midan
asked on
I am unable to access youtube
As far as I am aware I am able to access all websites except youtube.
When I put the youtube address the page just does not load as if there is no internet connection. At the same time other pages come up without any problem.
I try to use google which offers me a cache copy. However if I click on a video again nothing happens.
Any idea what is happening?
When I put the youtube address the page just does not load as if there is no internet connection. At the same time other pages come up without any problem.
I try to use google which offers me a cache copy. However if I click on a video again nothing happens.
Any idea what is happening?
are you on a work network? - and IT admin may have blocked your access
Can you access www.hulu.com? If they are blocking youtube, most likely they are blocking hulu.com as well.
ASKER
badgermike- the pc is a single user laptop working off a home wireless broadband.
jdonaldson- I have no difficulty in accessing the website www.hulu.com
jdonaldson- I have no difficulty in accessing the website www.hulu.com
Can you open up a command prompt and run "ping www.youtube.com"? Does it list an ip address? Also, do you get 4 replies?
ASKER
This is what I get
Pinging www.youtube.com [64.46.38.208] with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 64.46.38.208:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
Pinging www.youtube.com [64.46.38.208] with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 64.46.38.208:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
From the command line type "ipconfig /flushdns" and try it again.
That IP returned when you pinged youtube.com is owned by a company called rackforce.com. Do you use any resources hosted by this company such as a vpn?
There may be a firewall, software or router, blocking access to this particular site. Check to make certain that the site hasn't been added to any of the blocked sites lists.
ASKER
This is what I get
"The requested operation requires elevation"
I know nothing about rackforce.
There was a malware that was interfering with the pc last week but I managed to get rid of it.
"The requested operation requires elevation"
I know nothing about rackforce.
There was a malware that was interfering with the pc last week but I managed to get rid of it.
Can you check and make sure you are not using a proxy?
From Internet Explorer go to:
Tools -> Internet Options -> Connections -> Lan Settings
Make sure "Use a proxy server for your lan" has not been checked.
From Internet Explorer go to:
Tools -> Internet Options -> Connections -> Lan Settings
Make sure "Use a proxy server for your lan" has not been checked.
Start > all programs > accesseries > right click on cmd & run as administrator
then > ipconfig /flushdns
type "services.msc" in opend cmd or start run box
stop DNS clint service, set startup mode to manual & try youtube again with internet.
then with cache
then > ipconfig /flushdns
type "services.msc" in opend cmd or start run box
stop DNS clint service, set startup mode to manual & try youtube again with internet.
then with cache
You might try resetting your hosts file:
http://www.funkytoad.com/index.php?option=com_content&id=13&showall=1
Good luck!!!
http://www.funkytoad.com/index.php?option=com_content&id=13&showall=1
Good luck!!!
You need to run "ipconfig /flushdns" in en elevated command prompt.
What is an elevated command prompt?
Elevated command prompt = open a Command Window in Administrator mode:
* clickStart
* click All Programs, thenAccessories
* right click on the Command Prompt option,
* on the drop down menu which appears, click on the Run as Administratoroption.
* If you haven’t disabled User Account Control (and you shouldn’t!) you will be asked for authorisation. Click the Continue button if you are the administrator or insert the administrator password.
What is an elevated command prompt?
Elevated command prompt = open a Command Window in Administrator mode:
* clickStart
* click All Programs, thenAccessories
* right click on the Command Prompt option,
* on the drop down menu which appears, click on the Run as Administratoroption.
* If you haven’t disabled User Account Control (and you shouldn’t!) you will be asked for authorisation. Click the Continue button if you are the administrator or insert the administrator password.
After launching en elevated command prompt, run the command below.
ipconfig /flushdns
You should be fine. If still no go, call your ISP for help.
ipconfig /flushdns
You should be fine. If still no go, call your ISP for help.
Did you have any luck with this yet?
ASKER
I got the message "successfully flushed the dns resolver cache".
Sadly still unable to access youtube. The other things also has not resolved the problem.
To understand the problem we need to determine what distinguishes the youtube website from alll the other websites or where it could be blocked other than by a firewall.
Sadly still unable to access youtube. The other things also has not resolved the problem.
To understand the problem we need to determine what distinguishes the youtube website from alll the other websites or where it could be blocked other than by a firewall.
Did you check the hosts file?
Can you try pinging www.youtube again and post the results? Also run the command tracert www.youtube.com and post the results. Before you run the ping or tracert command, will you turn off your windows firewall temporarily and re-enable after you run the commands?
ASKER
Phototropic I am not sure about downloading stuff I don't recognise. Is there something I can do with settings?
Idonaldson
For the ping command I got the following
ping www.youtube.com
Pinging www.youtube.com [64.46.38.208] with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 64.46.38.208:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
For the tracert command I got the following
tracert www.youtube.com
Tracing route to www.youtube.com [64.46.38.208]
over a maximum of 30 hops:
1 3 ms 1 ms 1 ms 192.168.0.1
2 37 ms 35 ms 35 ms cr1.wewmai.uk.easynet.net [82.108.11.56]
3 31 ms 31 ms 32 ms fe2-0-0.ar11.bllon.uk.easy
3]
4 35 ms 37 ms 33 ms te0-6-0-0.er10.thlon.ov.ea
211]
5 32 ms 33 ms 35 ms 195.50.122.113
6 33 ms 35 ms 32 ms ae-34-52.ebr2.London1.Leve
7 102 ms 102 ms 103 ms ae-44-44.ebr1.NewYork1.Lev
8 102 ms 102 ms 101 ms ae-4-4.ebr1.NewYork2.Level
9 101 ms 102 ms 104 ms ae-1-100.ebr2.NewYork2.Lev
10 133 ms 127 ms 123 ms ae-2-2.ebr1.Chicago1.Level
11 123 ms 123 ms 124 ms ae-6-6.ebr1.Chicago2.Level
12 146 ms 159 ms 145 ms ae-3-3.ebr2.Denver1.Level3
13 173 ms 176 ms 179 ms ae-2-2.ebr2.Seattle1.Level
14 176 ms 213 ms 174 ms ae-2-52.edge1.Seattle3.Lev
15 180 ms 184 ms 176 ms BIG-PIPE-IN.edge1.Seattle3
50]
16 175 ms 176 ms 177 ms 66.163.78.77
17 176 ms 175 ms 176 ms ra2wh-tge1-1.vc.shawcable.
18 239 ms 239 ms 239 ms h64-251-80-26.bigpipeinc.c
19 200 ms 201 ms 200 ms cr1-1-1.kel2.rackforce.net
20 199 ms 207 ms 203 ms cr1-451.kel1.rackforce.net
21 * * * Request timed out.
22 * * * Request timed out.
23 * * * Request timed out.
24 * * * Request timed out.
25 * * * Request timed out.
26 * * * Request timed out.
