59:23.027
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume4\Program Files\SpaceSoundPro\SpaceSoundPro.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-02-02 22:59:22.955
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume4\Program Files\SpaceSoundPro\SpaceSoundPro.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-02-02 22:59:22.893
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume4\Program Files\SpaceSoundPro\SpaceSoundPro.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-02-02 22:51:00.423
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume4\Program Files\Sound+\SoundP.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-02-02 22:51:00.362
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume4\Program Files\Sound+\SoundP.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-02-02 22:51:00.281
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume4\Program Files\Sound+\SoundP.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-02-02 22:51:00.214
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume4\Program Files\Sound+\SoundP.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-02-02 22:46:22.001
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume4\Program Files\Sound+\SoundP.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-02-02 22:46:21.933
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume4\Program Files\Sound+\SoundP.dll because the set of per-page image hashes could not be found on the system.
 
 
=========================== Installed Programs ============================
 
Would not let me post this part.  Please see attached txt file.
 
========================= Devices: ================================
 
 
========================= Memory info: ===================================
 
Percentage of memory in use: 14%
Total physical RAM: 12179.58 MB
Available physical RAM: 10387.96 MB
Total Virtual: 14035.58 MB
Available Virtual: 12048.36 MB
 
========================= Partitions: =====================================
 
1 Drive c: (OS_Install) (Fixed) (Total:475.27 GB) (Free:284.03 GB) NTFS
2 Drive d: (Data) (Fixed) (Total:201.11 GB) (Free:200.94 GB) NTFS
3 Drive e: (Europe2015) (CDROM) (Total:4.13 GB) (Free:0 GB) UDF
 
========================= Users: ========================================
 
User accounts for \\TRAVIS-LT
 
Administrator            Centuck                  Guest                    
 
 
**** End of log ****

 

Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 2016-02-02
Scan Time: 10:47 PM
Logfile: 
Administrator: Yes
 
Version: 2.2.0.1024
Malware Database: v2016.02.02.06
Rootkit Database: v2016.01.20.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
 
OS: Windows 8.1
CPU: x64
File System: NTFS
User: Centuck
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 418689
Time Elapsed: 17 min, 10 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
Processes: 14
PUP.Optional.CouponMarvel, C:\ProgramData\LolliScan\LolliScan.exe, 4704, Delete-on-Reboot, [aa44c596d1c84beb759f945fa361a060]
PUP.Optional.CouponMarvel, C:\ProgramData\LolliScan\LolliScan.exe, 5472, Delete-on-Reboot, [aa44c596d1c84beb759f945fa361a060]
PUP.Optional.Goobzo, C:\Program Files (x86)\ShopperPro3\JSDriver\1.42.1.10635\jsdrv.exe, 3664, Delete-on-Reboot, [1cd269f21980290d63e9508368997e82]
PUP.Optional.Goobzo, C:\Program Files\Common Files\ShopperPro3\spbiu.exe, 5432, Delete-on-Reboot, [effff566485178be5837a62c6d9434cc]
PUP.Optional.ConvertAd, C:\Program Files (x86)\00000000-1454474767-0000-0000-8C89A508083C\jnsd4865.tmp, 4516, Delete-on-Reboot, [47a769f2adec06302013431b4fb3c53b]
PUP.Optional.ConvertAd, C:\Users\Centuck\AppData\Local\00000000-1454453233-0000-0000-8C89A508083C\snsw8C.tmp, 7624, Delete-on-Reboot, [c02e0a51aaefaf87407516c66f929868]
PUP.Optional.MultiPlug, C:\Program Files (x86)\00000000-1454474767-0000-0000-8C89A508083C\vnsl102.tmp, 7808, Delete-on-Reboot, [a14d88d34b4efb3b2bf04d9722e13ac6]
PUP.Optional.MultiPlug, C:\Program Files (x86)\00000000-1454474767-0000-0000-8C89A508083C\knsf3209.tmpfs, 2608, Delete-on-Reboot, [a14d88d34b4efb3b2bf04d9722e13ac6]
PUP.Optional.SoundPlus, C:\Program Files\Sound+\idscservice.exe, 1888, Delete-on-Reboot, [fdf1cf8c2e6b9d99546de25a55af619f]
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\TrailerTime.exe, 6080, Delete-on-Reboot, [13db3d1edbbe7db951582520a75df808]
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\TrailerTime.exe, 6824, Delete-on-Reboot, [13db3d1edbbe7db951582520a75df808]
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\TrailerTime.exe, 6884, Delete-on-Reboot, [13db3d1edbbe7db951582520a75df808]
PUP.Optional.WindoWeather, C:\Program Files (x86)\WindoWeather\WindoWeather.exe, 5128, Delete-on-Reboot, [35b92e2de3b6f73f4573172ec73d0ef2]
Trojan.FakeAlert, C:\Users\Centuck\AppData\Local\Temp\V0BHKEE1YD\testversion.exe, 3196, Delete-on-Reboot, [fbf37ae1eeab36009c5ef157b64e718f]
 
Modules: 2
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\ffmpegsumo.dll, Delete-on-Reboot, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\ffmpegsumo.dll, Delete-on-Reboot, [13db3d1edbbe7db951582520a75df808], 
 
Registry Keys: 120
PUP.Optional.Goobzo, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SPBIUpd, Quarantined, [effff566485178be5837a62c6d9434cc], 
PUP.Optional.ConvertAd, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\zutuzuni, Quarantined, [47a769f2adec06302013431b4fb3c53b], 
PUP.Optional.ConvertAd, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\rowugoqo, Quarantined, [c02e0a51aaefaf87407516c66f929868], 
PUP.Optional.BrowseFox.Generic, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\wucotusy, Quarantined, [d41a144777224fe7189557a91be57b85], 
PUP.Optional.ShopperPro, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SPDRIVER_1.42.1.10635, Quarantined, [925c3c1ffb9e9b9bade50fc343be0000], 
PUP.Optional.ShopperPro, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SPBIUpdd, Quarantined, [8d61d8832c6da98d1b75e1f156ab9070], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\CLSID\{A5A51D2A-505A-4D84-AFC6-E0FA87E47B8C}, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{A5A51D2A-505A-4D84-AFC6-E0FA87E47B8C}, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\TYPELIB\{8FB1A663-2820-468B-95C4-5060A4C5F413}, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\INTERFACE\{03C0AC00-86DE-4B55-81BA-2E7CD61C51B1}, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{03C0AC00-86DE-4B55-81BA-2E7CD61C51B1}, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{03C0AC00-86DE-4B55-81BA-2E7CD61C51B1}, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{8FB1A663-2820-468B-95C4-5060A4C5F413}, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{8FB1A663-2820-468B-95C4-5060A4C5F413}, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\ShopperPro.ShopperProBHO.1, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\ShopperPro.ShopperProBHO, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\WOW6432NODE\CLASSES\ShopperPro.ShopperProBHO, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\WOW6432NODE\ShopperPro.ShopperProBHO, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{A5A51D2A-505A-4D84-AFC6-E0FA87E47B8C}, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{A5A51D2A-505A-4D84-AFC6-E0FA87E47B8C}, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\WOW6432NODE\CLASSES\ShopperPro.ShopperProBHO.1, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\WOW6432NODE\ShopperPro.ShopperProBHO.1, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{A5A51D2A-505A-4D84-AFC6-E0FA87E47B8C}, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\CLSID\{A5A51D2A-505A-4D84-AFC6-E0FA87E47B8C}\INPROCSERVER32, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\APPID\{58FDA6AF-67D8-4198-B7CD-94B17532C8D5}, Quarantined, [44aa1c3f5d3c37fff4de494b2bd706fa], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{58FDA6AF-67D8-4198-B7CD-94B17532C8D5}, Quarantined, [44aa1c3f5d3c37fff4de494b2bd706fa], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\{58FDA6AF-67D8-4198-B7CD-94B17532C8D5}, Quarantined, [44aa1c3f5d3c37fff4de494b2bd706fa], 
PUP.Optional.TaskRNDM, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\{3BDFD1D7-7A9B-4D29-80B3-D00E66E62885}, Quarantined, [5995df7c5b3e24127d4b7f14f30f53ad], 
PUP.Optional.TaskRNDM, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\APPDATALOW\SOFTWARE\{3BDFD1D7-7A9B-4D29-80B3-D00E66E62885}, Quarantined, [5995df7c5b3e24127d4b7f14f30f53ad], 
PUP.Optional.CouponMarvel, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\LolliScan, Quarantined, [40ae42196a2f9c9abf9f286c0ef337c9], 
PUP.Optional.TrailerTime, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\TrailerTime, Quarantined, [6787e675b0e9171f0c8429a6c33e4eb2], 
PUP.Optional.SoundPlus, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\SoundPlus, Quarantined, [3fafe5768a0f00367ab2c422946dd030], 
PUP.Optional.WindoWeather, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WindoWeather, Quarantined, [33bb76e5267382b4ad0ab01e48b937c9], 
PUP.Optional.ConvertAd, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\SoftwareUpdater, Quarantined, [f3fb88d31b7e50e64e4a5a6f63a014ec], 
PUP.Optional.MultiPlug, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\quwugunizbt, Quarantined, [a14d88d34b4efb3b2bf04d9722e13ac6], 
PUP.Optional.Wajam, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\WaNetworkEnhancer Service, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.SoundPlus, HKLM\SOFTWARE\CLASSES\CLSID\{5013A5D0-34A9-489F-BF9A-3A0E34D8902B}, Quarantined, [fdf1cf8c2e6b9d99546de25a55af619f], 
PUP.Optional.SoundPlus, HKLM\SOFTWARE\CLASSES\CLSID\{B43F10EC-BD1C-48D5-A123-3DCA3321C187}, Quarantined, [fdf1cf8c2e6b9d99546de25a55af619f], 
PUP.Optional.CouponMarvel, HKLM\SOFTWARE\LolliScan, Quarantined, [d01e05566f2aff37eebded4d4fb5dd23], 
PUP.Optional.ShopperPro, HKLM\SOFTWARE\ShopperPro3, Quarantined, [8a64a6b5643583b32fa0eb5b4cb8ef11], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\shopperz030220160105, Quarantined, [34bad08b9bfe6cca7bf0813cd033cc34], 
PUP.Optional.SpaceSoundPro, HKLM\SOFTWARE\SpaceSoundPro, Quarantined, [ac42df7cb2e736005b8302f1e71c4ab6], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\APPID\SHOPPERPRO.DLL, Quarantined, [b43a86d594052d09f0d02309ae560cf4], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\SHOPPERPRO.DLL, Quarantined, [07e70c4f653492a4b80844e846be3ac6], 
PUP.Optional.VBates, HKLM\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\A7BD54B233B5B2F70AF86F5BD1A0C0A772A59FC6, Quarantined, [01ed80dbd6c3290dabb109dd17ebfa06], 
PUP.Optional.VBates, HKLM\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\D830B6B8939ACB4928401060203BB648456BB4F8, Quarantined, [5c923a21a8f1e650c697697d6b97956b], 
PUP.Optional.VBates, HKLM\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\F53E693DDABF57A88A9B12B608B09B26C0608B74, Quarantined, [db138bd01b7edf575d0103e3936f07f9], 
PUP.Optional.DeskBar, HKLM\SOFTWARE\MICROSOFT\TRACING\DeskBar_RASAPI32, Quarantined, [9559015a2e6be45276529d6ab84cde22], 
PUP.Optional.DeskBar, HKLM\SOFTWARE\MICROSOFT\TRACING\DeskBar_RASMANCS, Quarantined, [ffeff962a1f8ef47face46c1ed17de22], 
PUP.Optional.Trovi, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\CUSTOM\LAYERS\VC32LDR  , Quarantined, [af3ffd5e356421152f6bfbfe6e95f60a], 
PUP.Optional.SearchProtect.AppFlsh, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\INSTALLEDSDB\{8a4d5a43-c64a-45ab-bdf4-804fe18ceafd}, Quarantined, [cc2247147b1ef73f24911725778d4db3], 
PUP.Optional.SearchProtect.AppFlsh, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\INSTALLEDSDB\{cf2797aa-b7ec-e311-8ed9-005056c00008}, Quarantined, [06e8f16aafea0a2ca70fd96344c0a15f], 
PUP.Optional.SearchProtect.AppFlsh, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\bvxvbxxvaa, Delete-on-Reboot, [da140c4f3f5a4aec962187b55da7ad53], 
PUP.Optional.CouponMarvel, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\FDOJFP1, Delete-on-Reboot, [7975eb7069307cba9f323c0cde26b24e], 
PUP.Optional.ShopperPro, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\ShopperPro3, Delete-on-Reboot, [6886d289c3d644f26d606adc70947d83], 
PUP.Optional.ShopperPro, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\ShopperProJSUpd, Delete-on-Reboot, [529ce3780f8a01353b5f02e9966c946c], 
PUP.Optional.ShopperPro, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\SPBIW_UpdateTask_Time_313632313238353836362d5737325a786c5a3237344541, Delete-on-Reboot, [717d63f8772252e4badba948b152cf31], 
PUP.Optional.ShopperPro, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\SPDriver, Delete-on-Reboot, [6c824e0da7f282b4b2e98f5c11f1cf31], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP PATHS\ShopperPro3.exe, Quarantined, [c22c1c3f4c4d1d191cef4007c63eb947], 
PUP.Optional.Goobzo.ShrtCln, HKLM\SOFTWARE\SEARCHMODULE\SUCCESS, Quarantined, [519d3a21b2e7082e353683848f75bb45], 
PUP.Optional.SoundPlus, HKLM\SOFTWARE\SOUNDPLUS, Quarantined, [32bcbaa14f4a83b34d9582640af841bf], 
PUP.Optional.GamesDesktop, HKLM\SOFTWARE\WOW6432NODE\GAMESDESKTOP, Quarantined, [7e705efd74253ef899b9aa2b53b0fa06], 
PUP.Optional.CouponMarvel, HKLM\SOFTWARE\WOW6432NODE\LolliScan, Quarantined, [f5f996c56d2c58de258674c660a4758b], 
PUP.Optional.ShopperPro, HKLM\SOFTWARE\WOW6432NODE\ShopperPro3, Quarantined, [16d899c2811853e300cf8abcdb2948b8], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\shopperz030220160105, Quarantined, [599560fb3267bd79066539847e85c63a], 
PUP.Optional.SpaceSoundPro, HKLM\SOFTWARE\WOW6432NODE\SpaceSondPro, Quarantined, [3cb24714782113236479777c7c87d42c], 
PUP.Optional.Wajam, HKLM\SOFTWARE\WOW6432NODE\WaNetworkEnhancer, Quarantined, [b53996c5336679bdfa6b3b09f70dc739], 
PUP.Optional.WindoWeather, HKLM\SOFTWARE\WOW6432NODE\WindoWeather, Quarantined, [66883e1d4c4d56e09328261f1aeab14f], 
PUP.Optional.CouponMarvel, HKLM\SOFTWARE\WOW6432NODE\{3BDFD1D7-7A9B-4D29-80B3-D00E66E62885}, Quarantined, [658979e2e7b239fd653930d8ab59bc44], 
PUP.Optional.Tuto4PC, HKLM\SOFTWARE\WOW6432NODE\SVH\rec_en_77, Quarantined, [75798bd0c7d2a6900ef9b1597d8757a9], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\SHOPPERPRO.DLL, Quarantined, [38b68fccfd9c8da9635d50dcb4507c84], 
PUP.Optional.WindoWeather, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WindoWeather, Quarantined, [509e2734d3c624120fe964e38b793bc5], 
PUP.Optional.VBates, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\A7BD54B233B5B2F70AF86F5BD1A0C0A772A59FC6, Quarantined, [d11db7a494059c9a4a1235b1d1311be5], 
PUP.Optional.VBates, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\D830B6B8939ACB4928401060203BB648456BB4F8, Quarantined, [b6381c3f405946f0203dc32348bafb05], 
PUP.Optional.VBates, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\F53E693DDABF57A88A9B12B608B09B26C0608B74, Quarantined, [7b7377e46039ed49a3bb00e6847e966a], 
PUP.Optional.Goobzo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\APP PATHS\ShopperPro3.exe, Quarantined, [6d81fe5d41583cfa7d8ec18651b3728e], 
PUP.Optional.GamesDesktop, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\gmsd_ca_005010226_is1, Quarantined, [b836d6854752102666f06f66966d54ac], 
PUP.Optional.MultiPlug, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\PopupProduct, Quarantined, [23cb0556d0c99e985f963eee976de818], 
PUP.Optional.Recover, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\rec_en_77_is1, Quarantined, [f9f51d3e643572c4e087727a4db68c74], 
PUP.Optional.ShopperPro, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\ShopperPro3, Quarantined, [d11d401b772249ed03cba3a3d133d62a], 
PUP.Optional.VOPackage, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\VOPackage, Quarantined, [29c55efd5841d0668c8b13e9768df30d], 
PUP.Optional.MySearch123, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{7ADF667E-E14D-4D2C-827C-B0108F0D93BC}, Quarantined, [3eb0b7a45643f93d8174251224e08977], 
PUP.Optional.MyTubeTheater, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{C42C5197-0EE9-4940-893B-F4EF047DFF0F}, Quarantined, [727cdd7eb7e203336f138e79e61eb14f], 
PUP.Optional.SearchProtect.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\SEARCHPROTECT, Quarantined, [e7073724fc9d68ce9b20043855af659b], 
PUP.Optional.Shopperz, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{6AAEBAF5-874B-4E99-8D21-9E73CC14B8E4}, Quarantined, [7b732f2ca5f4dc5aa72a202616eeaf51], 
PUP.Optional.SearchProtect.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\SEARCHPROTECT, Quarantined, [3eb07be0debbb4823b81d5673bc9946c], 
PUP.Optional.SearchProtect.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\SPPDCOM, Quarantined, [30beea7164351f178439013bdb29b44c], 
PUP.Optional.Tuto4PC, HKLM\SOFTWARE\WOW6432NODE\TUTORIALS, Quarantined, [945a510aa3f6a09652ad3fbae61da060], 
Rootkit.cherimoya.A, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\cherimoya, Quarantined, [41ad6eed089166d048a15c93e81a4db3], 
PUP.Optional.ConduitSearchProtect, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\CltMngSvc, Quarantined, [836b9dbe9207181ec8637529bc47659b], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\67C9CCE3-E7C3-406E-A6D3-EAB6E4D541AC, Quarantined, [d51988d38019c37343303b82a85be917], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\CSRCC, Quarantined, [de10b5a62970a0967af9625bf40f8977], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHOPPERZ030220160105 UPDATER, Quarantined, [00ee510ad9c042f4264d4875d42fb848], 
PUP.Optional.MultiPlug, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\ZIGIPYRO, Quarantined, [ffef7fdcc3d692a4f4534f9509fa728e], 
PUP.Optional.SearchProtect.AppFlsh, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SPPD, Quarantined, [da143a217722ed49f6c9f24a50b42cd4], 
PUP.Optional.Shopperz.BrwsrFlsh, HKU\.DEFAULT\SOFTWARE\MICROSOFT\INTERNET EXPLORER\INTERNETREGISTRY\REGISTRY\USER\S-1-5-18\SOFTWARE\shopperz030220160105, Quarantined, [6b8389d25f3aef47856248fa0bf906fa], 
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{5BB7FA2A-C526-4DC5-8242-98506F0A463B}, Quarantined, [a24cc5967029d264e5643d8057ac7888], 
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{5BB7FA2A-C526-4DC5-8242-98506F0A463B}, Quarantined, [fcf291cae5b4f73fe9607a43ad5640c0], 
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{5BB7FA2A-C526-4DC5-8242-98506F0A463B}, Quarantined, [1dd10853b8e1ac8af257f4c91de6f30d], 
PUP.Optional.DeskBar, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\DeskBar, Quarantined, [3cb2c2990693f73fbac36d994cb8cf31], 
PUP.Optional.Wajam, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\WajIEnhance, Quarantined, [1bd3f06b346537ffdf7d09f324df857b], 
PUP.Optional.Wajam, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\WaNetworkEnhancer, Quarantined, [29c5ec6fb3e639fdaabad76d1aea837d], 
PUP.Optional.TrailerTime, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\APPDATALOW\SOFTWARE\TrailerTime, Quarantined, [1ed0c794dabfc76fc165df67c93bbe42], 
PUP.Optional.Searching, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\jlcgehabolcakkjhgmgpkagpolbjlhfa, Quarantined, [ee00a1ba2871e551f4ad31b9d62c9a66], 
PUP.Optional.Search.ShrtCln, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{7D128C0F-17B6-4477-AE5A-EEE0A020BA09}, Quarantined, [ab434516d3c6221485eec38417edc937], 
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\{5BB7FA2A-C526-4DC5-8242-98506F0A463B}, Quarantined, [4da1d18a950437ff9faa318c54af08f8], 
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-21-532057547-2777207124-81917641-500\SOFTWARE\{5BB7FA2A-C526-4DC5-8242-98506F0A463B}, Quarantined, [17d72f2c5b3e52e42e1b8934c14203fd], 
PUP.Optional.Wajam, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\WaNetworkEnhancer, Quarantined, [0ee0174446531323666fa63282804fb1], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{A0C927BB-FCA6-4173-8F22-025121F0BED7}, Quarantined, [2cc26dee207958de94777462b84c7e82], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\CLSID\{A0C927BB-FCA6-4173-8F22-025121F0BED7}, Quarantined, [2cc26dee207958de94777462b84c7e82], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\TYPELIB\{9AE7A6AE-162E-44c4-9A2B-A6B4EF19909D}, Quarantined, [2cc26dee207958de94777462b84c7e82], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{9AE7A6AE-162E-44c4-9A2B-A6B4EF19909D}, Quarantined, [2cc26dee207958de94777462b84c7e82], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{9AE7A6AE-162E-44c4-9A2B-A6B4EF19909D}, Quarantined, [2cc26dee207958de94777462b84c7e82], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\Extension.Apivfo.1, Quarantined, [2cc26dee207958de94777462b84c7e82], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\Extension.Apivfo, Quarantined, [2cc26dee207958de94777462b84c7e82], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\Extension.Apivfo, Quarantined, [2cc26dee207958de94777462b84c7e82], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\Extension.Apivfo, Quarantined, [2cc26dee207958de94777462b84c7e82], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{A0C927BB-FCA6-4173-8F22-025121F0BED7}, Quarantined, [2cc26dee207958de94777462b84c7e82], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{A0C927BB-FCA6-4173-8F22-025121F0BED7}, Quarantined, [2cc26dee207958de94777462b84c7e82], 
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{A0C927BB-FCA6-4173-8F22-025121F0BED7}, Quarantined, [2cc26dee207958de94777462b84c7e82], 
 
