WinHttpRequest runtime error using Freemake Video Downloader

Hewlett-packard / Hp compaq dc7100 sff(pk86...
December 30, 2014 at 16:53:36
Specs: w 8, 2.793 GHz / 503 MB
Runtime error( at 370:334) WinhttpRequest when I use freemake video downloader. How can I fix this ? and does anyone know what a error( at 370:334) WinhttpRequest is ?

See More: WinHttpRequest runtime error using Freemake Video Downloader

Report •

December 30, 2014 at 17:19:42
Have you installed > .Net Framework 4.0 Client Profile

Report •

December 30, 2014 at 17:50:54
I have version 4.5 installed

Report •

December 30, 2014 at 18:31:11
Did you do an Windows Update & look if it is listed as an separate install?

Report •

Related Solutions

December 31, 2014 at 05:22:30
Could be the malware included in that program is having problems trying to phone home. Heed the warning:

Report •

December 31, 2014 at 08:06:41
Start the malware check by running this freebie:
(see freebie button top right)
If it finds anything copy/paste the log on here for information and further attention.

Always pop back and let us know the outcome - thanks

Report •

January 4, 2015 at 16:46:11
I have pasted the screen shot - but now I notice a bigger problem , New updates cannot install , when windows defender tries to instal update it just hangs at %98 continuously. maybe my registry is in read-only or something

Malwarebytes Anti-Malware

Scan Date: 1/2/2015
Scan Time: 1:16:52 PM
Administrator: Yes

Malware Database: v2015.01.02.01
Rootkit Database: v2014.12.30.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled

OS: Windows 8
CPU: x64
File System: NTFS
User: budda

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 327422
Time Elapsed: 16 min, 50 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 0
(No malicious items detected)

Files: 9
PUP.Optional.Yontoo, C:\Users\budda\AppData\Local\Temp\hjbESG1z.exe.part, Quarantined, [d5c43bb7395087affca63bbc976a6997],
PUP.Optional.Somoto, C:\Users\budda\AppData\Local\Temp\2_4ZMHv+.exe.part, Quarantined, [1089fef49eeb6cca8133b5c2b84d55ab],
PUP.Optional.OpenCandy, C:\Users\budda\AppData\Local\Temp\is-EP91A.tmp\OCSetupHlp.dll, Quarantined, [5e3b579bb0d978be7ac95a51719402fe],
PUP.Optional.OpenCandy, C:\Users\budda\AppData\Local\Temp\is-JVUJA.tmp\OCSetupHlp.dll, Quarantined, [f2a7c32fdeabd75f6dd6515a5da8867a],
PUP.Optional.OpenCandy, C:\Users\budda\AppData\Local\Temp\is-LLN93.tmp\OCSetupHlp.dll, Quarantined, [13862ac897f2162094af8c1f37ce59a7],
PUP.Optional.OpenCandy, C:\Users\budda\AppData\Local\Temp\is-MG7CF.tmp\OCSetupHlp.dll, Quarantined, [1a7f1cd66425ea4c0e35703ba263b848],
PUP.Optional.OpenCandy, C:\Users\budda\AppData\Local\Temp\is-PQ21C.tmp\OCSetupHlp.dll, Quarantined, [3a5f8a684940171f5ee582290df8ba46],
PUP.Optional.TorchMedia, C:\Windows\Temp\316c3ffb\TorchSetupstub.exe, Quarantined, [5742df130089ef479743e5f93bc67789],
PUP.Optional.TorchMedia, C:\Users\budda\Downloads\TorchSetup-r0-n-bi.exe, Quarantined, [6138fff34f3a2a0c0bcfe7f739c829d7],

Physical Sectors: 0
(No malicious items detected)

Report •

January 4, 2015 at 17:09:26
Nope it's not the registry in read-only mode.

Please download the ADWCleaner file from here:
(blue Download button near top).

"Save" the file somewhere then double click on it to start the cleaner.
Run the Scan and see what it finds. Paste the log on here before going further.

Always pop back and let us know the outcome - thanks

message edited by Derek

Report •

January 4, 2015 at 17:12:26
Now we can see what is going on.

Here are the next 2 steps, there will be more steps needed after I see the results of these logs.

Run them in this order.

Step 2: Run AdwCleaner
Author's site
Close all open programs and internet browsers.
Double click on AdwCleaner.exe to run the tool.
Click on Clean.
Confirm each time with Ok.
Your computer will be rebooted automatically. A text file will open after the restart.
Please Copy & Paste the contents of that logfile with your next answer.
You can find the logfile at C:\AdwCleaner[S1].txt as well.

Step 3: Run Junkware Removal Tool
Download Junkware Removal Tool onto your Desktop. If your default download location is not the Desktop, drag it out of it's location onto the Desktop.
Warning! Once the scan is complete JRT will shut down your browser with NO warning.
Shut down your protection software now to avoid potential conflicts.
Temporarily disable your antivirus and any antispyware real time protection before performing a scan.
Click this link to see a list of security programs that should be disabled and how to disable them.
Run the tool by double-clicking it. If you are using Windows Vista or Windows 7/8, right-click JRT and select Run as Administrator.
The tool will open and start scanning your system.
Please be patient as this can take a while to complete depending on your system's specifications.
On completion, a log (JRT.txt) is saved onto your Desktop and will automatically open.
Copy and Paste the contents of the JRT.txt log please.

Report •

January 4, 2015 at 17:16:57
Thx for coming on-board. I sent a PM but you arrived in the meantime.

Always pop back and let us know the outcome - thanks

Report •

January 4, 2015 at 17:24:16
Got interrupted whilst 1/2 way through posting Derek, thanks for the PM.

Report •

Ask Question