27 * * * Request timed out.
28 * * * Request timed out.
29 * * * Request timed out.
30 * * * Request timed out.
Trace complete.
Hostsxpert is a well-known and much used method of resetting the hosts file.
Another hosts file which is defensive is mvps:
http://www.mvps.org/winhelp2002/hosts.htm
Both these are known and trusted downloads. They are routinely recommended by experts here at ee, and I have used them many times myself.
Another hosts file which is defensive is mvps:
http://www.mvps.org/winhelp2002/hosts.htm
Both these are known and trusted downloads. They are routinely recommended by experts here at ee, and I have used them many times myself.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
The proxy server box was not checked.
In the file imhosts there was no mention of you tube.
I will attempt to download hostsxpert to see if does anything.
If YouTube is a blocked site where else other in the firewall folder would it show?
In the file imhosts there was no mention of you tube.
I will attempt to download hostsxpert to see if does anything.
If YouTube is a blocked site where else other in the firewall folder would it show?
ASKER
I have downloaded hostsxpert and there is shown theyoutube address along with google addresses of other countries. Is this an MS plot?
I tried restoring hosts file but I got message Error cannot create file C:\windows\systems32\drive rs\etc\hos ts
Please let me if there is something I need to do now?
I tried restoring hosts file but I got message Error cannot create file C:\windows\systems32\drive
Please let me if there is something I need to do now?
Take a look here:
http://www.bleepingcomputer.com/forums/topic295453.html
"...•Open the folder and double-click HostsXpert.exe to run the program.
•If using Vista, right-click on it and Run As Administrator.
•Click "Restore MS Hosts File".
•Click OK at the confirmation box.
•Click "Make Read Only".
•Click the X to exit the program..."
or here:
http://support.microsoft.com/kb/923947
"...Click StartCollapse this imageExpand this image, click All Programs, click Accessories, right-click Notepad, and then click Run as administrator.
Collapse this imageExpand this imageIf you are prompted for an administrator password or for a confirmation, type the password, or click Allow or Yes.
Open the Hosts file or the Lmhosts file, make the necessary changes, and then click Save on the Edit menu. If using Windows 7, you will need to click Save on the File menu..."
http://www.bleepingcomputer.com/forums/topic295453.html
"...•Open the folder and double-click HostsXpert.exe to run the program.
•If using Vista, right-click on it and Run As Administrator.
•Click "Restore MS Hosts File".
•Click OK at the confirmation box.
•Click "Make Read Only".
•Click the X to exit the program..."
or here:
http://support.microsoft.com/kb/923947
"...Click StartCollapse this imageExpand this image, click All Programs, click Accessories, right-click Notepad, and then click Run as administrator.
Collapse this imageExpand this imageIf you are prompted for an administrator password or for a confirmation, type the password, or click Allow or Yes.
Open the Hosts file or the Lmhosts file, make the necessary changes, and then click Save on the Edit menu. If using Windows 7, you will need to click Save on the File menu..."
ASKER
It has not been possible to prevent the error message coming up when trying to restore or following microsoft support.
The problem must be to do with hosts file because all the web addresses listed cannot be accessed.Most I do not recognise but www.bing.com was there .All show address 64.46.38.208.
The problem must be to do with hosts file because all the web addresses listed cannot be accessed.Most I do not recognise but www.bing.com was there .All show address 64.46.38.208.
Download this hosts fix from Bleeping Computer:
http://download.bleepingcomputer.com/bats/hosts-perm.bat
"...When the file has finished downloading, double-click on the hosts-perm.bat file that is now on your desktop. If Windows asks if you if you are sure you want to run it, please allow it to run. Once it starts you will see a small black window that opens and then quickly goes away. This is normal and is nothing to be worried about. You should now be able to access your HOSTS file..."
Try Hostsxpert again. Or follow Microsoft's instructions here:
http://support.microsoft.com/kb/972034
http://download.bleepingcomputer.com/bats/hosts-perm.bat
"...When the file has finished downloading, double-click on the hosts-perm.bat file that is now on your desktop. If Windows asks if you if you are sure you want to run it, please allow it to run. Once it starts you will see a small black window that opens and then quickly goes away. This is normal and is nothing to be worried about. You should now be able to access your HOSTS file..."
Try Hostsxpert again. Or follow Microsoft's instructions here:
http://support.microsoft.com/kb/972034
ASKER
Before I do anything please explain what is a hosts file and what is happening to prevent the websites listed being accessed.
The hosts file is a text file which associates host names (eg: www.youtube.com) with ip addresses.
If your hosts file has been hijacked by malware, it may be used to block access to av sites, or to redirect you to rogue sites when you type urls of well-known sites.
A typical Microsoft Vista hosts file would look like this:
http://download.bleepingcomputer.com/misc/host-files/windows-vista/hosts
You Tube uses multiple servers and so has several ip addresses, such as the following:
208.65.153.238
208.65.153.251
208.65.153.253
208.117.236.69
Your hosts file has been hijacked by malware so that when you type "www.youtube.com" your computer attempts to connect to 64.46.38.208 rather than an address in the range of those above.
You need to reset your hosts file in order for your internet connectivity to go back to normal.
Since the malware has locked permissions on your hosts file, you need to run the download from Bleeping Computer in order to reset the permissions for your hosts file. Once you have done that, you can change your hosts file back to the default using Hostsxpert, or the Microsoft tool I linked to above:
http://support.microsoft.com/kb/972034
Good luck!!!
If your hosts file has been hijacked by malware, it may be used to block access to av sites, or to redirect you to rogue sites when you type urls of well-known sites.
A typical Microsoft Vista hosts file would look like this:
http://download.bleepingcomputer.com/misc/host-files/windows-vista/hosts
You Tube uses multiple servers and so has several ip addresses, such as the following:
208.65.153.238
208.65.153.251
208.65.153.253
208.117.236.69
Your hosts file has been hijacked by malware so that when you type "www.youtube.com" your computer attempts to connect to 64.46.38.208 rather than an address in the range of those above.
You need to reset your hosts file in order for your internet connectivity to go back to normal.
Since the malware has locked permissions on your hosts file, you need to run the download from Bleeping Computer in order to reset the permissions for your hosts file. Once you have done that, you can change your hosts file back to the default using Hostsxpert, or the Microsoft tool I linked to above:
http://support.microsoft.com/kb/972034
Good luck!!!
ASKER
We have got to the heart of the problem but bleeping computer download has not resolved the situation where the functions of hostsxperts have been immobilised. MS support fix it didn't work.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
I did this and I opened the file lmhosts.There was nothing there like I found with hostsxperts. What am I supposed to change?
C:\Windows\System32\Driver s\etc should contain 5 folders:
hosts
lmhosts.sam
networks
protocol
services
The file you are concerned with is the first one. It is a text file named "hosts".