Registry Values: 54
PUP.Optional.Goobzo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|SPDriver, C:\Program Files (x86)\ShopperPro3\JSDriver\1.42.1.10635\jsdrv.exe, Quarantined, [1cd269f21980290d63e9508368997e82]
PUP.Optional.Goobzo, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|SPDriver, C:\Program Files (x86)\ShopperPro3\JSDriver\1.42.1.10635\jsdrv.exe, Quarantined, [1cd269f21980290d63e9508368997e82]
PUP.Optional.SoundPlus, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Sound+, "C:\Program Files\Sound+\Sound+.exe", Quarantined, [8c625b00debb62d4204e456dd1305da3]
PUP.Optional.Goobzo, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|DeskBar, C:\Users\Centuck\AppData\Local\DeskBar\dblaunch.exe, Quarantined, [34ba1f3c168377bf84473376649dae52]
PUP.Optional.SoundPlus, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|IDSCPRODUCT, "C:\Program Files\Sound+\\idscservice.exe", Quarantined, [fdf1cf8c2e6b9d99546de25a55af619f]
PUP.Optional.TrailerTime, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\TrailerTime.exe su, Quarantined, [13db3d1edbbe7db951582520a75df808]
PUP.Optional.WindoWeather, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|WindoWeather, "C:\Program Files (x86)\WindoWeather\WindoWeather.exe" monetize, Quarantined, [35b92e2de3b6f73f4573172ec73d0ef2]
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\APPID\SHOPPERPRO.DLL|AppID, {58FDA6AF-67D8-4198-B7CD-94B17532C8D5}, Quarantined, [b43a86d594052d09f0d02309ae560cf4]
PUP.Optional.Goobzo, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\SHOPPERPRO.DLL|AppID, {58FDA6AF-67D8-4198-B7CD-94B17532C8D5}, Quarantined, [07e70c4f653492a4b80844e846be3ac6]
PUP.Optional.Trovi, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\CUSTOM\chrome.exe|{8a4d5a43-c64a-45ab-bdf4-804fe18ceafd}.sdb, 130989489966939487, Quarantined, [cd21015a0a8f5cda12876891dd266e92]
PUP.Optional.Trovi, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\CUSTOM\explorer.xxx|{8a4d5a43-c64a-45ab-bdf4-804fe18ceafd}.sdb, 130989489966939487, Quarantined, [8a6495c63b5e8caaabee897057ac21df]
PUP.Optional.Trovi, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\CUSTOM\firefox.exe|{8a4d5a43-c64a-45ab-bdf4-804fe18ceafd}.sdb, 130989489966939487, Quarantined, [a04eadaea9f004327a1f639671929967]
PUP.Optional.Trovi, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\CUSTOM\iexplore.exe|{8a4d5a43-c64a-45ab-bdf4-804fe18ceafd}.sdb, 130989489966939487, Quarantined, [905e75e626735bdbf1a8d2273ec555ab]
PUP.Optional.Trovi, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\CUSTOM\software_removal_tool.exe|{8a4d5a43-c64a-45ab-bdf4-804fe18ceafd}.sdb, 130989489966939487, Quarantined, [7b732c2f831674c2198039c0e32023dd]
PUP.Optional.Trovi, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\CUSTOM\software_reporter_tool.exe|{8a4d5a43-c64a-45ab-bdf4-804fe18ceafd}.sdb, 130989489966939487, Quarantined, [e9051f3c198056e0594011e8966dcf31]
PUP.Optional.Trovi, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\CUSTOM\LAYERS\VC32Ldr  |{8a4d5a43-c64a-45ab-bdf4-804fe18ceafd}.sdb, 130989489966939487, Quarantined, [af3ffd5e356421152f6bfbfe6e95f60a]
PUP.Optional.SpaceSoundPro, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|SpaceSoundPro, "C:\Program Files\SpaceSoundPro\SpaceSoundPro.exe", Quarantined, [8668adae465359dd3aa1d61d0201a35d]
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\MOZILLA\FIREFOX\EXTENSIONS|{A0C927BB-FCA6-4173-8F22-025121F0BED7}, C:\Program Files\shopperz030220160105\Firefox\{A0C927BB-FCA6-4173-8F22-025121F0BED7}.xpi, Quarantined, [7c725b00257496a08adafcc1c63dbb45]
PUP.Optional.Goobzo.ShrtCln, HKLM\SOFTWARE\SEARCHMODULE\SUCCESS|InstallStr, ok, Quarantined, [519d3a21b2e7082e353683848f75bb45]
PUP.Optional.SoundPlus, HKLM\SOFTWARE\SOUNDPLUS|InstallPath, C:\Program Files\Sound+, Quarantined, [32bcbaa14f4a83b34d9582640af841bf]
PUP.Optional.Goobzo, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\SHOPPERPRO.DLL|AppID, {58FDA6AF-67D8-4198-B7CD-94B17532C8D5}, Quarantined, [38b68fccfd9c8da9635d50dcb4507c84]
PUP.Optional.WindoWeather, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION|WindoWeather.exe, 9999, Quarantined, [0ee02e2db0e9d363896e51f6927214ec]
PUP.Optional.ExploreTech, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION|ExploreTech.exe, 9999, Quarantined, [e20c6dee2d6c9a9c9565529142c07f81]
PUP.Optional.GamesDesktop, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|gmsd_ca_005010226, "C:\Program Files (x86)\gmsd_ca_005010226\gmsd_ca_005010226.exe", Quarantined, [6d8197c4b6e31d197ed6e8ed38cbec14]
PUP.Optional.Recover, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|rec_en_77, "C:\Program Files (x86)\rec_en_77\rec_en_77.exe", Quarantined, [678755063f5a3df90a5bf8f40ff4d62a]
PUP.Optional.Package, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|Update, C:\Users\Centuck\AppData\Roaming\VOPackage\VOPackage.exe /runonce, Quarantined, [2ac456053a5f16208ec95f8850b36997]
PUP.Optional.IOProtect, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|IOPROTECT, C:\Program Files (x86)\SpaceSondPro_v53.12643\ioproduct_service.bat, Quarantined, [b9350b505d3c94a269b8e51f8084c43c]
Adware.MaxDriver, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|IOPROTECT, C:\Program Files (x86)\SpaceSondPro_v53.12643\ioproduct_service.bat, Quarantined, [4ea05b00e1b8dd59b0202c1dff05ec14]
PUP.Optional.SearchProtect.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\SEARCHPROTECT|Publisher, Client Connect LTD, Quarantined, [e7073724fc9d68ce9b20043855af659b]
PUP.Optional.TrailerTime, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\TRAILERTIME|DisplayName, TrailerTime - TrailerTime for Desktop, Quarantined, [3db177e4c3d615219542a79e709432ce]
PUP.Optional.VOPackage, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\VOPACKAGE|UninstallString, "C:\Users\Centuck\AppData\Roaming\VOPackage\Uninstall.exe", Quarantined, [5e908fcc2a6fc6705581a5559072db25]
PUP.Optional.Shopperz, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{6AAEBAF5-874B-4E99-8D21-9E73CC14B8E4}|DisplayIcon, C:\Program Files\shopperz030220160105\setup.ico, Quarantined, [7b732f2ca5f4dc5aa72a202616eeaf51]
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\EXTENSIONS|{A0C927BB-FCA6-4173-8F22-025121F0BED7}, C:\Program Files\shopperz030220160105\Firefox\{A0C927BB-FCA6-4173-8F22-025121F0BED7}.xpi, Quarantined, [509ef467cdcc6bcb372decd141c2a060]
PUP.Optional.SearchProtect.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\SEARCHPROTECT|InstallDir, C:\PROGRA~2\SearchProtect, Quarantined, [3eb07be0debbb4823b81d5673bc9946c]
PUP.Optional.SearchProtect.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\SPPDCOM|TS, 1, Quarantined, [30beea7164351f178439013bdb29b44c]
PUP.Optional.Tuto4PC, HKLM\SOFTWARE\WOW6432NODE\TUTORIALS|HostGUID, 252BFF75-86B1-4BA4-93FB-140F59F1EF88, Quarantined, [945a510aa3f6a09652ad3fbae61da060]
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\67C9CCE3-E7C3-406E-a6D3-EAB6E4D541AC|ImagePath, "C:\Program Files\shopperz030220160105\Suwygo.exe", Quarantined, [d51988d38019c37343303b82a85be917]
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\csrcc|ImagePath, "C:\Program Files\shopperz030220160105\csrcc.exe", Quarantined, [de10b5a62970a0967af9625bf40f8977]
PUP.Optional.Shopperz.BrwsrFlsh, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\shopperz030220160105 Updater|ImagePath, C:\Program Files\shopperz030220160105\Wyael.exe, Quarantined, [00ee510ad9c042f4264d4875d42fb848]
PUP.Optional.MultiPlug, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\rowugoqo|ImagePath, C:\Users\Centuck\AppData\Local\00000000-1454453233-0000-0000-8C89A508083C\snsw8C.tmp, Quarantined, [03ebaeadeeab74c277ceb52f9f64a65a]
PUP.Optional.MultiPlug, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\wucotusy|ImagePath, C:\Program Files (x86)\00000000-1454474767-0000-0000-8C89A508083C\hnsx5E51.tmp, Quarantined, [43ab02594158e2541b2c7c689370c33d]
PUP.Optional.MultiPlug, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\zigipyro|ImagePath, C:\Users\Centuck\AppData\Local\00000000-1454453768-0000-0000-8C89A508083C\qnsq2DEE.tmp, Quarantined, [ffef7fdcc3d692a4f4534f9509fa728e]
PUP.Optional.MultiPlug, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\zutuzuni|ImagePath, C:\Program Files (x86)\00000000-1454474767-0000-0000-8C89A508083C\jnsd4865.tmp, Quarantined, [5995a3b8debb88ae1136885c808344bc]
PUP.Optional.ShopperPro, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SPBIUPD|ImagePath, C:\Program Files\Common Files\ShopperPro3\spbiu.exe /service, Quarantined, [ee00005b99008caa5c74ac9a90745aa6]
PUP.Optional.SearchProtect.AppFlsh, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SPPD|ImagePath, \??\C:\WINDOWS\system32\drivers\SPPD.sys, Quarantined, [da143a217722ed49f6c9f24a50b42cd4]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{5BB7FA2A-C526-4DC5-8242-98506F0A463B}|Name, C:\Program Files\shopperz030220160105\Teoed.exe, Quarantined, [a24cc5967029d264e5643d8057ac7888]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{5BB7FA2A-C526-4DC5-8242-98506F0A463B}|Name, C:\Program Files\shopperz030220160105\Teoed.exe, Quarantined, [fcf291cae5b4f73fe9607a43ad5640c0]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{5BB7FA2A-C526-4DC5-8242-98506F0A463B}|Name, C:\Program Files\shopperz030220160105\Teoed.exe, Quarantined, [1dd10853b8e1ac8af257f4c91de6f30d]
PUP.Optional.DeskBar, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION|DeskBar.exe, 8888, Quarantined, [43aba1ba7326ed49e7cb30116b992bd5]
PUP.Optional.Search.ShrtCln, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{7D128C0F-17B6-4477-AE5A-EEE0A020BA09}|OSDFileURL, http://www-searching.com/opensearch.ashx?s=G23ztutdk0004,29690773-5a0f-4303-94a3-74a59f7968ea, Quarantined, [ab434516d3c6221485eec38417edc937]
PUP.Optional.Search.ShrtCln, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{7D128C0F-17B6-4477-AE5A-EEE0A020BA09}|FaviconURL, http://www-searching.com/favicon.ico, Quarantined, [fef052094653fd396f04eb5ca85c07f9]
PUP.Optional.Search.ShrtCln, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{7D128C0F-17B6-4477-AE5A-EEE0A020BA09}|URL, http://www-searching.com/s.ashx?prd=opensearch&q={searchTerms}&s=G23ztutdk0004,29690773-5a0f-4303-94a3-74a59f7968ea, Quarantined, [11dd5b002b6eaf87ea8949fed52f9f61]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\{5BB7FA2A-C526-4DC5-8242-98506F0A463B}|Name, C:\Program Files\shopperz030220160105\Teoed.exe, Quarantined, [4da1d18a950437ff9faa318c54af08f8]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-21-532057547-2777207124-81917641-500\SOFTWARE\{5BB7FA2A-C526-4DC5-8242-98506F0A463B}|Name, C:\Program Files\shopperz030220160105\Teoed.exe, Quarantined, [17d72f2c5b3e52e42e1b8934c14203fd]
 
