Malwarebytes Anti-Malware
www.malwarebytes.orgScan Date: 11/10/2016
Scan Time: 10:52 AM
Logfile: Malwarebytes Scan.txt
Administrator: Yes
Version: 2.2.1.1043
Malware Database: v2016.11.10.06
Rootkit Database: v2016.10.31.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Mels
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 278405
Time Elapsed: 30 min, 15 sec
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
Processes: 0
(No malicious items detected)
Modules: 0
(No malicious items detected)
Registry Keys: 19
PUP.Optional.Quiknowledge, HKLM\SOFTWARE\CLASSES\CLSID\{323C6E6D-1621-470F-8A52-4FDEC4E75E40}, , [7b233e805149d660c23b366d9e637d83],
PUP.Optional.Quiknowledge, HKLM\SOFTWARE\CLASSES\TYPELIB\{F213853A-D221-4C97-8A4B-7E0AC63F31A1}, , [7b233e805149d660c23b366d9e637d83],
PUP.Optional.Quiknowledge, HKLM\SOFTWARE\CLASSES\INTERFACE\{CE4B58AF-E4FD-4C27-8627-AE9324C11F3F}, , [7b233e805149d660c23b366d9e637d83],
PUP.Optional.Quiknowledge, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{CE4B58AF-E4FD-4C27-8627-AE9324C11F3F}, , [7b233e805149d660c23b366d9e637d83],
PUP.Optional.Quiknowledge, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{CE4B58AF-E4FD-4C27-8627-AE9324C11F3F}, , [7b233e805149d660c23b366d9e637d83],
PUP.Optional.Quiknowledge, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{F213853A-D221-4C97-8A4B-7E0AC63F31A1}, , [7b233e805149d660c23b366d9e637d83],
PUP.Optional.Quiknowledge, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{F213853A-D221-4C97-8A4B-7E0AC63F31A1}, , [7b233e805149d660c23b366d9e637d83],
PUP.Optional.Quiknowledge, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\PREAPPROVED\{323C6E6D-1621-470F-8A52-4FDEC4E75E40}, , [7b233e805149d660c23b366d9e637d83],
PUP.Optional.MindSpark, HKLM\SOFTWARE\CLASSES\TYPELIB\{E38FA7CB-C053-4B07-84AD-BCA6D2BE4FE7}, , [1589f6c837638bab7bc243600bf69f61],
PUP.Optional.MindSpark, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{E38FA7CB-C053-4B07-84AD-BCA6D2BE4FE7}, , [1589f6c837638bab7bc243600bf69f61],
PUP.Optional.MindSpark, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{E38FA7CB-C053-4B07-84AD-BCA6D2BE4FE7}, , [1589f6c837638bab7bc243600bf69f61],
PUP.Optional.DriverRestore, HKLM\SOFTWARE\MICROSOFT\TRACING\DriverRestore_RASAPI32, , [3866fec04951ab8be5a6e7d3d62dc53b],
PUP.Optional.DriverRestore, HKLM\SOFTWARE\MICROSOFT\TRACING\DriverRestore_RASMANCS, , [c1ddf2cc6e2c79bda5e6417906fd4fb1],
PUP.Optional.ReMarkable, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Re-Markable Update, , [c2dc5c622575a98dd8482e6ab151ac54],
PUP.Optional.ReMarkable, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Re-Markable_wd, , [aef0ead4ff9bf145cd535c3c43bf03fd],
PUP.Optional.Runner, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Test TimeTrigger, , [c9d509b5d0ca44f2e8ba791f6a98b14f],
PUP.Optional.SavingsHero, HKLM\SOFTWARE\WOW6432NODE\Savings Hero, , [afef7e40a7f31323310cbedb3ec44ab6],
PUP.Optional.NewPlayer, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NewPlayerUpdaterService, , [49552f8f792183b367a1791b8f73e51b],
PUP.Optional.GetSavin, HKU\S-1-5-21-4250833897-710296522-4234368863-1000\SOFTWARE\APPDATALOW\SOFTWARE\GetSavin, , [e8b6efcfbbdfeb4b2a8a8703dd258e72],
Registry Values: 8
PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{21BC2CE4-79DF-4413-85BC-2DFCF54E7739}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Windows\System32\dmwu.exe|Name=dmwu|, , [f4aa2698e0ba6acc4d3c7955877bf60a]
PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{DD36445E-BF8C-4CD0-A5D2-4CEAC5E7144C}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Windows\System32\dmwu.exe|Name=dmwu|, , [7b23a816abefbb7bdaaf7f4f1ee4768a]
PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{F113C99E-205B-4815-BEC7-AC9B7603B2E1}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Windows\SysWOW64\ARFC\wrtc.exe|Name=wrtc|, , [b6e8308e2e6c0a2cfb8df6d843bf6e92]
PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{7C22455A-BCE2-461A-856E-33FA2489F338}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Windows\SysWOW64\ARFC\wrtc.exe|Name=wrtc|, , [ff9f7c42cdcdd85e00889d3129d94cb4]
PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{C8D27012-CC23-4F75-B413-04816AEAD78D}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Windows\System32\dmwu.exe|Name=dmwu|, , [b9e5724c405a52e4256465691de5728e]
PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{E164221F-683F-4063-A42B-3C88FA935496}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Windows\System32\dmwu.exe|Name=dmwu|, , [d5c91ea0a7f321159fea2ea042c0ce32]
PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{ADBA3DFC-DA3C-4961-9691-C5880B91797A}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Windows\SysWOW64\ARFC\wrtc.exe|Name=wrtc|, , [9fff2b93d8c275c1652307c7e9197e82]
PUP.Optional.Perion, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{BD3268A2-F6FF-41F8-9DA7-2CCC550EF1E5}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Windows\SysWOW64\ARFC\wrtc.exe|Name=wrtc|, , [5648fbc30b8f23135533448a986a669a]
Registry Data: 0
(No malicious items detected)
Folders: 1
PUP.Optional.ConduitTB.Gen, C:\Users\Mels\AppData\Local\CRE, , [acf227977a200d293ab316cf61a0ae52],
Files: 7
PUP.Optional.DriverUpdate, C:\Users\Mels\Downloads\DriverUpdate-setup.exe, , [019d0eb0a6f4e1558b46ecbad2315ca4],
PUP.Optional.RegCleanerPro, C:\Users\Mels\Downloads\rcpsetup_cpxlatest_cpxlatest.exe, , [504ef0ce1585f046fedf2250926efc04],
PUP.Optional.RegCleanerPro, C:\Users\Mels\Downloads\rcpsetup_cpx_cpx.exe, , [2b73c1fd27731b1b25b83141c53b7b85],
PUP.Optional.APNToolBar, C:\Users\Mels\AppData\Local\Downloaded Installations\{6C9C7031-E3C7-4C60-BECD-25D97EDAB7CF}\The Weather Channel App.msi, , [3866704ec1d9181e0c89f1d7a45c8a76],
PUP.Optional.APNToolBar, C:\Windows\Installer\36e97e.msi, , [6a34dce21486c571177ecefa12ee956b],
PUP.Optional.ConduitTB.Gen, C:\Users\Mels\AppData\Local\CRE\fdkednngfjmpnljkolbapdednncafhen.crx, , [acf227977a200d293ab316cf61a0ae52],
PUP.Optional.SavePathDeals, C:\Users\Mels\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_bedjehmkhkgidfpdcninflgnnbcglmkd_0.localstorage, , [742a823ca4f640f6ca47d2c7bd45ab55],
Physical Sectors: 0
(No malicious items detected)
(end)