Follow the proceedure outlined in my last post:
Open notepad as an administrator;
Select the hosts file and open it;
Restore it to the Microsoft default:
http://download.bleepingcomputer.com/misc/host-files/windows-vista/hosts
You should then be able to access youtube.
hosts
lmhosts.sam
networks
protocol
services
The file you are concerned with is the first one. It is a text file named "hosts".
Follow the proceedure outlined in my last post:
Open notepad as an administrator;
Select the hosts file and open it;
Restore it to the Microsoft default:
http://download.bleepingcomputer.com/misc/host-files/windows-vista/hosts
You should then be able to access youtube.
ASKER
The bad news is that the hosts file appears to be missing. Where do we go from here?
We will have to create a new hosts file.
Hostsxpert can do this for you:
Rt.click on the Hostsxpert icon. Select "run as administrator". Click on "restore ms hosts file".
If that does not work, try this:
Download the Vista default hosts file from here to your desktop:
http://download.bleepingcomputer.com/misc/host-files/windows-vista/hosts
File - Save as - call the file "hosts" and save it to your desktop.
Now do the following: Go to and open the C:\Windows\system32\driver s\etc folder;
"...Right-click an open space in the C:\Windows\system32\driver s\etc folder,
point to New, click Text Document,
type hosts, and then press ENTER.
Click Yes to confirm that the file name extension will not be txt.
Open the new created hosts file in a text editor, for example, in the Notepad.
Copy the Vista default hosts file on your desktop to the hosts file;
Save and close the file..."
excerted from: http://support.microsoft.com/kb/972034
Hostsxpert can do this for you:
Rt.click on the Hostsxpert icon. Select "run as administrator". Click on "restore ms hosts file".
If that does not work, try this:
Download the Vista default hosts file from here to your desktop:
http://download.bleepingcomputer.com/misc/host-files/windows-vista/hosts
File - Save as - call the file "hosts" and save it to your desktop.
Now do the following: Go to and open the C:\Windows\system32\driver
"...Right-click an open space in the C:\Windows\system32\driver
point to New, click Text Document,
type hosts, and then press ENTER.
Click Yes to confirm that the file name extension will not be txt.
Open the new created hosts file in a text editor, for example, in the Notepad.
Copy the Vista default hosts file on your desktop to the hosts file;
Save and close the file..."
excerted from: http://support.microsoft.com/kb/972034
ASKER
I get to open etc folder.I right click on the open space,I point to new but I do not see text document I see folder.So I went to accessories notepad and found new text document there.Then I copied vista hosts file.So there is now a hosts file but I think in .txt.Trying out hostsxperts nothing has changed.Isn't the problem with lmhosts which contains the youtube address.
OK. To edit the lmhosts file, follow the Microsoft proceedure here:
http://support.microsoft.com/default.aspx?scid=kb;en-us;923947
"...Click Start , click All Programs, click Accessories, right-click Notepad, and then click Run as administrator.
If you are prompted for an administrator password or for a confirmation, type the password, or click Allow or Yes.
Open the Hosts file or the Lmhosts file (File - open - C:\Windows\System32\Driver s\etc - lmhosts) , make the necessary changes, and then click Save on the Edit menu. If using Windows 7, you will need to click Save on the File menu..."
A default lmhosts file can be seen here:
http://en.wikipedia.org/wiki/LMHOSTS
Re: the hosts file. Try downloading and running the following:
http://www.mvps.org/winhelp2002/hosts.htm
Download the zip file to your desktop: http://www.mvps.org/winhelp2002/hosts.zip
Unzip (extract) the included files in the "hosts.zip"
Right-click on "mvps.bat" and select: Run as Administrator
Double-click on "mvps.bat"
This is a defensive hosts file which I use a lot on client machines.
http://support.microsoft.com/default.aspx?scid=kb;en-us;923947
"...Click Start , click All Programs, click Accessories, right-click Notepad, and then click Run as administrator.
If you are prompted for an administrator password or for a confirmation, type the password, or click Allow or Yes.
Open the Hosts file or the Lmhosts file (File - open - C:\Windows\System32\Driver
A default lmhosts file can be seen here:
http://en.wikipedia.org/wiki/LMHOSTS
Re: the hosts file. Try downloading and running the following:
http://www.mvps.org/winhelp2002/hosts.htm
Download the zip file to your desktop: http://www.mvps.org/winhelp2002/hosts.zip
Unzip (extract) the included files in the "hosts.zip"
Right-click on "mvps.bat" and select: Run as Administrator
Double-click on "mvps.bat"
This is a defensive hosts file which I use a lot on client machines.
ASKER
What comes up with hostsxperts namely showing youtube is not in the lmhosts file. It must be in the hosts file but the hosts file appears to be missing.
I suspect that the original hosts file is now hidden.Where could it be?
I suspect that the original hosts file is now hidden.Where could it be?
It sounds as if some malware has locked your hosts file.
Try this:
Open a run box by holding down the Windows key and pressing "R";
In the run box, type the following:
notepad c:\windows\system32\driver s\etc\host s
Does your hosts file appear? If so, it is locked and we must delete it and then recreate it.
I found a proceedure to do this from this thread:
http://www.dslreports.com/forum/r23042263-Hosts-file-attributes-set-to-system-and-hidden~start=40
It involves using the File Assassin tool in Malwarebytes to delete the rogue file.
Please download Malwarebytes' Antimalware to your desktop:
http://download.cnet.com/Malwarebytes-Anti-Malware/3000-8022_4-10804572.html?part=dl-10804572&subj=dl&tag=button
Install the program. Rt. click the icon and click "run as administrator". Click the "More Tools" tab. Under File Assassin, click "Run tool". Navigate to C:\Windows\System32\Driver s\etc . If you can see the hosts file, highlight it. If you cannot, type "hosts" in the File Name box. Click "open" and then "yes" to the delete.
Once the file has been deleted, attempt to create a hosts file again.
Good luck!!!
Try this:
Open a run box by holding down the Windows key and pressing "R";
In the run box, type the following:
notepad c:\windows\system32\driver
Does your hosts file appear? If so, it is locked and we must delete it and then recreate it.
I found a proceedure to do this from this thread:
http://www.dslreports.com/forum/r23042263-Hosts-file-attributes-set-to-system-and-hidden~start=40
It involves using the File Assassin tool in Malwarebytes to delete the rogue file.
Please download Malwarebytes' Antimalware to your desktop:
http://download.cnet.com/Malwarebytes-Anti-Malware/3000-8022_4-10804572.html?part=dl-10804572&subj=dl&tag=button
Install the program. Rt. click the icon and click "run as administrator". Click the "More Tools" tab. Under File Assassin, click "Run tool". Navigate to C:\Windows\System32\Driver
Once the file has been deleted, attempt to create a hosts file again.
Good luck!!!
ASKER
Yes the hosts file appears.