Registry Data: 9
PUP.Optional.CouponMarvel, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|AppInit_DLLs, C:\ProgramData\LolliScan\AHCEM64.dll C:\Windows\system32\nvinitx.dll,C:\WINDOWS\system32\nvinitx.dll, Good: (), Bad: (C:\ProgramData\LolliScan\AHCEM64.dll),Replaced,[0ee0302b2f6a75c1f91b3bb810f4af51]
PUP.Optional.CouponMarvel, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|AppInit_DLLs, C:\ProgramData\LolliScan\AHCEM32.dll , Good: (), Bad: (C:\ProgramData\LolliScan\AHCEM32.dll),Replaced,[a24cbf9c8f0acf67967ec132e0241ae6]
PUP.Optional.Search.ShrtCln, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Start Page, http://www-searching.com/?pid=s&s=G23ztutdk0004,29690773-5a0f-4303-94a3-74a59f7968ea&vp=ch&prd=set_ie, Good: (www.google.com), Bad: (http://www-searching.com/?pid=s&s=G23ztutdk0004,29690773-5a0f-4303-94a3-74a59f7968ea&vp=ch&prd=set_ie),Replaced,[12dc96c56c2d9d99f9f9c60200048977]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{4e2b3cc4-574e-11e5-824e-806e6f6e6963}|NameServer, 104.197.191.4, Good: (), Bad: (104.197.191.4),Replaced,[aa440358405976c0fc4509cc02025da3]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{4FA22CE4-3201-449D-9228-F68481F8A701}|NameServer, 104.197.191.4, Good: (), Bad: (104.197.191.4),Replaced,[806e1348336650e6d56cbc1947bd9b65]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{6227A223-0B7A-4254-AFE3-A418AA612B4A}|NameServer, 104.197.191.4, Good: (), Bad: (104.197.191.4),Replaced,[727caeade8b10f27d66b21b421e3a55b]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{8718928D-CBEB-45EA-A621-800A9249001D}|NameServer, 104.197.191.4, Good: (), Bad: (104.197.191.4),Replaced,[af3fa8b31b7ee45280c104d1a75d2bd5]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{D5ACE908-2508-40B7-A180-3648F9EA1C43}|NameServer, 104.197.191.4, Good: (), Bad: (104.197.191.4),Replaced,[846af665debb2511fb46fed7a361e818]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{F95CBAD6-B4BF-48C2-8FA7-A86DD3CF7034}|NameServer, 104.197.191.4, Good: (), Bad: (104.197.191.4),Replaced,[836b0655dcbdfc3aa79a4f868e76ae52]
 
Folders: 99
PUP.Optional.BrowserHelper, C:\Users\Centuck\AppData\Local\BrowserHelper, Quarantined, [fbf35506cfca201642b61fa51ae99f61], 
PUP.Optional.ConvertAd, C:\Users\Centuck\AppData\Local\00000000-1454453233-0000-0000-8C89A508083C, Delete-on-Reboot, [f3fb88d31b7e50e64e4a5a6f63a014ec], 
PUP.Optional.ConvertAd, C:\Users\Centuck\AppData\Local\00000000-1454453768-0000-0000-8C89A508083C, Delete-on-Reboot, [ab4379e2e3b66cca52469b2eb54e37c9], 
PUP.Optional.MultiPlug, C:\Program Files (x86)\00000000-1454474767-0000-0000-8C89A508083C, Delete-on-Reboot, [a14d88d34b4efb3b2bf04d9722e13ac6], 
PUP.Optional.SpaceSoundPro, C:\Program Files (x86)\SpaceSondPro, Quarantined, [29c59ac1a4f539fd9742589bca39cb35], 
PUP.Optional.SpaceSoundPro, C:\Program Files\SpaceSoundPro, Quarantined, [6688a6b5aaef0e289842797a43c011ef], 
PUP.Optional.SpaceSoundPro, C:\Program Files\SpaceSoundPro\config, Quarantined, [6688a6b5aaef0e289842797a43c011ef], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Search, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Shopping, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Uninstall Wajam, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.VBates, C:\Users\Centuck\AppData\LocalLow\Company\Product\1.0, Quarantined, [8d61213a5b3ef73f0dcc2bdfe123857b], 
PUP.Optional.VBates, C:\Users\Centuck\AppData\LocalLow\Company\Product, Quarantined, [8d61213a5b3ef73f0dcc2bdfe123857b], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\Main, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\Main\bin, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\Main\rep, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\SearchProtect, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\SearchProtect\bin, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\SearchProtect\rep, Quarantined, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\bin, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Consent, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\libs, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\protection, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\protectionDS, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\settings, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\uninstall, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\rep, Quarantined, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SoundPlus, C:\Program Files\Sound+, Delete-on-Reboot, [fdf1cf8c2e6b9d99546de25a55af619f], 
PUP.Optional.SoundPlus, C:\Program Files\Sound+\config, Quarantined, [fdf1cf8c2e6b9d99546de25a55af619f], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime, Delete-on-Reboot, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime, Delete-on-Reboot, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\index-dir, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Local Storage, Delete-on-Reboot, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TrailerTime, Quarantined, [df0f56058b0eda5c0c9f2421c73d52ae], 
PUP.Optional.WindoWeather, C:\Program Files (x86)\WindoWeather, Quarantined, [35b92e2de3b6f73f4573172ec73d0ef2], 
PUP.Optional.WindoWeather, C:\Users\Centuck\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WindoWeather, Quarantined, [7e7063f8029782b49e1b2520877d22de], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105, Delete-on-Reboot, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Firefox, Quarantined, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\libraries, Quarantined, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\resources, Quarantined, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.GamesDesktop, C:\Users\Centuck\AppData\Local\gmsd_ca_005010226, Delete-on-Reboot, [509e4318cdccee48e8c2b014e71b8779], 
PUP.Optional.GamesDesktop, C:\Users\Centuck\AppData\Local\gmsd_ca_005010226\Download, Quarantined, [509e4318cdccee48e8c2b014e71b8779], 
PUP.Optional.GamesDesktop, C:\Users\Centuck\AppData\Local\gmsd_ca_005010226\gmsd_ca_005010226, Quarantined, [509e4318cdccee48e8c2b014e71b8779], 
PUP.Optional.GamesDesktop, C:\Users\Centuck\AppData\Local\gmsd_ca_005010226\gmsd_ca_005010226\1.20, Quarantined, [509e4318cdccee48e8c2b014e71b8779], 
PUP.Optional.GamesDesktop, C:\Program Files (x86)\gmsd_ca_005010226, Delete-on-Reboot, [31bdee6d92072c0a0ba083419c66629e], 
PUP.Optional.GamesDesktop, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\GAMESDESKTOP, Quarantined, [f6f8aab17f1a3df9e7c58f358d752dd3], 
PUP.Optional.Recover, C:\Users\Centuck\AppData\Local\rec_en_77, Quarantined, [a9455803bedbba7c474b2fa19b670000], 
PUP.Optional.Recover, C:\Users\Centuck\AppData\Local\rec_en_77\rec_en_77, Quarantined, [a9455803bedbba7c474b2fa19b670000], 
PUP.Optional.Recover, C:\Users\Centuck\AppData\Local\rec_en_77\rec_en_77\1.20, Quarantined, [a9455803bedbba7c474b2fa19b670000], 
PUP.Optional.Recover, C:\Program Files (x86)\rec_en_77, Delete-on-Reboot, [b33bcf8cebaeeb4b246f567a9072f010], 
PUP.Optional.SearchModule, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Extensions\jlcgehabolcakkjhgmgpkagpolbjlhfa, Quarantined, [f1fdc79438610f27c8ad6b67aa581ce4], 
PUP.Optional.SearchModule, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Extensions\jlcgehabolcakkjhgmgpkagpolbjlhfa\1.5_0, Quarantined, [f1fdc79438610f27c8ad6b67aa581ce4], 
PUP.Optional.SearchModule, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Extensions\jlcgehabolcakkjhgmgpkagpolbjlhfa\1.5_0\newtab, Quarantined, [f1fdc79438610f27c8ad6b67aa581ce4], 
PUP.Optional.SearchModule, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Extensions\jlcgehabolcakkjhgmgpkagpolbjlhfa\1.5_0\newtab\js, Quarantined, [f1fdc79438610f27c8ad6b67aa581ce4], 
PUP.Optional.SearchModule, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Extensions\jlcgehabolcakkjhgmgpkagpolbjlhfa\1.5_0\_metadata, Quarantined, [f1fdc79438610f27c8ad6b67aa581ce4], 
PUP.Optional.SpaceSoundPro, C:\Program Files (x86)\SpaceSondPro_v53.12643, Delete-on-Reboot, [34ba1249ebae64d26f9717be5aa83ac6], 
PUP.Optional.SpaceSoundPro, C:\Users\Centuck\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\SpaceSoundPro 1.0, Quarantined, [608e56058a0fa393d7302fa68f73ae52], 
PUP.Optional.VOPackage, C:\Users\Centuck\AppData\Roaming\VOPackage, Quarantined, [11ddf96281183ff7dadb7464669c718f], 
PUP.Optional.VOPackage, C:\Users\Centuck\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VOPackage, Quarantined, [b33baeadabeec86e8333bd1b7e84da26], 
PUP.Optional.Wajam, C:\Program Files (x86)\Wajam, Quarantined, [0ee0174446531323666fa63282804fb1], 
PUP.Optional.Managera, C:\Users\Centuck\AppData\Local\Temp\39fdaae5-8e0e-493c-88ec-e05c3be06e42, Quarantined, [48a6df7c3762310549ab86558e747090], 
PUP.Optional.ExTutil, C:\Users\Centuck\AppData\Local\Temp\D8ADFCCA-EE7E-442C-9999-C4D14FEF360B, Quarantined, [767883d8cbce0e28709c4597738f03fd], 
PUP.Optional.VBates, C:\Users\Centuck\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}, Quarantined, [5797d487eeab4ee8531c09d354ae5da3], 
PUP.Optional.VBates, C:\Users\Centuck\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}, Quarantined, [5797d487eeab4ee8531c09d354ae5da3], 
PUP.Optional.VBates, C:\Users\Centuck\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5, Quarantined, [5797d487eeab4ee8531c09d354ae5da3], 
PUP.Optional.VBates.WnskRST, C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}, Delete-on-Reboot, [cf1f4a116d2ce6504407499582806e92], 
PUP.Optional.VBates.WnskRST, C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}, Delete-on-Reboot, [cf1f4a116d2ce6504407499582806e92], 
PUP.Optional.VBates.WnskRST, C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5, Delete-on-Reboot, [cf1f4a116d2ce6504407499582806e92], 
PUP.Optional.CouponMarvel, C:\ProgramData\LolliScan, Delete-on-Reboot, [ee00a3b86732d75f94435b836c963fc1], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\bvxvbxxvaa, Quarantined, [dc12df7c326738feb65c1bc5bd4506fa], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\SearchProtect, Delete-on-Reboot, [1cd25605633642f402128c54e2202fd1], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\SearchProtect\SearchProtect, Delete-on-Reboot, [1cd25605633642f402128c54e2202fd1], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\SearchProtect\SearchProtect\rep, Delete-on-Reboot, [1cd25605633642f402128c54e2202fd1], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\SearchProtect\SearchProtect\STG, Quarantined, [1cd25605633642f402128c54e2202fd1], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\SearchProtect\UI, Quarantined, [1cd25605633642f402128c54e2202fd1], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\SearchProtect\UI\rep, Quarantined, [1cd25605633642f402128c54e2202fd1], 
PUP.Optional.SoundPlus, C:\Users\Centuck\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Sound+ 1.0, Quarantined, [b737c8934b4e50e609189f41956d10f0], 
PUP.Optional.DeskBar, C:\Users\Centuck\AppData\Local\DeskBar, Quarantined, [658990cb6534e94db724459b1be723dd], 
PUP.Optional.DeskBar, C:\Users\Centuck\AppData\Local\DeskBar\2.7.5.1765, Quarantined, [658990cb6534e94db724459b1be723dd], 
PUP.Optional.WindoWeather, C:\ProgramData\WindoWeatherConfig, Quarantined, [a04e3526d4c540f693b2ca1729d926da], 
PUP.Optional.ShopperPro, C:\Program Files\Common Files\ShopperPro3, Quarantined, [a8461d3efb9eab8b2b3a24bd669c54ac], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3, Delete-on-Reboot, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\FireFox, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\FireFox\content, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\JSDriver, Delete-on-Reboot, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\JSDriver\1.42.1.10635, Delete-on-Reboot, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\ProgramData\ShopperPro3, Quarantined, [638b56052a6f42f4c5a5bc424bb9ab55], 
Adware.LaSuperba, C:\uninst, Quarantined, [648a6bf0425739fd040bbf3fdd2729d7], 
PUP.Optional.ShopperPro, C:\Users\Public\Documents\ShopperPro3\JsDriver, Quarantined, [27c79bc0ddbc43f3abc04eb030d424dc], 
PUP.Optional.ShopperPro, C:\Users\Public\Documents\ShopperPro3, Quarantined, [27c79bc0ddbc43f3abc04eb030d424dc], 
 
