Jump to content

Malwarebytes repeatedly blocking websites that I haven't gone to

Go to solution Solved by AuroraKnight,

Recommended Posts

So for at least a month now, my Malwarebytes has been popping up with "Potential threat blocked" for several sites that I'm not accessing. Often the same sites are popping up over and over, some are trojans, some are PUP and many seem to be outgoing connections.

My Malwarebytes is up to date and I've done a full scan, including for rootkits, and it has found nothing. Scans with Windows Defender also find nothing.

Please can someone help with this as I am worried that my machine has somehow been compromised.

Link to post
Share on other sites

Hello AuroraKnight and welcome to Malwarebytes,

Can you attach the last three RTP detection logs...

To get the log from Malwarebytes do the following:
  • Click on the Detection History tab > from main interface.
  • Then click on "History" that will open to a historical list
  • Double click on the RTP detection log which shows the Date and time of the Blocked website.
  • Click Export > From export you have two options:
    Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply
    Text file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply
  • Attach the last three RTP blocks


Run the following:

Download Farbar Recovery Scan Tool and save it to your desktop.

Alternative download option: http://www.techspot.com/downloads/6731-farbar-recovery-scan-tool.html

Note: You need to run the version compatible with your system (32 bit or 64 bit). If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

If your security alerts to FRST either, accept the alert or turn your security off to allow FRST to run. It is not malicious or infected in any way...

Be aware FRST must be run from an account with Administrator status...
  • Double-click to run it. When the tool opens click Yes to disclaimer.(Windows 8/10 users will be prompted about Windows SmartScreen protection - click More information and Run.)
  • Make sure Addition.txt is checkmarked under "Optional scans"

  • Press Scan button to run the tool....
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The tool will also make a log named (Addition.txt) Please attach that log to your reply.

Thank you,

Link to post
Share on other sites

Hi Kevin,

I'm not sure if this solution is relevant as I already had sync turned off on Chrome, and it's been that way for months, maybe even a year.
However, I turned the sync on again and then followed the instructions at the link you gave me anyway. I also did the same on my phone, which is the only other device I sign into using Google. 

I can't tell whether this has made a difference, and probably won't know until I get another pop up from Malwarebytes, which has been happening every few days. However, I really don't understand how Google sync could be causing issues if it isn't on. Could this problem be caused by anything else or are you certain Google sync is the cause?

Link to post
Share on other sites

Hiya AuroraKnight,

The problem you have is related to Chrome Browser, usually when any data is removed from Chrome it comes right back after reboot through sync. As you stated that sync is turned off then I guess we can discount that as the cause...


Please download the attached fixlist.txt file and save it to the Desktop or location where you ran FRST from.

NOTE. It's important that both files, FRST or FRST64, and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system that cannot be undone.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt) or wherever you ran FRST from. Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

NOTE-1: This fix will run a scan to check that all Microsoft operating system files are valid and not corrupt and attempt to correct any invalid files. It will also run a disk check on the restart to ensure disk integrity. Depending on the speed of your computer this fix may take 30 minutes or more.

NOTE-2: As part of this fix all temporary files will be removed. If you have any open web pages that have not been bookmarked please make sure you bookmark them now as all open applications will be automatically closed. Also, make sure you know the passwords for all websites as cookies will also be removed.

The following directories are emptied:
  • Windows Temp
  • Users Temp folders
  • Edge, IE, FF, Chrome and Opera caches, HTML5 storages, Cookies and History
  • Recently opened files cache
  • Flash Player cache
  • Java cache
  • Steam HTML cache
  • Explorer thumbnail and icon cache
  • BITS transfer queue (qmgr*.dat files)
  • Recycle Bin

Important: items are permanently deleted. They are not moved to quarantine. If you have any questions or concerns please ask before running this fix.

The system will be rebooted after the fix has run.


Download AdwCleaner by Malwarebytes onto your Desktop.

Or from this Mirror
  • Right-click on AdwCleaner.exe and select Run as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users)
  • Accept the EULA (I accept), then click on Scan
  • Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Quarantine button. This will kill all the active processes
  • Once the cleaning process is complete, AdwCleaner will ask to restart your computer, do it
  • After the restart, a log will open when logging in. Please copy/paste the content of that log in your next reply


Download "Microsoft's Safety Scanner" and save direct to the desktop

Ensure to get the correct version for your system....


Right click on the Tool, select Run as Administrator the tool will expand to the options Window
In the "Scan Type" window, select Quick Scan
Perform a scan and Click Finish when the scan is done.

Retrieve the MSRT log as follows, and post it in your next reply:

1) Select the Windows key and R key together to open the "Run" function
2) Type or Copy/Paste the following command to the "Run Line" and Press Enter:

notepad c:\windows\debug\msert.log

The log will include log details for each time MSRT has run, we only need the most recent log by date and time....



Link to post
Share on other sites

I've gone through the steps you've given and attached thmsert log.txtAdwCleaner[C00].txtFixlog.txte relevant logs. 

At this step for the Adware cleaner:
"Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Quarantine button. This will kill all the active processes"
I did not select the items which were preinstalled software by Lenovo because I wanted to continue using these. I've attached a screenshot to show exactly what processes I am talking about.

Also the log did not open automatically when I logged in, but the scan popped up as finished with the option to view log. That's what I did.

The Adware scan did find some sort of adware. Hopefully removing it solved the issue.

Please let me know of any further steps to be taken.


Link to post
Share on other sites

Thanks for the update AuroraKnight, if no remaining issues or concerns we can clean up:

Right click on FRST here: C:\Users\Mercer\Downloads\FRST64.exe and rename uninstall.exe when complete right click on uninstall.exe and select "Run as Administrator"

If you do not see the .exe appended that is because file extensions are hidden, in that case just rename FRST64 to uninstall

That action will remove FRST and all created files and folders...


Remove all System Restore Points: https://www.tenforums.com/tutorials/33593-delete-system-restore-points-windows-10-a.html#option2

Create clean fresh Restore Point: http://www.thewindowsclub.com/create-system-restore-point

Run Windows Disk Clean Up Utility - https://neosmart.net/wiki/disk-cleanup/

Download and use a Password Management application. https://www.windowscentral.com/best-password-manager-windows

From there you should be good to go...


Read the following links to fully understand PC Security and Best Practices, you may find them useful....

Answers to Common Security Questions and best Practices

Do I need a Registry Cleaner?

Take care and surf safe

Link to post
Share on other sites

  • Solution

Hi Kevin,

I've completed all the steps now. 

I already have a password manager and I have Windows Defender Antivirus on my computer. Thanks for the articles you provided. I am already very careful online and follow all the steps given in "surf safe".

I just wondered, given that I am careful with my passwords, privacy and my online activity, that I have live protection from Malwarebytes premium and do regular scans with Windows Defender and Malwarebytes, how could the adware have gotten past this and onto my system? Does Malwarebytes not protect against adware?

Thanks again.

Link to post
Share on other sites

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread.

Please review the following for Tips to help protect from infection

Thank you



Link to post
Share on other sites

This topic is now closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.