Last time I tried to create a new hosts file I only created a text document.Will it be ok this time?
Is there any way to unlock the hosts file?
Last time I tried to create a new hosts file I only created a text document.Will it be ok this time?
Is there any way to unlock the hosts file?
If the hosts file appears, then it is clear that it has been locked by malware. According to the post I linked to, several others have had this problem. If you scan through the three pages of posts, you will see that many things were tried, but nothing worked except the File Assassin proceedure outlined above.
Have you scanned your computer for malware? What av software do yoiu have in place?
I would recommend running some scans and removing what is found, and then trying the above proceedure to unlock your hosts file.
Please download Malwarebytes Antimalware to your desktop:
http://www.malwarebytes.org/mbam.php
Install it. Update it. Then run it.
When it completes, review what it has found, then click on "remove selected". Please post the scan log here.
Also, please download Hitman Pro to your desktop.
http://www.surfright.nl/en/downloads
There are 32-bit and 64-bit versions of this program. If you are not sure what your o/s is, right click on "My Computer" and select "Properties". Download the appropriate version and run it.
If Mbam will not update, or Hitman Pro will not run, it may mean that they are also blocked by your rogue hosts file. If that is the case, we shall have to reconsider.
Please post the scan results here.
Have you scanned your computer for malware? What av software do yoiu have in place?
I would recommend running some scans and removing what is found, and then trying the above proceedure to unlock your hosts file.
Please download Malwarebytes Antimalware to your desktop:
http://www.malwarebytes.org/mbam.php
Install it. Update it. Then run it.
When it completes, review what it has found, then click on "remove selected". Please post the scan log here.
Also, please download Hitman Pro to your desktop.
http://www.surfright.nl/en/downloads
There are 32-bit and 64-bit versions of this program. If you are not sure what your o/s is, right click on "My Computer" and select "Properties". Download the appropriate version and run it.
If Mbam will not update, or Hitman Pro will not run, it may mean that they are also blocked by your rogue hosts file. If that is the case, we shall have to reconsider.
Please post the scan results here.
ASKER
Result of malwarebytes:
Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org
Database version: 5768
Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.19019
15/02/2011 19:14:39
mbam-log-2011-02-15 (19-14-39).txt
Scan type: Quick scan
Objects scanned: 163363
Time elapsed: 6 minute(s), 51 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 4
Registry Keys Infected: 142
Registry Values Infected: 12
Registry Data Items Infected: 0
Folders Infected: 18
Files Infected: 78
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
c:\program files\mywebsearch\bar\1.bi n\MWSOEPLG .DLL (Adware.MyWebSearch) -> Delete on reboot.
c:\program files\mywebsearch\bar\1.bi n\MWSBAR.D LL (Adware.MyWebSearch) -> Delete on reboot.
c:\program files\mywebsearch\bar\1.bi n\F3HTMLMU .DLL (PUP.FunWebProducts) -> Not selected for removal.
c:\program files\mywebsearch\bar\1.bi n\MWSSRCAS .DLL (Adware.MyWebSearch) -> Delete on reboot.
Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\ CurrentCon trolSet\Se rvices\MyW ebSearchSe rvice (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\ {F42228FB- E84E-479E- B922-FBBD0 96E792C} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interfac e\{6E74766 C-4D93-4CC 0-96D1-47B 8E07FF9CA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0 7B18EA1-A5 23-4961-B6 BB-170DE44 75CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Explo rer\Browse r Helper Objects\{07B18EA1-A523-496 1-B6BB-170 DE4475CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Windows\C urrentVers ion\Ext\Se ttings\{07 B18EA1-A52 3-4961-B6B B-170DE447 5CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Windows\C urrentVers ion\Ext\St ats\{07B18 EA1-A523-4 961-B6BB-1 70DE4475CC A} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\ {07B18EA0- A523-4961- B6BB-170DE 4475CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interfac e\{07B18EA A-A523-496 1-B6BB-170 DE4475CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Unins tall\MyWeb Search bar Uninstall (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{3 DC201FB-E9 C9-499C-A1 1F-23C360D 7C3F8} (PUP.FunWebProducts) -> Not selected for removal.
HKEY_CLASSES_ROOT\FunWebPr oducts.HTM LMenu.2 (PUP.FunWebProducts) -> Not selected for removal.
HKEY_CLASSES_ROOT\FunWebPr oducts.HTM LMenu (PUP.FunWebProducts) -> Not selected for removal.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Windows\C urrentVers ion\Ext\St ats\{3DC20 1FB-E9C9-4 99C-A11F-2 3C360D7C3F 8} (PUP.FunWebProducts) -> Not selected for removal.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Ext\P reApproved \{3DC201FB -E9C9-499C -A11F-23C3 60D7C3F8} (PUP.FunWebProducts) -> Not selected for removal.
HKEY_CLASSES_ROOT\TypeLib\ {E47CAEE0- DEEA-464A- 9326-3F280 1535A4D} (PUP.FunWebProducts) -> Not selected for removal.
HKEY_CLASSES_ROOT\Interfac e\{3E1656E D-F60E-459 7-B6AA-B6A 58E171495} (PUP.FunWebProducts) -> Not selected for removal.