Files: 526
PUP.Optional.CouponMarvel, C:\ProgramData\LolliScan\LolliScan.exe, Delete-on-Reboot, [aa44c596d1c84beb759f945fa361a060], 
PUP.Optional.Goobzo, C:\Program Files (x86)\ShopperPro3\JSDriver\1.42.1.10635\jsdrv.exe, Delete-on-Reboot, [1cd269f21980290d63e9508368997e82], 
PUP.Optional.Goobzo, C:\Program Files\Common Files\ShopperPro3\spbiu.exe, Quarantined, [effff566485178be5837a62c6d9434cc], 
PUP.Optional.ConvertAd, C:\Program Files (x86)\00000000-1454474767-0000-0000-8C89A508083C\jnsd4865.tmp, Delete-on-Reboot, [47a769f2adec06302013431b4fb3c53b], 
PUP.Optional.ConvertAd, C:\Users\Centuck\AppData\Local\00000000-1454453233-0000-0000-8C89A508083C\snsw8C.tmp, Delete-on-Reboot, [c02e0a51aaefaf87407516c66f929868], 
PUP.Optional.BrowseFox.Generic, C:\Program Files (x86)\00000000-1454474767-0000-0000-8C89A508083C\hnsx5E51.tmp, Quarantined, [d41a144777224fe7189557a91be57b85], 
PUP.Optional.SoundPlus, C:\Program Files\Sound+\Sound+.exe, Quarantined, [8c625b00debb62d4204e456dd1305da3], 
PUP.Optional.Goobzo, C:\Users\Centuck\AppData\Local\DeskBar\dblaunch.exe, Quarantined, [34ba1f3c168377bf84473376649dae52], 
PUP.Optional.CouponMarvel, C:\ProgramData\LolliScan\AHCEM64.dll, Quarantined, [0ee0302b2f6a75c1f91b3bb810f4af51], 
PUP.Optional.CouponMarvel, C:\ProgramData\LolliScan\AHCEM32.dll, Quarantined, [a24cbf9c8f0acf67967ec132e0241ae6], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\JSDriver\1.42.1.10635\jsdrv.sys, Quarantined, [925c3c1ffb9e9b9bade50fc343be0000], 
PUP.Optional.ShopperPro, C:\Program Files\Common Files\ShopperPro3\spbiw.sys, Quarantined, [8d61d8832c6da98d1b75e1f156ab9070], 
PUP.Optional.Goobzo, C:\ProgramData\ShopperPro3\ShopperPro364.dll, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.Goobzo, C:\ProgramData\ShopperPro3\ShopperPro3.dll, Quarantined, [866863f86a2f38feb0b1e272f50bff01], 
PUP.Optional.CouponMarvel, C:\ProgramData\LolliScan\NSISHelper.dll, Quarantined, [bf2f4a11c9d042f4bf5540b302027090], 
PUP.Optional.CouponMarvel, C:\ProgramData\LolliScan\uninstall.exe, Quarantined, [40ae42196a2f9c9abf9f286c0ef337c9], 
PUP.Optional.CouponMarvel, C:\ProgramData\Service7609\Service7609.exe, Quarantined, [509e2f2cf0a95adcc7f0895350b1e11f], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\Uninstall.exe, Quarantined, [6787e675b0e9171f0c8429a6c33e4eb2], 
PUP.Optional.SoundPlus, C:\Program Files\Sound+\uninstaller.exe, Quarantined, [3fafe5768a0f00367ab2c422946dd030], 
PUP.Optional.WindoWeather, C:\Program Files (x86)\WindoWeather\uninst.exe, Quarantined, [33bb76e5267382b4ad0ab01e48b937c9], 
PUP.Optional.Goobzo, C:\Program Files (x86)\ShopperPro3\ShopperPro3.dll, Quarantined, [0de17cdfaaef7eb8f76a80d4a25ec63a], 
PUP.Optional.Goobzo, C:\Program Files (x86)\ShopperPro3\ShopperPro364.dll, Quarantined, [9e5085d63366152151109eb6c23ede22], 
PUP.Optional.SpaceSoundPro, C:\Program Files (x86)\SpaceSondPro\Spacesoundpro.exe, Quarantined, [f7f74e0d108940f67b737a3cc93bb848], 
PUP.Optional.MaxDriver, C:\Program Files (x86)\SpaceSondPro_v53.12643\ioproduct.exe, Delete-on-Reboot, [34ba9fbc9efb00365f3b24a2c044a957], 
Adware.MaxDriver, C:\Program Files (x86)\SpaceSondPro_v53.12643\SpaceSondPro_Service.exe, Delete-on-Reboot, [b638d58633667eb8ef42eed9f014c838], 
Rootkit.Komodia.PUA, C:\Windows\System32\drivers\bsdriver.sys, Delete-on-Reboot, [905ee774e6b3f5414a9e46723dc49d63], 
Adware.Imali, C:\Users\Centuck\AppData\Local\Temp\hib17B4.exe, Quarantined, [935b77e40b8ea6900ff891c71de311ef], 
Adware.Imali, C:\Users\Centuck\AppData\Local\Temp\hibF865.exe, Quarantined, [45a91f3c65347eb8ba4da0b8679915eb], 
PUP.Optional.SoundPlus, C:\Users\Centuck\AppData\Local\Temp\MOMWK4S95B.exe, Quarantined, [25c928334f4a54e2aec0c5edb34e3fc1], 
Trojan.Injector.VB, C:\Users\Centuck\AppData\Local\Temp\msconfig.exe, Quarantined, [915d401b7d1ce056adc75375c044d828], 
PUP.Optional.ConvertAd, C:\Users\Centuck\AppData\Local\Temp\nscAA5A.tmp, Quarantined, [519d6eedadecdb5b7009392a4bb7ab55], 
PUP.Optional.ConvertAd, C:\Users\Centuck\AppData\Local\Temp\nsf127A.tmp, Quarantined, [44aaf3684a4f4ee843bd1cc7e51c9a66], 
PUP.Optional.InstallCore, c:\users\centuck\appdata\local\temp\nsk1fe5.exe, Quarantined, [08e62734debbcd69727fda0621e001ff], 
PUP.Optional.ConvertAd, C:\Users\Centuck\AppData\Local\Temp\nsp11CA.tmp, Quarantined, [4da15803e0b91323ffed8d4608f9639d], 
PUP.Optional.PennyBee, C:\Users\Centuck\AppData\Local\Temp\oprun15710.exe, Quarantined, [ae40cc8fbcddfd391517b111c63ba858], 
Trojan.Downloader, C:\Users\Centuck\AppData\Local\Temp\RMCP5XNI8\RMCP5XNI8.exe, Quarantined, [8b633c1fcdcc3bfb73426e78fb06ba46], 
PUP.Optional.Amonetize, C:\Users\Centuck\AppData\Local\Temp\f9626892-7a78-3199-abd2-97bbce96297b\adv_179.exe, Quarantined, [56980b504653bd79c85e4df84eb3de22], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\Temp\f9626892-7a78-3199-abd2-97bbce96297b\adv_35.exe, Quarantined, [2bc3c497752484b2293eac06b34e02fe], 
PUP.Optional.SilentInstaller, C:\Users\Centuck\AppData\Local\Temp\f9626892-7a78-3199-abd2-97bbce96297b\OfferInstaller.exe, Quarantined, [4ea07edd8019092d966b64e24cb42cd4], 
PUP.Optional.Goobzo, C:\Users\Centuck\AppData\Local\Temp\Install_1093\ins_shopperpro3.exe, Quarantined, [1bd35902f1a80f270d3fd6fd9f62e020], 
PUP.Optional.CouponMarvel, C:\Users\Centuck\AppData\Local\Temp\nsa44E5.tmp\NSISHelper.dll, Quarantined, [9d51f3686c2d50e6a1732cc7b54fd729], 
PUP.Optional.Tuto4PC, C:\Users\Centuck\AppData\Local\Temp\XXQQFDGWYW8N\newversion.exe, Quarantined, [0be3aab1722763d3e46dbe98b24eea16], 
PUP.Optional.Tuto4PC, C:\Users\Centuck\AppData\Local\Temp\XXQQFDGWYW8N\SVH.exe, Quarantined, [608ee77434654ceabdb7b089916f2ed2], 
PUP.Optional.OpenCandy, C:\Users\Centuck\AppData\Local\Temp\ocpBA3E.tmp\ocpBA3F.tmp, Quarantined, [08e66fec9900ff371fdde70025df649c], 
PUP.Optional.SearchProtect.AppFlsh, c:\users\centuck\appdata\local\temp\is-n0sup.tmp\cltmngsvc.exe, Quarantined, [01edf8631881f442adb9cde5e12048b8], 
PUP.Optional.SearchProtect.AppFlsh, c:\users\centuck\appdata\local\temp\is-n0sup.tmp\sptool.dll, Quarantined, [09e5ca919efbbb7b7de92092f809c739], 
PUP.Optional.SearchProtect.AppFlsh, c:\users\centuck\appdata\local\temp\is-n0sup.tmp\uninstall.exe, Quarantined, [1ad41744c5d4c96d303670424bb627d9], 
PUP.Optional.SearchProtect.AppFlsh, c:\users\centuck\appdata\local\temp\is-n0sup.tmp\uninstall.pun, Quarantined, [df0fcb909504290d6006377b58a945bb], 
PUP.Optional.ConvertAd, C:\Windows\Temp\11BF.tmp, Quarantined, [7a74b6a56a2fa096f2d8056108fa30d0], 
PUP.Optional.ConvertAd, C:\Windows\Temp\1932.tmp, Quarantined, [d31b510a2e6b12248964ab28dd24d030], 
Adware.AdLoad, C:\Windows\Temp\28F3.tmp, Delete-on-Reboot, [4ca2c09b6a2f1b1b09b79847c53cc838], 
PUP.Optional.PreInstaller, C:\Windows\Temp\38A3.tmp, Quarantined, [40aec3987227c96d6c97f54422dfd729], 
PUP.Optional.CheckOffer, C:\Windows\Temp\3D09.tmp, Quarantined, [d61860fbe9b0201656e816f903fe9d63], 
Adware.MaxDriver, C:\Windows\Temp\6ABB.tmp, Quarantined, [f5f996c51a7f55e181b0319645bf9e62], 
PUP.Optional.PennyBee, C:\Windows\Temp\CB2C.tmp, Quarantined, [04ea78e37029072feb41c101c43d8779], 
Adware.EoRezo, C:\Windows\Temp\D629.tmp, Quarantined, [9f4f4d0e0d8c8ea8b167a7269b664fb1], 
PUP.Optional.ConvertAd, C:\Windows\Temp\F4CE.tmp, Quarantined, [539b7ae1b9e056e006fae4ff758cba46], 
Adware.ConvertAd, C:\Windows\Temp\F5D.tmp, Quarantined, [fdf1fb602c6d181eee05853d35cf956b], 
PUP.Optional.ConvertAd, C:\Windows\Temp\F8A7.tmp, Quarantined, [816d2d2e7326ac8aeebf3c8a6f95db25], 
PUP.Optional.ConvertAd, C:\Users\Centuck\AppData\Local\00000000-1454453768-0000-0000-8C89A508083C\qnsq2DEE.tmp, Delete-on-Reboot, [628ce477138638feab40eee5b54c58a8], 
PUP.Optional.SearchProtect.AppFlsh, C:\Windows\apppatch\apppatch64\VCLdr64.dll, Delete-on-Reboot, [2fbf96c58910092de185c6ec728f44bc], 
Rootkit.Agent.A, C:\Windows\System32\drivers\cherimoya.sys, Delete-on-Reboot, [8f5f91caeaafb383a3459d529b67e11f], 
PUP.Optional.ShopperPro, C:\Windows\System32\Tasks\SPBIW_UpdateTask_Time_313632313238353836362d5737325a786c5a3237344541, Quarantined, [737b5ffc0099e6504ab1bb3c0bf715eb], 
PUP.Optional.ShopperPro, C:\Windows\System32\Tasks\ShopperProJSUpd, Quarantined, [5b93b8a30297c1756f604faa55ad3ec2], 
PUP.Optional.ShopperPro, C:\Windows\System32\Tasks\SPDriver, Quarantined, [ea043823316884b2d4fcab4efd054ab6], 
Trojan.Agent, C:\Users\Centuck\AppData\Local\Temp\oprun15710.exe, Quarantined, [19d57be0bcdd2c0a93f4c675669d867a], 
PUP.Optional.BrowserHelper, C:\Users\Centuck\AppData\Local\BrowserHelper\BrowserHelperBk.txt, Quarantined, [fbf35506cfca201642b61fa51ae99f61], 
PUP.Optional.BrowserHelper, C:\Users\Centuck\AppData\Local\BrowserHelper\BrowserHelper.txt, Quarantined, [fbf35506cfca201642b61fa51ae99f61], 
PUP.Optional.ConvertAd, C:\Users\Centuck\AppData\Local\00000000-1454453233-0000-0000-8C89A508083C\Uninstall.exe, Quarantined, [f3fb88d31b7e50e64e4a5a6f63a014ec], 
PUP.Optional.ConvertAd, C:\Users\Centuck\AppData\Local\00000000-1454453233-0000-0000-8C89A508083C\onsw8E.tmp, Quarantined, [f3fb88d31b7e50e64e4a5a6f63a014ec], 
PUP.Optional.ConvertAd, C:\Users\Centuck\AppData\Local\00000000-1454453233-0000-0000-8C89A508083C\pnsw8F.exe, Quarantined, [f3fb88d31b7e50e64e4a5a6f63a014ec], 
PUP.Optional.ConvertAd, C:\Users\Centuck\AppData\Local\00000000-1454453233-0000-0000-8C89A508083C\rnsw8D.exe, Quarantined, [f3fb88d31b7e50e64e4a5a6f63a014ec], 
PUP.Optional.ConvertAd, C:\Users\Centuck\AppData\Local\00000000-1454453768-0000-0000-8C89A508083C\Uninstall.exe, Quarantined, [ab4379e2e3b66cca52469b2eb54e37c9], 
PUP.Optional.MultiPlug, C:\Program Files (x86)\00000000-1454474767-0000-0000-8C89A508083C\vnsl102.tmp, Delete-on-Reboot, [a14d88d34b4efb3b2bf04d9722e13ac6], 
PUP.Optional.MultiPlug, C:\Program Files (x86)\00000000-1454474767-0000-0000-8C89A508083C\knsf3209.tmpfs, Delete-on-Reboot, [a14d88d34b4efb3b2bf04d9722e13ac6], 
PUP.Optional.MultiPlug, C:\Program Files (x86)\00000000-1454474767-0000-0000-8C89A508083C\rnss4600.exe, Quarantined, [a14d88d34b4efb3b2bf04d9722e13ac6], 
PUP.Optional.MultiPlug, C:\Program Files (x86)\00000000-1454474767-0000-0000-8C89A508083C\Uninstall.exe, Quarantined, [a14d88d34b4efb3b2bf04d9722e13ac6], 
PUP.Optional.SpaceSoundPro, C:\Users\Centuck\Desktop\SpaceSoundPro.lnk, Quarantined, [5896b1aaaeebdc5aca0e23d01de6a759], 
PUP.Optional.SpaceSoundPro, C:\Program Files (x86)\SpaceSondPro\uninstall.exe, Quarantined, [29c59ac1a4f539fd9742589bca39cb35], 
PUP.Optional.SpaceSoundPro, C:\Program Files\SpaceSoundPro\Uninstall.exe, Quarantined, [6688a6b5aaef0e289842797a43c011ef], 
PUP.Optional.SpaceSoundPro, C:\Program Files\SpaceSoundPro\silentconfigurator.exe, Quarantined, [6688a6b5aaef0e289842797a43c011ef], 
PUP.Optional.SpaceSoundPro, C:\Program Files\SpaceSoundPro\silentunconfigurator.exe, Quarantined, [6688a6b5aaef0e289842797a43c011ef], 
PUP.Optional.SpaceSoundPro, C:\Program Files\SpaceSoundPro\SpaceSoundPro.dll, Quarantined, [6688a6b5aaef0e289842797a43c011ef], 
PUP.Optional.SpaceSoundPro, C:\Program Files\SpaceSoundPro\SpaceSoundPro.exe, Quarantined, [6688a6b5aaef0e289842797a43c011ef], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\wajam.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\amazon.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\argos.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\ask.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\bestbuy.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\ebay.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\etsy.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\facebook.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\favicon.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\google.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\homedepot.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\ikea.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\imdb.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\lowes.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\mercado.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\mysearchweb.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\myshopping.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\searchresult.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\sears.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\setting.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\settings.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\shopping.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\target.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\tesco.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\tripadvisor.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\twitter.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\walmart.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\wiki.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\yahoo.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\Logos\zalando.ico, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\uninstall.exe, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer\2cc5746e309595e72aa57d2594148707, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer\45d2b3c35022619e1f0869f7c5155c67, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer\4a437684a31aff0c71c846d80be32f42.exe, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer\6b2d69e1de61df485af861d0eb1ae5ca, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer\8347cc3c49e0565613bfed213ca21a5c, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer\b0fc26332a481db9e8f05806e5a8b1ed, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer\d6e825b681150ee5cea47f07c81d9943.exe, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer\ffb034d1d8fe72723dbaa03ba882db21, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer\FiddlerCore.dll, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer\HtmlAgilityPack.dll, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer\InternetEnhancer.dll, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer\lan-proxy-settings.dat, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer\makecert.exe, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer\Newtonsoft.Json.dll, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\Program Files (x86)\WaNetworkEnhancer\WaNetworkEnhancer Internet Enhancer\WJManifest, Quarantined, [ab4385d60a8f89adc07c0def5aa95aa6], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Wajam Website.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Settings.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\SignIn with Facebook.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\SignIn with Twitter.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Search\Ask.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Search\Google.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Search\IMDb.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Search\Shopping.com.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Search\TripAdvisor.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Search\Wikipedia.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Search\Yahoo!.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Shopping\Amazon.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Shopping\Argos.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Shopping\Ebay.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Shopping\Etsy.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Shopping\HomeDepot.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Shopping\Ikea.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Shopping\Lowe's.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Shopping\Mercadolivre.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Shopping\MyShopping.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Shopping\Sears.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Shopping\Target.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Shopping\Tesco.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Shopping\Walmart.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Explore Social Shopping\Zalando.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.Wajam, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WaNetworkEnhancer\Uninstall Wajam\uninstall.lnk, Quarantined, [46a899c23d5c1e18eb53af4d55ae4fb1], 
PUP.Optional.VBates, C:\Users\Centuck\AppData\LocalLow\Company\Product\1.0\localStorageIE.txt, Quarantined, [8d61213a5b3ef73f0dcc2bdfe123857b], 
PUP.Optional.VBates, C:\Users\Centuck\AppData\LocalLow\Company\Product\1.0\localStorageIE_backup.txt, Quarantined, [8d61213a5b3ef73f0dcc2bdfe123857b], 
