Jump to content

Recommended Posts

Hey there, I don't know if it's related or not but I JUST got the same pop up, and googling it I end up on this thread that is just a few hours old. Can't be a coincidence?

I do not have Malwarebytes installed, just Windows Security Defender complaining about SettingsModifier:Win32/HostsFileHijack.

I also do not know if it's related or not, but I got the popup right after launching the game SUPERHOT MIND CONTROL DELETE.

I actually know what is the HOST file (a bunch of DNS to IP forwarding), so I was curious how the infection was modifying it which could give me information on what is wrong. So I "allowed" the threat via Windows Defender and strangely the file remained the same (with just the default and ::1 to localhost lines). I then asked it to "clean" the threat again, and the HOST file content never changed.

Link to post
Share on other sites
  • Root Admin

Hello @Dunge let me have you run the following please.


Please run the following steps and post back the logs as an attachment when ready.


  • If you're already running Malwarebytes then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • If you don't have Malwarebytes installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and select Scan and let it run.
  • Once the scan is completed click on the View Report button, then the Export button and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know in your next reply.


Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Right-click on the program and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • Accept the Terms of use.
  • Wait until the database is updated.
  • Click Scan Now.
  • When finished, please click Clean & Repair.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Attach or Copy its content into your next reply.


RESTART THE COMPUTER Before running Step 3

Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a checkmark here.
  • Please attach the Additions.txt log to your reply as well.



Link to post
Share on other sites

Thanks AdvancedSetup, but the point of me replying in a similar topic was to point out the problem was not an infection limited to one computer, but a new change that came in a recent Windows update. I saw others replying the same thing. Now that you split it in a separate thread, the message got lost.

If you search a bit online, you will find tons of similar messages, it seems like Microsoft added a new rule a few days ago that report any attempt to modify the hostfile to block advertising by rerouting them to 127.0.01 as a HostsFileHijack





So this is not an infection, and nothing to worry about.

Sorry but I refuse to run multiple scan tools that will reset my settings and delete "non conform" software.

Link to post
Share on other sites
  • Root Admin

All good. Not saying it is an infection. But Microsoft is trying to protect and defend the majority of users, not the select few that wish to run things differently.

In the thousands of logs I've reviewed over the years there have probably been less than 20 users that did not need some type of help, so most users do benefit from posting logs and having someone assist them in cleaning there computer.

Thank you for your feedback I'll go ahead and close your topic.

Have a great weekend



Link to post
Share on other sites
  • Root Admin

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread.

Please review the following for Tips to help protect from infection

Thank you



Link to post
Share on other sites
This topic is now closed to further replies.
  • Recently Browsing   0 members

    No registered users viewing this page.

Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.