HKEY_CLASSES_ROOT\CLSID\{0 0A6FAF1-07 2E-44cf-89 57-5838F56 9A31D} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Explo rer\Browse r Helper Objects\{00A6FAF1-072E-44C F-8957-583 8F569A31D} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Windows\C urrentVers ion\Ext\Se ttings\{00 A6FAF1-072 E-44CF-895 7-5838F569 A31D} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Windows\C urrentVers ion\Ext\St ats\{00A6F AF1-072E-4 4CF-8957-5 838F569A31 D} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{8 19FFE22-35 C7-4925-8C DA-4E0E2DB 94302} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\ {819FFE20- 35C7-4925- 8CDA-4E0E2 DB94302} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interfac e\{819FFE2 1-35C7-492 5-8CDA-4E0 E2DB94302} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0 0A6FAF6-07 2E-44cf-89 57-5838F56 9A31D} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0 7B18EA9-A5 23-4961-B6 BB-170DE44 75CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Windows\C urrentVers ion\Ext\Se ttings\{07 B18EA9-A52 3-4961-B6B B-170DE447 5CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Windows\C urrentVers ion\Ext\St ats\{07B18 EA9-A523-4 961-B6BB-1 70DE4475CC A} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0 7B18EAB-A5 23-4961-B6 BB-170DE44 75CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rchToolBar .SettingsP lugin.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rchToolBar .SettingsP lugin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Windows\C urrentVers ion\Ext\St ats\{07B18 EAB-A523-4 961-B6BB-1 70DE4475CC A} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Ext\P reApproved \{07B18EAB -A523-4961 -B6BB-170D E4475CCA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0 F8ECF4F-36 46-4C3A-88 81-8E138FF CAF70} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\ {8CA01F0E- 987C-49C3- B852-2F1AC 4A7094C} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interfac e\{1093995 A-BA37-41D 2-836E-091 067C4AD17} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\FunWebPr oducts.IEC ookiesMana ger.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\FunWebPr oducts.IEC ookiesMana ger (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1 47A976F-EE E1-4377-8E A7-4716E4C DD239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1 E0DE227-5C E4-4ea3-AB 0C-8B03E1A A76BC} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{2 5560540-95 71-4D7B-93 89-0F16678 8785A} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\ {C8CECDE3- 1AE1-4C4A- AD82-6D5B0 0212144} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interfac e\{17DE5E5 E-BFE3-4E8 3-8E1F-875 5795359EC} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\FunWebPr oducts.Dat aControl.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\FunWebPr oducts.Dat aControl (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Ext\P reApproved \{25560540 -9571-4D7B -9389-0F16 6788785A} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{3 E720452-B4 72-4954-B7 AA-33069EB 53906} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\ {3E720450- B472-4954- B7AA-33069 EB53906} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interfac e\{3E72045 1-B472-495 4-B7AA-330 69EB53906} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rch.HTMLPa nel.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rch.HTMLPa nel (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Ext\P reApproved \{3E720452 -B472-4954 -B7AA-3306 9EB53906} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{5 3CED2D0-5E 9A-4761-90 05-648404E 6F7E5} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rchToolBar .ToolbarPl ugin.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rchToolBar .ToolbarPl ugin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{6 3D0ED2C-B4 5B-4458-8B 3B-60C69BB BD83C} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\ {8E6F1830- 9607-4440- 8530-13BE7 C4B1D14} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interfac e\{63D0ED2 B-B45B-445 8-8B3B-60C 69BBBD83C} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\FunWebPr oducts.Pop SwatterSet tingsContr ol.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\FunWebPr oducts.Pop SwatterSet tingsContr ol (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Ext\P reApproved \{63D0ED2C -B45B-4458 -8B3B-60C6 9BBBD83C} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{7 473D292-B7 BB-4f24-AE 82-7E2CE94 BB6A9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\ {7473D290- B7BB-4F24- AE82-7E2CE 94BB6A9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interfac e\{7473D29 1-B7BB-4F2 4-AE82-7E2 CE94BB6A9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{7 473D294-B7 BB-4f24-AE 82-7E2CE94 BB6A9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rch.Pseudo Transparen tPlugin.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rch.Pseudo Transparen tPlugin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Ext\P reApproved \{7473D294 -B7BB-4F24 -AE82-7E2C E94BB6A9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{7 473D296-B7 BB-4f24-AE 82-7E2CE94 BB6A9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{8 4DA4FDF-A1 CF-4195-86 88-3E961F5 05983} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{8 E6F1832-96 07-4440-85 30-13BE7C4 B1D14} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\FunWebPr oducts.Pop SwatterBar Button.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\FunWebPr oducts.Pop SwatterBar Button (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{9 38AA51A-99 6C-4884-98 CE-80DD16A 5C9DA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\ {29D67D3C- 509A-4544- 903F-C8C1B 8236554} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interfac e\{2E3537F C-CF2F-4F5 6-AF54-5A6 A3DD375CC} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{9 8D9753D-D7 3B-42D5-8C 85-4469CDA 897AB} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\FunWebPr oducts.HTM LMenu.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Ext\P reApproved \{98D9753D -D73B-42D5 -8C85-4469 CDA897AB} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{9 FF05104-B0 30-46FC-94 B8-81276E4 E27DF} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\ScreenSa verControl .ScreenSav erInstalle r.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\ScreenSa verControl .ScreenSav erInstalle r (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Windows\C urrentVers ion\Ext\St ats\{9FF05 104-B030-4 6FC-94B8-8 1276E4E27D F} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Ext\P reApproved \{9FF05104 -B030-46FC -94B8-8127 6E4E27DF} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{A 4730EBE-43 A6-443e-97 76-36915D3 23AD3} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{A 9571378-68 A1-443d-B0 82-284F960 C6D17} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{A DB01E81-3C 79-4272-A0 F1-7B2BE7A 782DC} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rch.Outloo kAddin.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rch.Outloo kAddin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{B 813095C-81 C0-4E40-AA 14-6752037 2B987} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\FunWebPr oducts.Kil lerObjMana ger.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\FunWebPr oducts.Kil lerObjMana ger (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{C 9D7BE3E-14 1A-4C85-8C D6-32461F3 DF2C7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\FunWebPr oducts.His toryKiller Scheduler. 1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\FunWebPr oducts.His toryKiller Scheduler (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{C FF4CE82-3A A2-451F-9B 77-7165605 FB835} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\FunWebPr oducts.His torySwatte rControlBa r.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\FunWebPr oducts.His torySwatte rControlBa r (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{D 9FFFB27-D6 2A-4D64-8C EC-1FF0065 28805} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\ {0D26BC71- A633-4E71- AD31-EADC3 A1B6A3A} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interfac e\{E342AF5 5-B78A-4CD 0-A2BB-DA7 F52D9D25E} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{E 79DFBCA-56 97-4fbd-94 E5-5B2A9C7 C1612} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\ {E79DFBC0- 5697-4FBD- 94E5-5B2A9 C7C1612} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interfac e\{72EE7F0 4-15BD-484 5-A005-D67 11144D86A} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rch.ChatSe ssionPlugi n.