PUP.Optional.VBates.WnskRST, C:\Users\Centuck\AppData\Local\Temp\shopperz030220160105_installer_1454475347.txt, Quarantined, [2fbf76e5fe9b21156de495a2e32138c8], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\EULA.txt, Quarantined, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\Main\bin\CltMngSvc.exe, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\Main\bin\SPtool.dll, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\Main\bin\uninstall.exe, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\Main\bin\uninstall.pun, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\Main\rep\cfi.bin, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\Main\rep\edk.bin, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\Main\rep\pni.bin, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\Main\rep\SystemRepository.dat, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\Main\rep\trn.bin, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\SearchProtect\bin\cltmng.exe, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\SearchProtect\bin\RN32.dll, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\SearchProtect\bin\SPtool64.exe, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\SearchProtect\bin\VC32.dll, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\SearchProtect\bin\VC32Loader.dll, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\SearchProtect\bin\VC64.dll, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\SearchProtect\bin\VC64Loader.dll, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\bin\cltmngui.exe, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\settings.html, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\style.css, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Consent\consent.css, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Consent\consent.html, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Consent\consent.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Consent\defaults.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\bgUninstall.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\hez-def-grey.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\Apply-default.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\Apply-onclick.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\Apply-Rollover.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\bg-dia.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\bg-uninstall.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\bg-with-logo.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\bg.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\bgNotif.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\bgSettings.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\bgSettingsDS.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\btnBlue.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\btnClose.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\btnSilver.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\button-bg.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\checkbox.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\checkbox_checked.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\checkbox_def.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\close-win-def.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\close-win-over-click.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\gray-bg.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\hez-def.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\hez-selected.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\hez.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\icon-win.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\info-icon.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\menu-rollover.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\menu-selected.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\radio-button-def.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\radio-button-selected.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\radio-button.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\radio-button2.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\Settings-icon.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\SP_DialogBG.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\text-field.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\v.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\Images\x.png, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\libs\defaults.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\libs\DialogAPI.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\libs\dialogUtils.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\libs\jquery.1.7.1.min.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\libs\json2.min.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\libs\main.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\protection\defaults.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\protection\protection.css, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\protection\protection.html, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\protection\protection.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\protectionDS\defaults.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\protectionDS\protectionDS.css, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\protectionDS\protectionDS.html, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\protectionDS\protectionDS.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\settings\defaults.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\settings\settings.css, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\settings\settings.html, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\settings\settings.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\uninstall\defaults.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\uninstall\uninstall.css, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\uninstall\uninstall.html, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Program Files (x86)\SearchProtect\UI\dialogs\uninstall\uninstall.js, Delete-on-Reboot, [8d6184d7435673c3b6e73a0214f020e0], 
PUP.Optional.SearchProtect.AppFlsh, C:\Windows\System32\Tasks\bvxvbxxvaa, Quarantined, [b539302be4b53df929766bd13dc7bd43], 
PUP.Optional.SearchProtect.AppFlsh, C:\Windows\apppatch\Custom\{8a4d5a43-c64a-45ab-bdf4-804fe18ceafd}.sdb, Delete-on-Reboot, [32bcd982a3f663d36045102c9371aa56], 
PUP.Optional.SearchProtect.AppFlsh, C:\Windows\apppatch\Custom\Custom64\{cf2797aa-b7ec-e311-8ed9-005056c00008}.sdb, Delete-on-Reboot, [747a9bc00c8d2b0bddc962dab450c63a], 
PUP.Optional.SearchProtect.AppFlsh, C:\Windows\apppatch\nbin\VC32Loader.dll, Delete-on-Reboot, [e30b62f98f0a66d06146d864f21260a0], 
PUP.Optional.SoundPlus, C:\Program Files\Sound+\silentunconfigurator.exe, Quarantined, [fdf1cf8c2e6b9d99546de25a55af619f], 
PUP.Optional.SoundPlus, C:\Program Files\Sound+\backup_Intel® Display Audio_SAMSUNG.reg, Quarantined, [fdf1cf8c2e6b9d99546de25a55af619f], 
PUP.Optional.SoundPlus, C:\Program Files\Sound+\backup_Realtek High Definition Audio_Realtek Digital Output.reg, Quarantined, [fdf1cf8c2e6b9d99546de25a55af619f], 
PUP.Optional.SoundPlus, C:\Program Files\Sound+\backup_Realtek High Definition Audio_Speakers.reg, Quarantined, [fdf1cf8c2e6b9d99546de25a55af619f], 
PUP.Optional.SoundPlus, C:\Program Files\Sound+\config.conf, Quarantined, [fdf1cf8c2e6b9d99546de25a55af619f], 
PUP.Optional.SoundPlus, C:\Program Files\Sound+\idscservice.exe, Delete-on-Reboot, [fdf1cf8c2e6b9d99546de25a55af619f], 
PUP.Optional.SoundPlus, C:\Program Files\Sound+\silentconfigurator.exe, Quarantined, [fdf1cf8c2e6b9d99546de25a55af619f], 
PUP.Optional.SoundPlus, C:\Program Files\Sound+\SoundP.dll, Delete-on-Reboot, [fdf1cf8c2e6b9d99546de25a55af619f], 
PUP.Optional.SoundPlus, C:\Program Files\Sound+\Uninstall.exe, Quarantined, [fdf1cf8c2e6b9d99546de25a55af619f], 
PUP.Optional.SoundPlus, C:\Program Files\Sound+\config\SoundPUser.conf, Quarantined, [fdf1cf8c2e6b9d99546de25a55af619f], 
PUP.Optional.BestPriceNinja, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_pstatic.bestpriceninja.com_0.localstorage, Quarantined, [24ca015ad9c0241287c73d040400d52b], 
PUP.Optional.BestPriceNinja, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_pstatic.bestpriceninja.com_0.localstorage-journal, Quarantined, [d717ca917722f0463f0fdf62020203fd], 
PUP.Optional.Wajam, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.technologiesainturbain.com_0.localstorage, Quarantined, [3eb06af16c2dc175b025e55f24e052ae], 
PUP.Optional.Wajam, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.technologiesainturbain.com_0.localstorage-journal, Quarantined, [0ae4b3a863362412884d7dc73ec6659b], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\AutoUpdater.Config, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\au.exe, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\ffmpegsumo.dll, Delete-on-Reboot, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\icudtl.dat, Delete-on-Reboot, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\nw.pak, Delete-on-Reboot, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\storage.json, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\TrailerTime.exe, Delete-on-Reboot, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\hr.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\am.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\ar.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\bg.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\bn.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\ca.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\cs.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\da.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\de.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\el.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\en-GB.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\en-US.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\es-419.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\es.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\et.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\fa.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\fi.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\fil.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\fr.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\gu.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\hi.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\hu.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\id.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\it.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\iw.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\ja.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\kn.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\ko.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\lt.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\lv.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\ml.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\mr.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\ms.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\nl.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\no.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\pl.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\pt-BR.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\pt-PT.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\ro.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\ru.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\sk.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\sl.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\sr.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\sv.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\sw.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\ta.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\te.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\th.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\tr.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\uk.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\vi.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\zh-CN.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\TrailerTime\locales\zh-TW.pak, Quarantined, [13db3d1edbbe7db951582520a75df808], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\cookies, Delete-on-Reboot, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\cookies-journal, Delete-on-Reboot, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\lockfile, Delete-on-Reboot, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Web Data, Delete-on-Reboot, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Web Data-journal, Delete-on-Reboot, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\0aff91c56bb3d8dd_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\0fb603838d9de3e4_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\0fc3db66b9cbe75d_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\13be6486b71d5e97_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\151dbec9ae7d06d5_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\1b5110af07be9699_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\1d12ee2a62023e01_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\234986793e71f265_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\26968e7a0c71776d_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\5ad2330aae296778_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\5b26927a01b8f6d4_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\5ede7465ad814101_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\62994b7d4d2ec3b0_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\6642bc4c48496691_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\66f296ed7a350251_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\6762b29436a54ba4_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\8a096b452433e4f2_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\8a1dad150776f0d8_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\8b62b05d51f740fb_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\90e6aa2aaa210594_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\985f07ef62d57d54_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\9f2516e850882bc3_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\a58c1fe23e6f2102_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\a5d2a2de5f550ae0_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\a7110a1b14f0e72a_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\c9e5d42560e7179f_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\d42d35561ed086f0_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\da4ec3da172f4c99_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\db823ce7c2077fb6_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\dc2747227c02f053_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\dd952dda2959aa8f_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\e35c10235cf04f25_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\e45841fbf11f0a83_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\e593fb33905e8c92_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\e6d4090cb7a4ebdd_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\f23e5a4e32953f56_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\fe824b31c4f9a9f4_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\index, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\6dd59deb58de5bce_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\728b33f36ada3110_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\76552f398dfc3681_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\769d76d0e428d70d_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\772fb64d630d85c6_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\7b389166891d6b30_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\7c68233653fd2c54_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\7f5181830440e005_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\8289a2ee2104a365_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\83f7d67a1401bab9_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\2ad46c9e9573fd35_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\2c238c96a3cfbdfd_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\3f32f6511d6ebf19_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\407af704f8dce0c0_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\46b87681ecd2e447_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\51667bdc8d050d22_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\54c7c4bd81913865_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\5873be2f24fe322a_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\59ee21fedb9154eb_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\aa2dee8a3e1ba32a_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\ac3e76a506bc912c_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\b19600b30866b901_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\b249e66422cc95dd_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\b3edef432256edd5_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\b66087594e0dc481_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\b864b97e717c98f7_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\be104a3a602e2429_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\be8ee497450322a7_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\c1abb3b0c8096936_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\c542c0e6e83738fb_0, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Cache\index-dir\the-real-index, Quarantined, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Local Storage\file__0.localstorage, Delete-on-Reboot, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Local Storage\file__0.localstorage-journal, Delete-on-Reboot, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Local Storage\http_www.imdb.com_0.localstorage, Delete-on-Reboot, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Local\TrailerTime\Local Storage\http_www.imdb.com_0.localstorage-journal, Delete-on-Reboot, [03eb263502978da9aa00aa9b53b137c9], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TrailerTime\Uninstall.lnk, Quarantined, [df0f56058b0eda5c0c9f2421c73d52ae], 
