Many thanks,

Assumed it was viral as Avast, I believe indicated it was despite adding it’s name ended in PUP.

I always believed PUP’s led to virus and/or other malicious malware, if not viral in their nature., so I always scan for PUPs in boot-time scans.

As for the exploits, they seems resolved, however Malware bytes did soon after Avast’s hits on the PUP and Avast’s exploits, MBAM then hit on…

Exploit: 1
Malware.Exploit.Agent.Generic, , Blocked, [0], [-1],0.0.0

-Exploit Data-
Affected Application: Internet Explorer (and add-ons)
Protection Layer: Application Hardening
Protection Technique: Attempt to execute VBScript blocked
File Name: C:\Windows\system32\vbscript.dll
URL:

…and web search for that on MBAM forum, lists a slough of app’s to run and hoops to jump through in order to completely eradicate that.

Again my initial post here may have omitted that aspect of my molasses running Windows Media Center and oddities like the near impossibility of using my mouse or touchpad to move the cursor arrow onto most any an open folder’s ‘file>open’ (because the ‘file’ drop down menu reverts to the edit’s drop down menu) such that until I try endless paths towards placing the cursor arrow to land on file>open. I say oddity as most every open folder’s file>open acts that way, except a re-named ‘My pics’ shortcut which I’ve housed in the default My Pictures folder (that My pics folder has no such difficulty in cursor placement).

Again, many thanks for both replies.