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rch.ChatSe ssionPlugi n (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Ext\P reApproved \{E79DFBCA -5697-4FBD -94E5-5B2A 9C7C1612} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\ {D518921A- 4A03-425E- 9873-B9A71 756821E} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interfac e\{CF54BE1 C-9359-439 5-8533-165 7CF209CFE} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Internet Explorer\SearchScopes\{562 56A51-B582 -467e-B8D4 -7786EDA79 AE0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Internet Explorer\SearchScopes\{562 56A51-B582 -467e-B8D4 -7786EDA79 AE0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Windows\C urrentVers ion\Ext\Se ttings\{1D 4DB7D2-6EC 9-47A3-BD8 7-1E41684E 07BB} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Windows\C urrentVers ion\Ext\St ats\{1D4DB 7D2-6EC9-4 7A3-BD87-1 E41684E07B B} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Ext\P reApproved \{1D4DB7D2 -6EC9-47A3 -BD87-1E41 684E07BB} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Internet Explorer\Low Rights\ElevationPolicy\{59 C7FC09-1C8 3-4648-B3E 6-003D2BBC 7481} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Internet Explorer\Low Rights\ElevationPolicy\{68 AF847F-6E9 1-45dd-9B6 8-D6A12C30 E5D7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Internet Explorer\Low Rights\ElevationPolicy\{91 70B96C-28D 4-4626-835 8-27E6CAEE F907} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Internet Explorer\Low Rights\ElevationPolicy\{D1 A71FA0-FF4 8-48dd-9B6 D-7A13A3E4 2127} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Internet Explorer\Low Rights\ElevationPolicy\{DD B1968E-EAD 6-40fd-8DA E-FF14757F 60C7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Internet Explorer\Low Rights\ElevationPolicy\{F1 38D901-86F 0-4383-99B 6-9CDD4060 36DA} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rch.Multip leButton (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rch.Multip leButton.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rch.ThirdP artyInstal ler (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rch.ThirdP artyInstal ler.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rch.UrlAle rtButton (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\MyWebSea rch.UrlAle rtButton.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\SM502_22 11.DocHost UIHandler (Rogue.SmartEngine) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \MyWebSear ch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\FocusInt eractive (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\MyWebSea rch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Internet Explorer\Low Rights\RunDll32Policy\f3Sc rCtr.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Multimed ia\WMPlaye r\Schemes\ f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Office\O utlook\Add ins\MyWebS earch.Outl ookAddin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Office\W ord\Addins \MyWebSear ch.Outlook Addin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0 8858AF6-42 AD-4914-95 D2-AC3AB0D C8E28} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\ {8FFDF636- 0D87-4B33- B9E9-79A53 F6E1DAE} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interfac e\{0194714 0-417F-46B 6-8751-A3A 2B8345E1A} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Windows\C urrentVers ion\Ext\St ats\{08858 AF6-42AD-4 914-95D2-A C3AB0DC8E2 8} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Ext\P reApproved \{08858AF6 -42AD-4914 -95D2-AC3A B0DC8E28} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{7 99391D3-EB 86-4bac-9B D3-CBFEA58 A0E15} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{D 858DAFC-95 73-4811-B3 23-7011A3A A7E61} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Run\M yWebSearch Email Plugin (Adware.MyWebSearch) -> Value: MyWebSearch Email Plugin -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Windows\C urrentVers ion\Run\My WebSearch Email Plugin (Adware.MyWebSearch) -> Value: MyWebSearch Email Plugin -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Run\M y Web Search Bar Search Scope Monitor (Adware.MyWebSearch) -> Value: My Web Search Bar Search Scope Monitor -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\RunOn ce\My Web Search Installer (Adware.MyWebSearch) -> Value: My Web Search Installer -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Internet Explorer\URLSearchHooks\{0 0A6FAF6-07 2E-44CF-89 57-5838F56 9A31D} (Adware.MyWebSearch) -> Value: {00A6FAF6-072E-44CF-8957-5 838F569A31 D} -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Internet Explorer\Toolbar\WebBrowse r\{07B18EA 9-A523-496 1-B6BB-170 DE4475CCA} (Adware.MyWebSearch) -> Value: {07B18EA9-A523-4961-B6BB-1 70DE4475CC A} -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Internet Explorer\Toolbar\{07B18EA9 -A523-4961 -B6BB-170D E4475CCA} (Adware.MyWebSearch) -> Value: {07B18EA9-A523-4961-B6BB-1 70DE4475CC A} -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Internet Explorer\Toolbar\WebBrowse r\{07B18EA 9-A523-496 1-B6BB-170 DE4475CCA} (Adware.MyWebSearch) -> Value: {07B18EA9-A523-4961-B6BB-1 70DE4475CC A} -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE \Microsoft \Internet Explorer\URLSearchHooks\{0 0A6FAF6-07 2E-44cf-89 57-5838F56 9A31D} (Adware.MyWebSearch) -> Value: {00A6FAF6-072E-44cf-8957-5 838F569A31 D} -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Internet Explorer\Toolbar\{07B18EA9 -A523-4961 -B6BB-170D E4475CCA} (Adware.MyWebSearch) -> Value: {07B18EA9-A523-4961-B6BB-1 70DE4475CC A} -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows Media\WMSDK\Sources\f3Popu larScreens avers (Adware.MyWebSearch) -> Value: f3PopularScreensavers -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWAR E\Microsof t\Windows\ CurrentVer sion\Inter net Settings\User Agent\Post Platform\FunWebProducts (Adware.MyWebSearch) -> Value: FunWebProducts -> Quarantined and deleted successfully.
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
c:\program files\funwebproducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\funwebproducts\Insta llr (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\funwebproducts\Insta llr\1.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\funwebproducts\Insta llr\setups (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\funwebproducts\scree nsaver (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\funwebproducts\scree nsaver\Ima ges (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch (Adware.MyWebSearch) -> Delete on reboot.
c:\program files\mywebsearch\bar (Adware.MyWebSearch) -> Delete on reboot.
c:\program files\mywebsearch\bar\1.bi n (Adware.MyWebSearch) -> Delete on reboot.
c:\program files\mywebsearch\bar\1.bi n\chrome (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\thirdpar tyinstalle rs (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Avat ar (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Game (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\icon s (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Mess age (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Noti fier (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Over lay (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Sett ings (Adware.MyWebSearch) -> Quarantined and deleted successfully.
Files Infected:
c:\Program Files\MyWebSearch\bar\1.bi n\MWSOESTB .DLL (Adware.MyWebSearch) -> Delete on reboot.
c:\Program Files\MyWebSearch\bar\1.bi n\MWSOEMON .EXE (Adware.MyWebSearch) -> Delete on reboot.
c:\Program Files\MyWebSearch\bar\1.bi n\MWSSVC.E XE (Adware.MyWebSearch) -> Delete on reboot.
c:\program files\mywebsearch\bar\1.bi n\MWSOEPLG .DLL (Adware.MyWebSearch) -> Delete on reboot.
c:\program files\mywebsearch\bar\1.bi n\MWSBAR.D LL (Adware.MyWebSearch) -> Delete on reboot.
c:\program files\mywebsearch\bar\1.bi n\F3HTMLMU .DLL (PUP.FunWebProducts) -> Not selected for removal.
c:\Program Files\MyWebSearch\bar\1.bi n\M3AUXSTB .DLL (Adware.MyWebSearch) -> Delete on reboot.
c:\Program Files\MyWebSearch\bar\1.bi n\MWSSRCAS .DLL (Adware.MyWebSearch) -> Delete on reboot.
c:\Program Files\MyWebSearch\bar\1.bi n\M3DLGHK. DLL (Adware.MyWebSearch) -> Delete on reboot.
c:\program files\mywebsearch\bar\1.bi n\M3SRCHMN .EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\Users\audrey dangoor\AppData\LocalLow\m ywebsearch \bar\setup s\my web search installer.exe (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3HISTSW .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3DTACTL .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\M3HTML.D LL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3POPSWT .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\M3SKIN.D LL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3CJPEG. DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3SCRCTR .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\M3OUTLCN .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3HTTPCT .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\M3MSG.DL L (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3REPROX .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\Windows\System32\f3PSSa vr.scr (PUP.FunWebProducts) -> Not selected for removal.