PUP.Optional.TrailerTime, C:\Users\Centuck\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TrailerTime\TrailerTime.lnk, Quarantined, [df0f56058b0eda5c0c9f2421c73d52ae], 
PUP.Optional.WindoWeather, C:\Program Files (x86)\WindoWeather\Version.dat, Quarantined, [35b92e2de3b6f73f4573172ec73d0ef2], 
PUP.Optional.WindoWeather, C:\Program Files (x86)\WindoWeather\Compaign.dat, Quarantined, [35b92e2de3b6f73f4573172ec73d0ef2], 
PUP.Optional.WindoWeather, C:\Program Files (x86)\WindoWeather\Events.dat, Quarantined, [35b92e2de3b6f73f4573172ec73d0ef2], 
PUP.Optional.WindoWeather, C:\Program Files (x86)\WindoWeather\WindoWeather.exe, Quarantined, [35b92e2de3b6f73f4573172ec73d0ef2], 
PUP.Optional.WindoWeather, C:\Users\Centuck\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WindoWeather\WindoWeather.lnk, Quarantined, [7e7063f8029782b49e1b2520877d22de], 
PUP.Optional.ShopperPro, C:\Windows\System32\Tasks\ShopperPro3, Quarantined, [14da0e4d2376e4526664ef579b6933cd], 
PUP.Optional.CouponMarvel, C:\Windows\System32\Tasks\FDOJFP1, Quarantined, [8e6093c82376fd39933a4dfb0afa916f], 
PUP.Optional.CouponMarvel, C:\Windows\Tasks\FDOJFP1.job, Quarantined, [0be30c4f5247f541c30cc38546be3cc4], 
Trojan.FakeAlert, C:\Users\Centuck\AppData\Local\Temp\V0BHKEE1YD\testversion.exe, Quarantined, [fbf37ae1eeab36009c5ef157b64e718f], 
PUP.Optional.GamesDesktop, C:\Program Files (x86)\gmsd_ca_005010226\gmsd_ca_005010226.exe, Delete-on-Reboot, [6d8197c4b6e31d197ed6e8ed38cbec14], 
PUP.Optional.Recover, C:\Program Files (x86)\rec_en_77\rec_en_77.exe, Delete-on-Reboot, [678755063f5a3df90a5bf8f40ff4d62a], 
PUP.Optional.Package, C:\Users\Centuck\AppData\Roaming\VOPackage\VOPackage.exe, Quarantined, [2ac456053a5f16208ec95f8850b36997], 
PUP.Optional.IOProtect, C:\Program Files (x86)\SpaceSondPro_v53.12643\ioproduct_service.bat, Quarantined, [b9350b505d3c94a269b8e51f8084c43c], 
Adware.MaxDriver, C:\Program Files (x86)\SpaceSondPro_v53.12643\ioproduct_service.bat, Quarantined, [4ea05b00e1b8dd59b0202c1dff05ec14], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Suwygo.exe, Delete-on-Reboot, [d51988d38019c37343303b82a85be917], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\csrcc.exe, Delete-on-Reboot, [de10b5a62970a0967af9625bf40f8977], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Wyael.exe, Delete-on-Reboot, [00ee510ad9c042f4264d4875d42fb848], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Aiwuao.dll, Delete-on-Reboot, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Aiwuao64.dll, Delete-on-Reboot, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Dakecusu.dll, Delete-on-Reboot, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Dakecusu64.dll, Delete-on-Reboot, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Eojowro.dll, Delete-on-Reboot, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Eojowro64.dll, Delete-on-Reboot, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Ixumnip.dll, Quarantined, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Ixumnip64.dll, Quarantined, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Loegfi.dll, Delete-on-Reboot, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Loegfi64.dll, Delete-on-Reboot, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\nfregdrv64.exe, Quarantined, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\prc.exe, Delete-on-Reboot, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Qeocfuu.bat, Quarantined, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\setup.ico, Quarantined, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Teoed.exe, Delete-on-Reboot, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Teoed64.exe, Delete-on-Reboot, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\tree.js, Quarantined, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\unins000.exe, Delete-on-Reboot, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\wrapper.exe, Quarantined, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Firefox\InstallerHelper.bin, Quarantined, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\Firefox\{A0C927BB-FCA6-4173-8F22-025121F0BED7}.xpi, Quarantined, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\libraries\DataExchangeScript.js, Quarantined, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.Shopperz.BrwsrFlsh, C:\Program Files\shopperz030220160105\resources\LocalScript.js, Quarantined, [31bd73e8c3d6f73ff743ac06867c34cc], 
PUP.Optional.GamesDesktop, C:\Users\Centuck\AppData\Local\gmsd_ca_005010226\upgmsd_ca_005010226.cyl, Quarantined, [509e4318cdccee48e8c2b014e71b8779], 
PUP.Optional.GamesDesktop, C:\Users\Centuck\AppData\Local\gmsd_ca_005010226\upgmsd_ca_005010226.exe, Delete-on-Reboot, [509e4318cdccee48e8c2b014e71b8779], 
PUP.Optional.GamesDesktop, C:\Users\Centuck\AppData\Local\gmsd_ca_005010226\user_profil.cyp, Quarantined, [509e4318cdccee48e8c2b014e71b8779], 
PUP.Optional.GamesDesktop, C:\Users\Centuck\AppData\Local\gmsd_ca_005010226\Download\majmp_gentleeeuu.exe, Quarantined, [509e4318cdccee48e8c2b014e71b8779], 
PUP.Optional.GamesDesktop, C:\Users\Centuck\AppData\Local\gmsd_ca_005010226\gmsd_ca_005010226\1.20\cnf.cyl, Quarantined, [509e4318cdccee48e8c2b014e71b8779], 
PUP.Optional.GamesDesktop, C:\Program Files (x86)\gmsd_ca_005010226\gamesdesktop_widget.exe, Quarantined, [31bdee6d92072c0a0ba083419c66629e], 
PUP.Optional.GamesDesktop, C:\Program Files (x86)\gmsd_ca_005010226\gmsd_ca_005010226 - uninstall.dat, Quarantined, [31bdee6d92072c0a0ba083419c66629e], 
PUP.Optional.GamesDesktop, C:\Program Files (x86)\gmsd_ca_005010226\gmsd_ca_005010226 - uninstall.exe, Quarantined, [31bdee6d92072c0a0ba083419c66629e], 
PUP.Optional.GamesDesktop, C:\Program Files (x86)\gmsd_ca_005010226\predm.exe, Quarantined, [31bdee6d92072c0a0ba083419c66629e], 
PUP.Optional.GamesDesktop, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\GAMESDESKTOP\GamesDesktop.lnk, Quarantined, [f6f8aab17f1a3df9e7c58f358d752dd3], 
PUP.Optional.Recover, C:\Users\Centuck\AppData\Local\rec_en_77\rec_en_77\1.20\cnf.cyl, Quarantined, [a9455803bedbba7c474b2fa19b670000], 
PUP.Optional.Recover, C:\Program Files (x86)\rec_en_77\rec_en_77 - uninstall.dat, Quarantined, [b33bcf8cebaeeb4b246f567a9072f010], 
PUP.Optional.Recover, C:\Program Files (x86)\rec_en_77\rec_en_77 - uninstall.exe, Quarantined, [b33bcf8cebaeeb4b246f567a9072f010], 
PUP.Optional.SearchModule, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Extensions\jlcgehabolcakkjhgmgpkagpolbjlhfa\1.5_0\favicon.png, Quarantined, [f1fdc79438610f27c8ad6b67aa581ce4], 
PUP.Optional.SearchModule, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Extensions\jlcgehabolcakkjhgmgpkagpolbjlhfa\1.5_0\manifest.json, Quarantined, [f1fdc79438610f27c8ad6b67aa581ce4], 
PUP.Optional.SearchModule, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Extensions\jlcgehabolcakkjhgmgpkagpolbjlhfa\1.5_0\newtab\newtab-hp.html, Quarantined, [f1fdc79438610f27c8ad6b67aa581ce4], 
PUP.Optional.SearchModule, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Extensions\jlcgehabolcakkjhgmgpkagpolbjlhfa\1.5_0\newtab\js\background.js, Quarantined, [f1fdc79438610f27c8ad6b67aa581ce4], 
PUP.Optional.SearchModule, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Extensions\jlcgehabolcakkjhgmgpkagpolbjlhfa\1.5_0\newtab\js\newtab-hp.js, Quarantined, [f1fdc79438610f27c8ad6b67aa581ce4], 
PUP.Optional.SearchModule, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Extensions\jlcgehabolcakkjhgmgpkagpolbjlhfa\1.5_0\_metadata\verified_contents.json, Quarantined, [f1fdc79438610f27c8ad6b67aa581ce4], 
PUP.Optional.SpaceSoundPro, C:\Program Files (x86)\SpaceSondPro_v53.12643\config.cfg, Quarantined, [34ba1249ebae64d26f9717be5aa83ac6], 
PUP.Optional.SpaceSoundPro, C:\Program Files (x86)\SpaceSondPro_v53.12643\ioprotect_conf.xml, Quarantined, [34ba1249ebae64d26f9717be5aa83ac6], 
PUP.Optional.SpaceSoundPro, C:\Program Files (x86)\SpaceSondPro_v53.12643\SpaceSondPro_Service.exe, Delete-on-Reboot, [34ba1249ebae64d26f9717be5aa83ac6], 
PUP.Optional.SpaceSoundPro, C:\Program Files (x86)\SpaceSondPro_v53.12643\workXML.xml, Quarantined, [34ba1249ebae64d26f9717be5aa83ac6], 
PUP.Optional.SpaceSoundPro, C:\Users\Centuck\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\SpaceSoundPro 1.0\SpaceSoundPro.lnk, Quarantined, [608e56058a0fa393d7302fa68f73ae52], 
PUP.Optional.SpaceSoundPro, C:\Users\Centuck\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\SpaceSoundPro 1.0\Uninstall.lnk, Quarantined, [608e56058a0fa393d7302fa68f73ae52], 
PUP.Optional.VOPackage, C:\Users\Centuck\AppData\Roaming\VOPackage\Uninstall.exe, Quarantined, [11ddf96281183ff7dadb7464669c718f], 
PUP.Optional.VOPackage, C:\Users\Centuck\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VOPackage\Configure.lnk, Quarantined, [b33baeadabeec86e8333bd1b7e84da26], 
PUP.Optional.Wajam, C:\Program Files (x86)\Wajam\uninstall.exe, Quarantined, [0ee0174446531323666fa63282804fb1], 
PUP.Optional.Managera, C:\Users\Centuck\AppData\Local\Temp\39fdaae5-8e0e-493c-88ec-e05c3be06e42\cs.js, Quarantined, [48a6df7c3762310549ab86558e747090], 
PUP.Optional.Managera, C:\Users\Centuck\AppData\Local\Temp\39fdaae5-8e0e-493c-88ec-e05c3be06e42\manifest.json, Quarantined, [48a6df7c3762310549ab86558e747090], 
PUP.Optional.ExTutil, C:\Users\Centuck\AppData\Local\Temp\D8ADFCCA-EE7E-442C-9999-C4D14FEF360B\bk.js, Quarantined, [767883d8cbce0e28709c4597738f03fd], 
PUP.Optional.ExTutil, C:\Users\Centuck\AppData\Local\Temp\D8ADFCCA-EE7E-442C-9999-C4D14FEF360B\cs.js, Quarantined, [767883d8cbce0e28709c4597738f03fd], 
PUP.Optional.ExTutil, C:\Users\Centuck\AppData\Local\Temp\D8ADFCCA-EE7E-442C-9999-C4D14FEF360B\manifest.json, Quarantined, [767883d8cbce0e28709c4597738f03fd], 
PUP.Optional.VBates, C:\Users\Centuck\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5\config.js, Quarantined, [5797d487eeab4ee8531c09d354ae5da3], 
PUP.Optional.VBates, C:\Users\Centuck\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5\tree.js, Quarantined, [5797d487eeab4ee8531c09d354ae5da3], 
PUP.Optional.VBates, C:\Users\Centuck\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5\wlist.js, Quarantined, [5797d487eeab4ee8531c09d354ae5da3], 
PUP.Optional.VBates.WnskRST, C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5\config.js, Delete-on-Reboot, [cf1f4a116d2ce6504407499582806e92], 
PUP.Optional.CouponMarvel, C:\ProgramData\LolliScan\install.log, Quarantined, [ee00a3b86732d75f94435b836c963fc1], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\bvxvbxxvaa\bahvxfk, Quarantined, [dc12df7c326738feb65c1bc5bd4506fa], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\bvxvbxxvaa\bvxvbxxvaa.exe, Quarantined, [dc12df7c326738feb65c1bc5bd4506fa], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\bvxvbxxvaa\mkfvxfk, Quarantined, [dc12df7c326738feb65c1bc5bd4506fa], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\bvxvbxxvaa\pbqrmvbub, Quarantined, [dc12df7c326738feb65c1bc5bd4506fa], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\bvxvbxxvaa\pvpqbjobmlpfqlovvawq, Quarantined, [dc12df7c326738feb65c1bc5bd4506fa], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\bvxvbxxvaa\qokvxfk, Quarantined, [dc12df7c326738feb65c1bc5bd4506fa], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\bvxvbxxvaa\rfobmlpfqlovvawq, Quarantined, [dc12df7c326738feb65c1bc5bd4506fa], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\bvxvbxxvaa\rpboobmlpfqlovvawq, Quarantined, [dc12df7c326738feb65c1bc5bd4506fa], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\bvxvbxxvaa\ycfvxfk, Quarantined, [dc12df7c326738feb65c1bc5bd4506fa], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\SearchProtect\SearchProtect\rep\Cvc.dat, Quarantined, [1cd25605633642f402128c54e2202fd1], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\SearchProtect\SearchProtect\rep\UserRepository.dat, Delete-on-Reboot, [1cd25605633642f402128c54e2202fd1], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\SearchProtect\SearchProtect\rep\UserSettings.dat, Quarantined, [1cd25605633642f402128c54e2202fd1], 
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Centuck\AppData\Local\SearchProtect\UI\rep\UIRepository.dat, Quarantined, [1cd25605633642f402128c54e2202fd1], 
PUP.Optional.SoundPlus, C:\Users\Centuck\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Sound+ 1.0\Sound+.lnk, Quarantined, [b737c8934b4e50e609189f41956d10f0], 
PUP.Optional.SoundPlus, C:\Users\Centuck\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Sound+ 1.0\Uninstall.lnk, Quarantined, [b737c8934b4e50e609189f41956d10f0], 
PUP.Optional.DeskBar, C:\Users\Centuck\AppData\Local\DeskBar\unins000.dat, Quarantined, [658990cb6534e94db724459b1be723dd], 
PUP.Optional.DeskBar, C:\Users\Centuck\AppData\Local\DeskBar\unins000.exe, Quarantined, [658990cb6534e94db724459b1be723dd], 
PUP.Optional.DeskBar, C:\Users\Centuck\AppData\Local\DeskBar\2.7.5.1765\DeskBar.exe, Quarantined, [658990cb6534e94db724459b1be723dd], 
PUP.Optional.WindoWeather, C:\ProgramData\WindoWeatherConfig\Enable.json, Quarantined, [a04e3526d4c540f693b2ca1729d926da], 
PUP.Optional.WindoWeather, C:\ProgramData\WindoWeatherConfig\Sample.json, Quarantined, [a04e3526d4c540f693b2ca1729d926da], 
PUP.Optional.ShopperPro, C:\Program Files\Common Files\ShopperPro3\spbia.exe, Quarantined, [a8461d3efb9eab8b2b3a24bd669c54ac], 
PUP.Optional.ShopperPro, C:\Program Files\Common Files\ShopperPro3\spbici32.dll, Quarantined, [a8461d3efb9eab8b2b3a24bd669c54ac], 
PUP.Optional.ShopperPro, C:\Program Files\Common Files\ShopperPro3\spbici64.dll, Quarantined, [a8461d3efb9eab8b2b3a24bd669c54ac], 
PUP.Optional.ShopperPro, C:\Program Files\Common Files\ShopperPro3\spbii32.exe, Quarantined, [a8461d3efb9eab8b2b3a24bd669c54ac], 
PUP.Optional.ShopperPro, C:\Program Files\Common Files\ShopperPro3\spbii64.exe, Quarantined, [a8461d3efb9eab8b2b3a24bd669c54ac], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\config.json, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\database1_0_0.ej, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\database1_0_0.json, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\ShopperPro3.exe, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\SPRemove.exe, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\Updater.exe, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\FireFox\chrome.manifest, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\FireFox\install.rdf, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\FireFox\content\overlay.js, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\FireFox\content\overlay.xul, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\FireFox\content\shopperpro_128.png, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\JSDriver\jsdrv.exe, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\JSDriver\jsdrv.sys, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\JSDriver\1.42.1.10635\config.json, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\Program Files (x86)\ShopperPro3\JSDriver\1.42.1.10635\database1_0_0.ej, Quarantined, [5a94b1aacbce87afbdaf4cb216eedd23], 
PUP.Optional.ShopperPro, C:\ProgramData\ShopperPro3\config.json, Quarantined, [638b56052a6f42f4c5a5bc424bb9ab55], 
PUP.Optional.ShopperPro, C:\ProgramData\ShopperPro3\database1_0_0.ej, Quarantined, [638b56052a6f42f4c5a5bc424bb9ab55], 
PUP.Optional.ShopperPro, C:\ProgramData\ShopperPro3\spbihe.js, Quarantined, [638b56052a6f42f4c5a5bc424bb9ab55], 
PUP.Optional.VBSLoader, C:\task.vbs, Quarantined, [29c5e675cecb5bdb331f2bd245bfdb25], 
Adware.LaSuperba, C:\uninst\uninstall.html, Quarantined, [648a6bf0425739fd040bbf3fdd2729d7], 
PUP.Optional.Trovi, C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences, Good: ("session":{"restore_on_startup":4,"startup_urls":["https://www.malwarebytes.org/restorebrowser/"]}}), Bad: ("session":{"restore_on_startup":4,"startup_urls":["http://www.trovi.com/?gd=&ctid=CT3325161&octid=EB_ORIGINAL_CTID&ISID=MC6E846E3-51F8-4BAC-8DBF-AEECCA4F78F6&SearchSource=55&CUI=&UM=8&UP=SP2619DB45-103F-439B-8528-035061C84D58&D=020216&SSPV="]},"sync":{"remaining_rollback_tries":0}}), Replaced,[faf4025959401e18293e07f850b4bb45]
PUP.Optional.ShopperPro, C:\Users\Public\Documents\ShopperPro3\JsDriver\Config.xml, Quarantined, [27c79bc0ddbc43f3abc04eb030d424dc], 
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)
 
Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 2016-02-02
Scan Time: 11:13 PM
Logfile: 
Administrator: Yes
 
Version: 2.2.0.1024
Malware Database: v2016.02.02.06
Rootkit Database: v2016.01.20.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
 
OS: Windows 8.1
CPU: x64
File System: NTFS
User: Centuck
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 420661
Time Elapsed: 27 min, 45 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
Processes: 0
(No malicious items detected)
 
Modules: 0
(No malicious items detected)
 
Registry Keys: 23
PUP.Optional.VBates, HKLM\SOFTWARE\CLASSES\APPID\{425F4ABF-B8E4-402D-9E49-06E494EB8DBF}, Quarantined, [509ee7740990989e8b6a95d3ab579e62], 
PUP.Optional.VBates, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{425F4ABF-B8E4-402D-9E49-06E494EB8DBF}, Quarantined, [509ee7740990989e8b6a95d3ab579e62], 
PUP.Optional.VBates, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\{425F4ABF-B8E4-402D-9E49-06E494EB8DBF}, Quarantined, [509ee7740990989e8b6a95d3ab579e62], 
PUP.Optional.VBates, HKLM\SOFTWARE\CLASSES\CLSID\{08ACFB57-8187-47f0-AF93-56360D03634A}, Quarantined, [2ac47be01b7efd392b689b0029d9e719], 
PUP.Optional.VBates, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{08ACFB57-8187-47F0-AF93-56360D03634A}, Quarantined, [2ac47be01b7efd392b689b0029d9e719], 
PUP.Optional.VBates, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{08ACFB57-8187-47F0-AF93-56360D03634A}, Quarantined, [2ac47be01b7efd392b689b0029d9e719], 
PUP.Optional.VBates, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{7D8DAE88-BC05-4578-8C29-E541FFBA5757}, Quarantined, [945aaead5b3e30068573561245bd7e82], 
PUP.Optional.VBates, HKLM\SOFTWARE\CLASSES\TYPELIB\{14EF423E-3EE8-44AE-9337-07AC3F27B744}, Quarantined, [945aaead5b3e30068573561245bd7e82], 
PUP.Optional.VBates, HKLM\SOFTWARE\CLASSES\INTERFACE\{A9582D7B-F24A-441D-9D26-450D58F3CD17}, Quarantined, [945aaead5b3e30068573561245bd7e82], 
PUP.Optional.VBates, HKLM\SOFTWARE\CLASSES\INTERFACE\{EE0D8859-2ED4-4B0D-9812-16865B9AFD65}, Quarantined, [945aaead5b3e30068573561245bd7e82], 
PUP.Optional.VBates, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{A9582D7B-F24A-441D-9D26-450D58F3CD17}, Quarantined, [945aaead5b3e30068573561245bd7e82], 
PUP.Optional.VBates, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{EE0D8859-2ED4-4B0D-9812-16865B9AFD65}, Quarantined, [945aaead5b3e30068573561245bd7e82], 
PUP.Optional.VBates, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{A9582D7B-F24A-441D-9D26-450D58F3CD17}, Quarantined, [945aaead5b3e30068573561245bd7e82], 
PUP.Optional.VBates, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{EE0D8859-2ED4-4B0D-9812-16865B9AFD65}, Quarantined, [945aaead5b3e30068573561245bd7e82], 
PUP.Optional.VBates, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{14EF423E-3EE8-44AE-9337-07AC3F27B744}, Quarantined, [945aaead5b3e30068573561245bd7e82], 
PUP.Optional.VBates, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{14EF423E-3EE8-44AE-9337-07AC3F27B744}, Quarantined, [945aaead5b3e30068573561245bd7e82], 
PUP.Optional.VBates, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{7D8DAE88-BC05-4578-8C29-E541FFBA5757}, Quarantined, [945aaead5b3e30068573561245bd7e82], 
PUP.Optional.SearchProtect.AppFlsh, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\SearchProtect, Quarantined, [7c727be03861e650aa033c00cc38df21], 
PUP.Optional.Tuto4PC, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\TutoTag, Quarantined, [f6f83a21aaef280ebe3d4eab2dd6bf41], 
PUP.Optional.Trovi, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{015DB5FA-EAFB-4592-A95B-F44D3EE87FA9}, Quarantined, [0de1d08b2970e353d3c32fca49ba0bf5], 
PUP.Optional.Tuto4PC, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\TUTORIALS\updatetutorialeshp, Quarantined, [6985ca916f2a063015e36c8d937031cf], 
PUP.Optional.Tuto4PC, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\TUTORIALS\updatetutorialshp, Quarantined, [1cd2bf9cb6e37abcf207b94016ed44bc], 
PUP.Optional.Tuto4PC, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\TUTORIALS\updv, Quarantined, [608eda81d3c6e84ef505c33605feda26], 
 
Registry Values: 4
PUP.Optional.IEAudioAds, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\INSTALLPATH\STATUS|NuvisionDataRemarketer, P, Quarantined, [c32ba8b363367abc3a5a8f4a83807987]
PUP.Optional.Trovi, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{015DB5FA-EAFB-4592-A95B-F44D3EE87FA9}|URL, http://www.trovi.com/Results.aspx?gd=&ctid=CT3325161&octid=EB_ORIGINAL_CTID&ISID=MC6E846E3-51F8-4BAC-8DBF-AEECCA4F78F6&SearchSource=58&CUI=&UM=8&UP=SP2619DB45-103F-439B-8528-035061C84D58&D=020216&q={searchTerms}&SSPV=, Quarantined, [836be77445545adc2471748534cf6f91]
PUP.Optional.Conduit, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{015DB5FA-EAFB-4592-A95B-F44D3EE87FA9}|SuggestionsURL_JSON, http://suggest.seccint.com/CSuggestJson.ashx?prefix={searchTerms}&SSPV=, Quarantined, [0fdf233886137abce15ffacf778c03fd]
PUP.Optional.Trovi, HKU\S-1-5-21-532057547-2777207124-81917641-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{015DB5FA-EAFB-4592-A95B-F44D3EE87FA9}|DisplayName, Trovi, Quarantined, [e905c7944c4d39fd1b7a8d6c5fa406fa]
 
Registry Data: 0
(No malicious items detected)
 
Folders: 1
PUP.Optional.BrowserHelper, C:\Users\Centuck\AppData\Local\BrowserHelper, Quarantined, [8a645efdbcdde3534cacfbc98d7604fc], 
 
Files: 12
PUP.Optional.Conduit, C:\WINDOWS\SYSTEM32\drivers\SPPD.sys, Delete-on-Reboot, [d80f5ca8b55f246a719c41370d1a24f6], 
Trojan.FilePatch.DNSApi, C:\Windows\System32\dnsapi.dll, Replace-on-Reboot, [d38f868e1d5f2979b23b001d9d07778d], 
Trojan.FilePatch.DNSApi, C:\Windows\SysWOW64\dnsapi.dll, Replace-on-Reboot, [14710ed7641c5052aa4ed2797f89ce66], 
PUP.Optional.Bundler, C:\Users\Centuck\AppData\Local\Temp\fsd3CC1.exe, Quarantined, [47a72239b2e74de9e03ed35d19e7847c], 
PUP.Optional.InstallCore, C:\Users\Centuck\AppData\Local\Temp\3582.tmp.exe, Quarantined, [806eca919dfce056529f736d59a8df21], 
PUP.Optional.InstallCore, C:\Users\Centuck\AppData\Local\Temp\9AEE.tmp.exe, Quarantined, [0be3cc8fb5e41e188869558bb34e59a7], 
PUP.Optional.InstallCore, C:\Users\Centuck\AppData\Local\Temp\DE42.tmp.exe, Quarantined, [8b634c0f4950e5519f52eaf6669b2bd5], 
PUP.Optional.CheckOffer, C:\Users\Centuck\AppData\Local\Temp\nsc7065.tmp\nsCBHTML5.dll, Quarantined, [1ed071ea6831003638067798c53c7d83], 
PUP.Optional.Tuto4PC, C:\Users\Centuck\AppData\Local\Temp\is-BTA7A.tmp\gentlemjmp_ieeuu.exe, Quarantined, [737b99c2ecad51e52baea6028d745ea2], 
PUP.Optional.Tuto4PC, C:\Users\Centuck\AppData\Local\Temp\is-IH9U8.tmp\Z2VudGxlbWptcF9pZWV1dQ==.exe, Quarantined, [2cc23f1c9dfcfd39e0f9b9efd03116ea], 
Adware.PennyBee, C:\Windows\Temp\bobca\Lulxof.exe, Quarantined, [b03ed3881b7e39fdd1b8cd029f62d030], 
PUP.Optional.BrowserHelper, C:\Users\Centuck\AppData\Local\BrowserHelper\BrowserHelperBk.txt, Quarantined, [8a645efdbcdde3534cacfbc98d7604fc], 
PUP.Optional.BrowserHelper, C:\Users\Centuck\AppData\Local\BrowserHelper\BrowserHelper.txt, Quarantined, [8a645efdbcdde3534cacfbc98d7604fc], 
PUP.Optional.HijackHosts.Gen, C:\Windows\System32\nacy\lon\sijk.dat, Quarantined, [d61896c51c7dc571daf72dccc63e33cd], 
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)
 
Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 2016-02-02
Scan Time: 11:55 PM
Logfile: 
Administrator: Yes
 
Version: 2.2.0.1024
Malware Database: v2016.02.02.06
Rootkit Database: v2016.01.20.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
 
OS: Windows 8.1
CPU: x64
File System: NTFS
User: Centuck
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 418829
Time Elapsed: 22 min, 12 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
Processes: 0
(No malicious items detected)
 
Modules: 0
(No malicious items detected)
 
Registry Keys: 0
(No malicious items detected)
 
Registry Values: 0
(No malicious items detected)
 
Registry Data: 0
(No malicious items detected)
 
Folders: 1
PUP.Optional.BrowserHelper, C:\Users\Centuck\AppData\Local\BrowserHelper, Quarantined, [cb23abb0f5a491a5e7114282946f3dc3], 
 
Files: 5
PUP.Optional.OpenCandy, C:\Users\Centuck\AppData\Local\Temp\HYD7708.tmp.1454478149\HTA\install.1454478149.zip, Quarantined, [7a740b50c0d9c1759867f447ab57847c], 
PUP.Optional.OpenCandy, C:\Users\Centuck\AppData\Local\Temp\HYD7708.tmp.1454478149\HTA\3rdparty\OCComSDK.dll, Quarantined, [d915e675702983b313ec40fbf50da060], 
PUP.Optional.OpenCandy, C:\Users\Centuck\AppData\Local\Temp\HYD7708.tmp.1454478149\HTA\3rdparty\OCSetupHlp.dll, Quarantined, [9b536cefa2f7fa3c7f7d46a1d13306fa], 
PUP.Optional.BrowserHelper, C:\Users\Centuck\AppData\Local\BrowserHelper\BrowserHelperBk.txt, Quarantined, [cb23abb0f5a491a5e7114282946f3dc3], 
PUP.Optional.BrowserHelper, C:\Users\Centuck\AppData\Local\BrowserHelper\BrowserHelper.txt, Quarantined, [cb23abb0f5a491a5e7114282946f3dc3], 
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)

Edited by Centuck, 03 February 2016 - 06:41 PM.


#4 Centuck

Centuck
  • Topic Starter

  • Members
  • 68 posts
  • OFFLINE
  •  
  • Local time:09:12 AM

Posted 03 February 2016 - 06:38 PM

Installed programs from MiniToolBox are listed in the attached txt file.  The forum wouldn't let me post it.  Probably because of the Asian/Foreign lettering.

 

**EDIT Nevermind I don't know how to attach files.


Edited by Centuck, 03 February 2016 - 06:45 PM.


#5 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,670 posts
  • ONLINE
  •  
  • Gender:Male
  • Local time:12:12 PM

Posted 03 February 2016 - 10:00 PM

This is a lot of detections indeed. Can you try to copy/paste the list of installed programs on Pastebin.com, and post the URL to the paste here? :) You cannot attach anything in that section, hence why you can't find how to proceed with it.

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


#6 Centuck

Centuck
  • Topic Starter

  • Members
  • 68 posts
  • OFFLINE
  •  
  • Local time:09:12 AM

Posted 03 February 2016 - 10:29 PM

I think it lost all the asian lettering now... but here it is.  

 

http://pastebin.com/GprrP2wq



#7 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,670 posts
  • ONLINE
  •  
  • Gender:Male
  • Local time:12:12 PM

Posted 04 February 2016 - 06:17 AM

What language is set on your system? Also, what language do you usually install your programs in?

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


#8 Centuck

Centuck
  • Topic Starter

  • Members
  • 68 posts
  • OFFLINE
  •  
  • Local time:09:12 AM

Posted 04 February 2016 - 11:47 AM

Canadian English.

#9 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,670 posts
  • ONLINE
  •  
  • Gender:Male
  • Local time:12:12 PM

Posted 04 February 2016 - 11:53 AM

Do you know how programs in another language ended up on your system? Did you install them, or did you ever install language packs for them?

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


#10 Centuck

Centuck
  • Topic Starter

  • Members
  • 68 posts
  • OFFLINE
  •  
  • Local time:09:12 AM

Posted 04 February 2016 - 04:35 PM

No.  They must have gotten on because of the Malware.  I'm guessing Malwarebytes got rid of whatever was installing stuff on my computer, but there are still a couple programs I can't delete from my system.  

 

Services that I know don't belong:

 

QQRepair1259 - QQRepair1259

QQPCRTP - QQPCMgr RTP Service

 

Programs I know don't belong:

 

Asian Lettering - Tencent - C:\Program Files (x86)\Tencent\QQPCMgr\11.2.17063.223

Asian Lettering - Asian Lettering - C:\Program Files (x86)\Baidu\BaiduAn\4.0.0.8029

YTDownloader - YTDownloader - C:\Program Files (x86)\YTDownloader

 

I have tried to delete these programs and/or delete their folders but windows says I require admin priviledges even though I'm on the only user on my laptop to my knowledge.


Edited by Centuck, 04 February 2016 - 05:27 PM.


#11 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,670 posts
  • ONLINE
  •  
  • Gender:Male
  • Local time:12:12 PM

Posted 04 February 2016 - 05:34 PM

YTDownloader shows as an installed program, can you uninstall it? Let's see if AdwCleaner and JRT can get rid of them.

lv0mVRW.pngJunkware Removal Tool (JRT)
  • Download Junkware Removal Tool (JRT) and move it to your Desktop;
  • Right-click on JRT.exe and select Spcusrh.pngRun as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users);
  • Press on any key to launch the scan and let it complete;
    tLsXbWy.png
    Credits : BleepingComputer.com
  • Once the scan is complete, a log will open. Please copy/paste the content of the output log in your next reply;
zcMPezJ.pngAdwCleaner - Fix Mode
  • Download AdwCleaner and move it to your Desktop;
  • Right-click on AdwCleaner.exe and select Spcusrh.pngRun as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users);
  • Accept the EULA (I accept), let the database update, then click on Scan;
  • Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Cleaning button. This will kill all the active processes;
    CfdTLN1.png
  • Once the cleaning process is complete, AdwCleaner will ask to restart your computer, do it;
  • After the restart, a log will open when logging in. Please copy/paste the content of that log in your next reply;
Your next reply(ies) should therefore contain:
  • Copy/pasted JRT log;
  • Copy/pasted AdwCleaner clean log;

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


#12 Centuck

Centuck
  • Topic Starter

  • Members
  • 68 posts
  • OFFLINE
  •  
  • Local time:09:12 AM

Posted 04 February 2016 - 06:06 PM

I was actually already using the adware removal lol.  Here are the results:

 

I only have one of the things left located in C:\Program Files (x86)\Baidu\BaiduAn\4.0.0.8029.  

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.0.2 (01.06.2016)
Operating System: Windows 8.1 x64 
Ran by Centuck (Administrator) on 2016-02-04 at 17:01:51.79
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
File System: 4 
 
Successfully deleted: C:\ProgramData\7c0535b143fc4671b6ebd202fbffe066 (Folder) 
Successfully deleted: C:\ProgramData\Service7609 (Folder) 
Successfully deleted: C:\Users\Centuck\AppData\Local\installer (Folder) 
Successfully deleted: C:\Users\Centuck\Appdata\LocalLow\company (Folder) 
 
 
 
Registry: 3 
 
Failed to delete: HKLM\SYSTEM\CurrentControlSet\services\BDMRTP (Registry Key) 
Failed to delete: HKLM\SYSTEM\CurrentControlSet\services\BDMWrench_x64 (Registry Key) 
Successfully deleted: HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\\ QQPCTray (Registry Value) 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 2016-02-04 at 17:03:13.13
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
# AdwCleaner v5.032 - Logfile created 04/02/2016 at 16:40:50
# Updated 31/01/2016 by Xplode
# Database : 2016-02-02.1 [Server]
# Operating system : Windows 8.1  (x64)
# Username : Centuck - TRAVIS-LT
# Running from : C:\Users\Centuck\Downloads\adwcleaner_5.032.exe
# Option : Cleaning
 
***** [ Services ] *****
 
[!] Service Not Deleted : BaiduHips
[!] Service Not Deleted : bd0001
[!] Service Not Deleted : bd0002
[-] Service Deleted : BDArKit
[!] Service Not Deleted : BDMRTP
[-] Service Deleted : BDMWrench_x64
[-] Service Deleted : BrsHelper
[-] Service Deleted : QQPCRTP
[-] Service Deleted : sbmntr
[-] Service Deleted : TAOAccelerator
[-] Service Deleted : TSDefenseBt
[-] Service Deleted : TSSysKit
[-] Service Deleted : QMUdisk
[-] Service Deleted : TS888x64
[-] Service Deleted : QQSysMonX64
[-] Service Deleted : TFsFlt
[-] Service Deleted : TAOKernelDriver
[-] Service Deleted : BDDefense
[-] Service Deleted : softaal
 
***** [ Folders ] *****
 
[-] Folder Deleted : C:\Program Files (x86)\tencent
[-] Folder Deleted : C:\Program Files (x86)\Common Files\tencent
[-] Folder Deleted : C:\Program Files\Common Files\tencent
[-] Folder Deleted : C:\ProgramData\tencent
[-] Folder Deleted : C:\ProgramData\TXQMPC
[-] Folder Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\百度卫士
[-] Folder Deleted : C:\Users\Centuck\AppData\Local\BrowserHelper
[-] Folder Deleted : C:\Users\Centuck\AppData\Local\Installer\Install_32743
[-] Folder Deleted : C:\Users\Centuck\AppData\Local\Installer\Install_9157
[-] Folder Deleted : C:\Users\Centuck\AppData\Local\Temp\tencent
[-] Folder Deleted : C:\Users\Centuck\AppData\Roaming\tencent
[-] Folder Deleted : C:\Users\Centuck\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\腾讯软件
[#] Folder Deleted : C:\WINDOWS\SysNative\Tasks\YTDownloader
[-] Folder Deleted : C:\WINDOWS\SysWOW64\config\systemprofile\AppData\Roaming\tencent
 
***** [ Files ] *****
 
[-] File Deleted : C:\END
[-] File Deleted : C:\Users\Administrator\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\ÃÀͼä¯ÀÀ.lnk
[-] File Deleted : C:\Users\Centuck\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\腾讯软件\电脑管家\电脑管家.lnk
[-] File Deleted : C:\WINDOWS\SysNative\drivers\BDDefense.sys
[-] File Deleted : C:\WINDOWS\SysNative\drivers\bd0001.sys
[-] File Deleted : C:\WINDOWS\SysNative\drivers\bd0002.sys
[-] File Deleted : C:\WINDOWS\SysNative\drivers\BDArKit.SYS
[-] File Deleted : C:\WINDOWS\SysNative\drivers\BDMWrench_x64.sys
[-] File Deleted : C:\WINDOWS\SysNative\drivers\TAOAccelerator64.sys
[-] File Deleted : C:\WINDOWS\SysNative\drivers\TFsFltX64.sys
[-] File Deleted : C:\WINDOWS\SysWOW64\drivers\bd0001.sys
[-] File Deleted : C:\WINDOWS\SysWOW64\drivers\bd0002.sys
[-] File Deleted : C:\WINDOWS\SysWOW64\drivers\TsFltMgr.sys
[-] File Deleted : C:\WINDOWS\SysWOW64\drivers\TS888x64.sys
 
***** [ DLLs ] *****
 
 
***** [ Shortcuts ] *****
 
 
***** [ Scheduled tasks ] *****
 
[-] Task Deleted : YTDownloader
[-] Task Deleted : YTDownloaderUpd
[-] Task Deleted : GJMCERJRANKGYRUS
[-] Task Deleted : GJMCERJRANKGYRUS
 
***** [ Registry ] *****
 
[-] Key Deleted : HKLM\SOFTWARE\Classes\AppID\DownloadProxy.EXE
[-] Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@qq.com/QQPCMgr
[-] Key Deleted : HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\QQPCRTP
[-] Key Deleted : HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\QQPCRTP
[-] Key Deleted : HKEY_CLASSES_ROOT\AllFilesystemObjects\shellex\ContextMenuHandlers\QMContextUninstall
[-] Key Deleted : HKEY_CLASSES_ROOT\Folder\ShellEx\ContextMenuHandlers\QMContextUninstall
[-] Key Deleted : HKLM\SOFTWARE\Classes\AppID\{51BEE30D-EEC8-4BA3-930B-298B8E759EB1}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{70DE12EA-79F4-46BC-9812-86DB50A2FD64}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{15DEE173-1BE9-4424-81E0-58A87076E9B1}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{91B5E4DE-4C97-41CD-9F94-84BFAABB7371}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{63332668-8CE1-445D-A5EE-25929176714E}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{29B6CFD5-0064-411A-8C42-9890C83F9921}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{8FF10FED-2F0A-4F7F-BE87-B04F1DCD4319}
[-] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{6B3732AA-F6D4-4F16-9E22-49EDC52C9514}
[-] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}
[-] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D4801E96-E7A1-45F6-B124-7A36DFB40B81}
[-] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A274A292-C528-43D5-8005-7F73D207A0AB}
[-] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D656852E-EED6-41A3-8991-C69B97E8D076}
[-] Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{344C08F1-9A1D-4B82-8AB0-C1F5CF82365B}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{15DEE173-1BE9-4424-81E0-58A87076E9B1}
[-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{29B6CFD5-0064-411A-8C42-9890C83F9921}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{16EE6530-8649-4F42-A9E4-F6A3295AF975}
[-] Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved [{63332668-8CE1-445D-A5EE-25929176714E}]
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{9FC9D48D-C233-4FAB-99C1-46CE5A3AD105}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{11292110-6F8D-4D56-863C-44902A1E7880}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{7C260B4B-F7A0-40B5-B403-BEFCDC6A4C3B}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{B7667919-3765-4815-A66D-98A09BE662D6}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{CBDECEF7-7A29-4CBF-A009-2673D82C7BF9}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{D4801E96-E7A1-45F6-B124-7A36DFB40B81}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{9FC9D48D-C233-4FAB-99C1-46CE5A3AD105}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{D4801E96-E7A1-45F6-B124-7A36DFB40B81}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{A274A292-C528-43D5-8005-7F73D207A0AB}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{D656852E-EED6-41A3-8991-C69B97E8D076}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7C260B4B-F7A0-40B5-B403-BEFCDC6A4C3B}
[-] Key Deleted : HKCU\Software\Microsoft\Tinstalls
[-] Key Deleted : HKCU\Software\tstamptoken
[-] Key Deleted : HKCU\Software\Tutorials
[-] Key Deleted : HKCU\Software\STA
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SU
[!] Key Not Deleted : HKU\S-1-5-21-532057547-2777207124-81917641-1002\Software\Microsoft\Tinstalls
[!] Key Not Deleted : HKU\S-1-5-21-532057547-2777207124-81917641-1002\Software\tstamptoken
[!] Key Not Deleted : HKU\S-1-5-21-532057547-2777207124-81917641-1002\Software\Tutorials
[!] Key Not Deleted : HKU\S-1-5-21-532057547-2777207124-81917641-1002\Software\STA
[-] Data Restored : HKCU\Software\Microsoft\Internet Explorer\Main [Start Page]
[-] Data Restored : HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Start Page]
[-] Data Restored : HKU\S-1-5-21-532057547-2777207124-81917641-1002\Software\Microsoft\Internet Explorer\Main [Start Page]
[-] Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [baiduAnTray]
[-] Value Deleted : HKU\S-1-5-21-532057547-2777207124-81917641-1002\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run [YTDownloader]
[-] Value Deleted : HKU\S-1-5-21-532057547-2777207124-81917641-1002\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run [lsas]
[-] Key Deleted : HKLM\SOFTWARE\Classes\AniGIFPpg.AniGIFPpg
[-] Key Deleted : HKLM\SOFTWARE\Classes\AniGIFPpg.AniGIFPpg.1
[-] Key Deleted : HKLM\SOFTWARE\Classes\AniGIFPpg2.AniGIFPpg2
[-] Key Deleted : HKLM\SOFTWARE\Classes\AniGIFPpg2.AniGIFPpg2.1
[-] Key Deleted : HKLM\SOFTWARE\Classes\BDDownloadProxy.Downloader
[-] Key Deleted : HKLM\SOFTWARE\Classes\BDDownloadProxy.Downloader.1
 
***** [ Web browsers ] *****
 
[-] [C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences] [Extension] Deleted : booedmolknjekdopkepjjeckmjkdpfgl
[-] [C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences] [Extension] Deleted : flpcjncodpafbgdpnkljologafpionhb
[-] [C:\Users\Centuck\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences] [Homepage] Deleted : hxxp://www.trovi.com/?gd=&ctid=CT3325161&octid=EB_ORIGINAL_CTID&ISID=MC6E846E3-51F8-4BAC-8DBF-AEECCA4F78F6&SearchSource=55&CUI=&UM=8&UP=SP2619DB45-103F-439B-8528-035061C84D58&D=020216&SSPV=
 
*************************
 
:: "Tracing" keys removed
:: Winsock settings cleared
 
########## EOF - C:\AdwCleaner\AdwCleaner[C1].txt - [8913 bytes] ##########
 
 
I ran a second AdwCleaner and deleted some more stuff.  
 
# AdwCleaner v5.032 - Logfile created 04/02/2016 at 16:50:33
# Updated 31/01/2016 by Xplode
# Database : 2016-02-02.1 [Server]
# Operating system : Windows 8.1  (x64)
# Username : Centuck - TRAVIS-LT
# Running from : C:\Users\Centuck\Downloads\adwcleaner_5.032.exe
# Option : Cleaning
 
***** [ Services ] *****
 
[!] Service Not Deleted : BaiduHips
[!] Service Not Deleted : bd0001
[!] Service Not Deleted : bd0002
[!] Service Not Deleted : BDMRTP
[-] Service Deleted : BDMWrench_x64
 
***** [ Folders ] *****
 
 
***** [ Files ] *****
 
[-] File Deleted : C:\WINDOWS\SysNative\drivers\BDDefense.sys
[-] File Deleted : C:\WINDOWS\SysNative\drivers\bd0001.sys
[-] File Deleted : C:\WINDOWS\SysNative\drivers\bd0002.sys
[-] File Deleted : C:\WINDOWS\SysNative\drivers\BDArKit.SYS
[-] File Deleted : C:\WINDOWS\SysNative\drivers\BDMWrench_x64.sys
 
***** [ DLLs ] *****
 
 
***** [ Shortcuts ] *****
 
 
***** [ Scheduled tasks ] *****
 
 
***** [ Registry ] *****
 
[-] Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [baiduAnTray]
 
***** [ Web browsers ] *****
 
 
*************************
 
:: "Tracing" keys removed
:: Winsock settings cleared
 
########## EOF - C:\AdwCleaner\AdwCleaner[C2].txt - [1235 bytes] ##########
 
 
 

Edited by Centuck, 04 February 2016 - 06:11 PM.


#13 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,670 posts
  • ONLINE
  •  
  • Gender:Male
  • Local time:12:12 PM

Posted 04 February 2016 - 06:21 PM

Baidu really looks installed on your system. If you navigate in the Baidu folder and subfolders, do you see any file called setup.exe, uninstall.exe, unins.exe, uninst.exe, etc.?

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


#14 Centuck

Centuck
  • Topic Starter

  • Members
  • 68 posts
  • OFFLINE
  •  
  • Local time:09:12 AM

Posted 04 February 2016 - 06:27 PM

There is an uninst.exe but if I run it, it brings up a screen with just Asian characters so I have no clue how to navigate.

 

Nevermind, I just got it installed by process of elimination.  Let me see if there are any other issues left on my computer.


Edited by Centuck, 04 February 2016 - 06:28 PM.


#15 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,670 posts
  • ONLINE
  •  
  • Gender:Male
  • Local time:12:12 PM

Posted 04 February 2016 - 06:34 PM

So you uninstalled Baidu successfully?

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users