c:\Users\audrey dangoor\AppData\Roaming\mi crosoft\Wi ndows\star t menu\Programs\security shield.lnk (Rogue.SecurityShield) -> Quarantined and deleted successfully.
c:\program files\funwebproducts\Insta llr\1.bin\ F3EZSETP.D LL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\funwebproducts\Insta llr\1.bin\ F3PLUGIN.D LL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\funwebproducts\Insta llr\1.bin\ NPFUNWEB.D LL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3SPACER .WMV (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\chrome.m anifest (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3BKGERR .JPG (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3HKSTUB .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3IMSTUB .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3PSSAVR .SCR (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3REGHK. DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3RESTUB .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3SCHMON .EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3WALLPP .DAT (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\F3WPHOOK .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\FWPBUDDY .PNG (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\INSTALL. RDF (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\M3HIGHIN .EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\M3IDLE.D LL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\M3IMPIPE .EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\M3MEDINT .EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\M3PLUGIN .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\M3SKPLAY .EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\M3SLSRCH .EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\M3TPINST .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\MWSMLBTN .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\MWSUABTN .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\NPMYWEBS .DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\chrome\M 3FFXTBR.JA R (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\thirdpar tyinstalle rs\symcpcc uinstaller .exe (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bi n\thirdpar tyinstalle rs\symcpcc uinstaller .log (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Avat ar\COMMON. F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Game \CHECKERS. F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Game \CHESS.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Game \REVERSI.F 3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\icon s\CM.ICO (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\icon s\MFC.ICO (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\icon s\PSS.ICO (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\icon s\SMILEY.I CO (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\icon s\WB.ICO (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\icon s\ZWINKY.I CO (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Mess age\COMMON .F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Noti fier\COMMO N.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Noti fier\DOG.F 3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Noti fier\FISH. F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Noti fier\KUNGF U.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Noti fier\LIFEG ARD.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Noti fier\MAID. F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Noti fier\MAILB OX.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Noti fier\OPERA .F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Noti fier\ROBOT .F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Noti fier\SEDUC T.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Noti fier\SURFE R.F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Over lay\COMMON .F3S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Sett ings\s_pid .dat (Adware.MyWebSearch) -> Quarantined and deleted successfully.
Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org
Database version: 5768
Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.19019
15/02/2011 19:14:39
mbam-log-2011-02-15 (19-14-39).txt
Scan type: Quick scan
Objects scanned: 163363
Time elapsed: 6 minute(s), 51 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 4
Registry Keys Infected: 142
Registry Values Infected: 12
Registry Data Items Infected: 0
Folders Infected: 18
Files Infected: 78
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\
HKEY_CLASSES_ROOT\TypeLib\
HKEY_CLASSES_ROOT\Interfac
HKEY_CLASSES_ROOT\CLSID\{0
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CURRENT_USER\SOFTWARE
HKEY_CURRENT_USER\SOFTWARE
HKEY_CLASSES_ROOT\TypeLib\
HKEY_CLASSES_ROOT\Interfac
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CLASSES_ROOT\CLSID\{3
HKEY_CLASSES_ROOT\FunWebPr
HKEY_CLASSES_ROOT\FunWebPr
HKEY_CURRENT_USER\SOFTWARE
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CLASSES_ROOT\TypeLib\
HKEY_CLASSES_ROOT\Interfac
HKEY_CLASSES_ROOT\CLSID\{0
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CURRENT_USER\SOFTWARE
HKEY_CURRENT_USER\SOFTWARE
HKEY_CLASSES_ROOT\CLSID\{8
HKEY_CLASSES_ROOT\TypeLib\
HKEY_CLASSES_ROOT\Interfac
HKEY_CLASSES_ROOT\CLSID\{0
HKEY_CLASSES_ROOT\CLSID\{0
HKEY_CURRENT_USER\SOFTWARE
HKEY_CURRENT_USER\SOFTWARE
HKEY_CLASSES_ROOT\CLSID\{0
HKEY_CLASSES_ROOT\MyWebSea
HKEY_CLASSES_ROOT\MyWebSea
HKEY_CURRENT_USER\SOFTWARE
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CLASSES_ROOT\CLSID\{0
HKEY_CLASSES_ROOT\TypeLib\
HKEY_CLASSES_ROOT\Interfac
HKEY_CLASSES_ROOT\FunWebPr
HKEY_CLASSES_ROOT\FunWebPr
HKEY_CLASSES_ROOT\CLSID\{1
HKEY_CLASSES_ROOT\CLSID\{1
HKEY_CLASSES_ROOT\CLSID\{2
HKEY_CLASSES_ROOT\TypeLib\
HKEY_CLASSES_ROOT\Interfac
HKEY_CLASSES_ROOT\FunWebPr
HKEY_CLASSES_ROOT\FunWebPr
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CLASSES_ROOT\CLSID\{3
HKEY_CLASSES_ROOT\TypeLib\
HKEY_CLASSES_ROOT\Interfac
HKEY_CLASSES_ROOT\MyWebSea
HKEY_CLASSES_ROOT\MyWebSea
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CLASSES_ROOT\CLSID\{5
HKEY_CLASSES_ROOT\MyWebSea
HKEY_CLASSES_ROOT\MyWebSea
HKEY_CLASSES_ROOT\CLSID\{6
HKEY_CLASSES_ROOT\TypeLib\
HKEY_CLASSES_ROOT\Interfac
HKEY_CLASSES_ROOT\FunWebPr
HKEY_CLASSES_ROOT\FunWebPr
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CLASSES_ROOT\CLSID\{7
HKEY_CLASSES_ROOT\TypeLib\
HKEY_CLASSES_ROOT\Interfac
HKEY_CLASSES_ROOT\CLSID\{7
HKEY_CLASSES_ROOT\MyWebSea
HKEY_CLASSES_ROOT\MyWebSea
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CLASSES_ROOT\CLSID\{7
HKEY_CLASSES_ROOT\CLSID\{8
HKEY_CLASSES_ROOT\CLSID\{8
HKEY_CLASSES_ROOT\FunWebPr
HKEY_CLASSES_ROOT\FunWebPr
HKEY_CLASSES_ROOT\CLSID\{9
HKEY_CLASSES_ROOT\TypeLib\
HKEY_CLASSES_ROOT\Interfac
HKEY_CLASSES_ROOT\CLSID\{9
HKEY_CLASSES_ROOT\FunWebPr
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CLASSES_ROOT\CLSID\{9
HKEY_CLASSES_ROOT\ScreenSa
HKEY_CLASSES_ROOT\ScreenSa
HKEY_CURRENT_USER\SOFTWARE
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CLASSES_ROOT\CLSID\{A
HKEY_CLASSES_ROOT\CLSID\{A
HKEY_CLASSES_ROOT\CLSID\{A
HKEY_CLASSES_ROOT\MyWebSea
HKEY_CLASSES_ROOT\MyWebSea
HKEY_CLASSES_ROOT\CLSID\{B
HKEY_CLASSES_ROOT\FunWebPr
HKEY_CLASSES_ROOT\FunWebPr
HKEY_CLASSES_ROOT\CLSID\{C
HKEY_CLASSES_ROOT\FunWebPr
HKEY_CLASSES_ROOT\FunWebPr
HKEY_CLASSES_ROOT\CLSID\{C
HKEY_CLASSES_ROOT\FunWebPr
HKEY_CLASSES_ROOT\FunWebPr
HKEY_CLASSES_ROOT\CLSID\{D
HKEY_CLASSES_ROOT\TypeLib\
HKEY_CLASSES_ROOT\Interfac
HKEY_CLASSES_ROOT\CLSID\{E
HKEY_CLASSES_ROOT\TypeLib\
HKEY_CLASSES_ROOT\Interfac
HKEY_CLASSES_ROOT\MyWebSea
HKEY_CLASSES_ROOT\MyWebSea
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CLASSES_ROOT\Typelib\
HKEY_CLASSES_ROOT\Interfac
HKEY_CURRENT_USER\SOFTWARE
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CURRENT_USER\SOFTWARE
HKEY_CURRENT_USER\SOFTWARE
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CLASSES_ROOT\MyWebSea
HKEY_CLASSES_ROOT\MyWebSea
HKEY_CLASSES_ROOT\MyWebSea
HKEY_CLASSES_ROOT\MyWebSea
HKEY_CLASSES_ROOT\MyWebSea
HKEY_CLASSES_ROOT\MyWebSea
HKEY_CLASSES_ROOT\SM502_22
HKEY_CURRENT_USER\SOFTWARE
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CLASSES_ROOT\CLSID\{0
HKEY_CLASSES_ROOT\TypeLib\
HKEY_CLASSES_ROOT\Interfac
HKEY_CURRENT_USER\SOFTWARE
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CLASSES_ROOT\CLSID\{7
HKEY_CLASSES_ROOT\CLSID\{D
Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CURRENT_USER\SOFTWARE
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CURRENT_USER\SOFTWARE
HKEY_CURRENT_USER\SOFTWARE
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_CURRENT_USER\SOFTWARE
HKEY_CURRENT_USER\SOFTWARE
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_LOCAL_MACHINE\SOFTWAR
HKEY_LOCAL_MACHINE\SOFTWAR
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
c:\program files\funwebproducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\funwebproducts\Insta
c:\program files\funwebproducts\Insta
c:\program files\funwebproducts\Insta
c:\program files\funwebproducts\scree
c:\program files\funwebproducts\scree
c:\program files\mywebsearch (Adware.MyWebSearch) -> Delete on reboot.
c:\program files\mywebsearch\bar (Adware.MyWebSearch) -> Delete on reboot.
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\Avat
c:\program files\mywebsearch\bar\Game
c:\program files\mywebsearch\bar\icon
c:\program files\mywebsearch\bar\Mess
c:\program files\mywebsearch\bar\Noti
c:\program files\mywebsearch\bar\Over
c:\program files\mywebsearch\bar\Sett
Files Infected:
c:\Program Files\MyWebSearch\bar\1.bi
c:\Program Files\MyWebSearch\bar\1.bi
c:\Program Files\MyWebSearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\Program Files\MyWebSearch\bar\1.bi
c:\Program Files\MyWebSearch\bar\1.bi
c:\Program Files\MyWebSearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\Users\audrey dangoor\AppData\LocalLow\m
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\Windows\System32\f3PSSa
c:\Users\audrey dangoor\AppData\Roaming\mi
c:\program files\funwebproducts\Insta
c:\program files\funwebproducts\Insta
c:\program files\funwebproducts\Insta
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\1.bi
c:\program files\mywebsearch\bar\Avat
c:\program files\mywebsearch\bar\Game
c:\program files\mywebsearch\bar\Game
c:\program files\mywebsearch\bar\Game
c:\program files\mywebsearch\bar\icon
c:\program files\mywebsearch\bar\icon
c:\program files\mywebsearch\bar\icon
c:\program files\mywebsearch\bar\icon
c:\program files\mywebsearch\bar\icon
c:\program files\mywebsearch\bar\icon
c:\program files\mywebsearch\bar\Mess
c:\program files\mywebsearch\bar\Noti
c:\program files\mywebsearch\bar\Noti
c:\program files\mywebsearch\bar\Noti
c:\program files\mywebsearch\bar\Noti
c:\program files\mywebsearch\bar\Noti
c:\program files\mywebsearch\bar\Noti
c:\program files\mywebsearch\bar\Noti
c:\program files\mywebsearch\bar\Noti
c:\program files\mywebsearch\bar\Noti
c:\program files\mywebsearch\bar\Noti
c:\program files\mywebsearch\bar\Noti
c:\program files\mywebsearch\bar\Over
c:\program files\mywebsearch\bar\Sett
That's a lot of malware that Mbam has removed. However, it all seems to relate to MyWebSearch (and the related FunWebProducts). This is adware that often crops up, and I don't think it would be responsible for locking your hosts file.
I noticed in your log entries like this:
c:\program files\mywebsearch\bar\1.bi n\F3HTMLMU .DLL (PUP.FunWebProducts) -> Not selected for removal.
When the scan completes, you need to make sure that there is a tick in the box next to each item to be removed.
Did you run Hitman Pro? Did it find anything?
Would you please run a scan with TDSSKiller:
http://support.kaspersky.com/viruses/solutions?qid=208280684
After it has completed. please try to reset a default hosts file with Hostsxpert.
This is a good utility for correcting redirects. Download the executable file to your desktop, right-click and run as administrator.
I noticed in your log entries like this:
c:\program files\mywebsearch\bar\1.bi
When the scan completes, you need to make sure that there is a tick in the box next to each item to be removed.
Did you run Hitman Pro? Did it find anything?
Would you please run a scan with TDSSKiller:
http://support.kaspersky.com/viruses/solutions?qid=208280684
After it has completed. please try to reset a default hosts file with Hostsxpert.
This is a good utility for correcting redirects. Download the executable file to your desktop, right-click and run as administrator.
ASKER
I've tried again to edit the hosts file with notepad.This time I opened properties unchecked read only and checked to allow all in security.This time when I edited out YouTube I was able to save the edited file. Now I have access to youtube!
Phototropic thanks for identifying the cause of the problem and showing that I needed to edit the hosts file.
Phototropic thanks for identifying the cause of the problem and showing that I needed to edit the hosts file.
You are welcome.
I'm glad to hear that your problem is resolved.
I'm glad to hear that your problem is resolved.